Electronic information and cryptographic key management system
DCFirst Claim
1. A method of securing electronic information, comprising the steps of:
- associating at least one cryptographic key with electronic information;
securing said at least one cryptographic key by a first functionality, wherein said step of securing at least one cryptographic key comprises encrypting said at least one cryptographic key in a secure socket layer during transmission of said at least one cryptographic key and saving said at least one cryptographic key to at least one cryptographic key management system;
separately affirmatively confirming that said step of securing at least one cryptographic key has been appropriately accomplished by a second functionality apart and independent from said first functionality and communicatively coupled to said first functionality in order to allow initial cryptographic functioning of said at least one cryptographic key;
enabling a function responsive to said step of confirming that said step of securing at least one cryptographic key has been appropriately accomplished; and
securing electronic information.
3 Assignments
Litigations
0 Petitions
Accused Products
Abstract
Systems and methods of electronic information securement. The invention provides for the securement of electrical information and cryptographic keys through cryptographic key management systems providing for the confirmation that one or a plurality of cryptographic keys have been secured to the key management system. Confirmation provided by the key management system enables other systems to perform cryptographic and electronic information functions such as encryption, decryption, saving, and transferring of information. Further systems are provided having at least one client system, at least one cryptographic key management system, and at least one electronic information storage system, whereby the key management system enables functionality of the system after providing securement confirmation of keys and data.
21 Citations
37 Claims
-
1. A method of securing electronic information, comprising the steps of:
-
associating at least one cryptographic key with electronic information; securing said at least one cryptographic key by a first functionality, wherein said step of securing at least one cryptographic key comprises encrypting said at least one cryptographic key in a secure socket layer during transmission of said at least one cryptographic key and saving said at least one cryptographic key to at least one cryptographic key management system; separately affirmatively confirming that said step of securing at least one cryptographic key has been appropriately accomplished by a second functionality apart and independent from said first functionality and communicatively coupled to said first functionality in order to allow initial cryptographic functioning of said at least one cryptographic key; enabling a function responsive to said step of confirming that said step of securing at least one cryptographic key has been appropriately accomplished; and securing electronic information. - View Dependent Claims (5, 6, 7, 8, 10, 11, 12, 14, 15)
-
-
2. A method of securing electronic information, comprising the steps of:
-
associating at least one cryptographic key with electronic information; securing said at least one cryptographic key by a first functionality; separately affirmatively confirming that said step of securing at least one cryptographic key has been appropriately accomplished by a second functionality apart and independent from said first functionality and communicatively coupled to said first functionality in order to allow initial cryptographic functioning of said at least one cryptographic key; enabling a function responsive to said step of confirming that said step of securing at least one cryptographic key has been appropriately accomplished; and securing electronic information, wherein said step of securing electronic information comprises transferring electronic information, and further comprising the step of encrypting said electronic information in a secure socket layer during transferring.
-
-
3. A method of securing electronic information, comprising the steps of:
-
generating at least one cryptographic key; confirming generation of said at least one cryptographic key, wherein said step of confirming generation comprises confirming generation of at least one valid key and further comprising the step of providing said at least one cryptographic key in a read-only format, wherein said step of confirming generation of at least one valid key comprises confirming generation of said cryptographic key in a read-only format; associating said at least one cryptographic key with electronic information; securing said at least one cryptographic key by a first functionality; separately affirmatively confirming that said step of securing at least one cryptographic key has been appropriately accomplished by a second functionality apart and independent from said first functionality and communicatively coupled to said first functionality in order to allow initial cryptographic functioning of said at least one cryptographic key; enabling a function responsive to said step of confirming that said step of securing at least one cryptographic key has been appropriately accomplished; and securing electronic information. - View Dependent Claims (9, 13)
-
-
4. A method of securing electronic information, comprising the steps of:
-
associating at least one cryptographic key with electronic information; securing said at least one cryptographic key by a first functionality; separately affirmatively confirming that said step of securing at least one cryptographic key has been appropriately accomplished by a second functionality apart and independent from said first functionality and communicatively coupled to said first functionality in order to allow initial cryptographic functioning of said at least one cryptographic key; enabling a function responsive to said step of confirming that said step of securing at least one cryptographic key has been appropriately accomplished; and securing electronic information, wherein said step of securing electronic information comprises restricting access to electronic information to situations where the system receives substantially simultaneous access requests from a plurality of administrators in order to allow access to secure electronic information under conditions of enhanced security.
-
-
16. An electronic information securement system, comprising:
-
an electronic information securement system having a securement functionality; at least one cryptographic key management system having a separate affirmative confirmation functionality configured to confirm that securing of a cryptographic key has been appropriately accomplished by a functionality apart and independent from said securement functionality and communicatively coupled to said securement functionality in order to allow initial cryptographic functioning of said at least one cryptographic key wherein said electronic information securement system is enabled to perform a function in response to a confirmation from said at least one cryptographic key management system and is configured to secure electronic information; and at least one client system communicatively coupled to said at least one cryptographic key management system and configured to secure electronic information, and wherein access to electronic information secured to said at least one client system is restricted to situations where the system receives substantially simultaneous access requests in order to allow access to said secure electronic information under conditions of enhanced security. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
17. An electronic information securement system, comprising:
-
an electronic information securement system having a securement functionality; at least one cryptographic key management system having a separate affirmative confirmation functionality configured to confirm that securing of a cryptographic key has been appropriately accomplished by a functionality apart and independent from said securement functionality and communicatively coupled to said securement functionality in order to allow initial cryptographic functioning of said at least one cryptographic key, wherein said electronic information securement system is enabled to perform a function in response to a confirmation from said at least one cryptographic key management system and is configured to secure electronic information; and at least one electronic information storage system communicatively coupled to said at least one cryptographic key management system and configured to secure electronic information, and wherein access to electronic information secured to said at least one electronic information storage system is restricted to situations where the system receives substantially simultaneous access requests in order to allow access to said secure electronic information under conditions of enhanced security.
-
-
18. An electronic information securement system, comprising:
-
an electronic information securement system having a securement functionality; at least one cryptographic key management system having a separate affirmative confirmation functionality configured to confirm that securing of a cryptographic key has been appropriately accomplished by a functionality apart and independent from said securement functionality and communicatively coupled to said securement functionality in order to allow initial cryptographic functioning of said at least one cryptographic key, wherein said at least one cryptographic key management system is configured to secure electronic information, and wherein access to electronic information secured to said at least one cryptographic key management system is restricted to situations where the system receives substantially simultaneous access requests in order to allow access to said secure electronic information under conditions of enhanced security; wherein said electronic information securement system is enabled to perform a function in response to a confirmation from said at least one cryptographic key management system and is configured to secure electronic information.
-
Specification