×

System and method for managing cryptographic keys

  • US 9,490,973 B1
  • Filed: 05/17/2016
  • Issued: 11/08/2016
  • Est. Priority Date: 12/07/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method implemented on a first computing device, the method comprising:

  • retrieving, from a memory, a fourth key;

    transmitting, to a second computing device, a request for an encrypted third key, wherein the encrypted third key is generated by encrypting the third key using the fourth key;

    receiving, from the second computing device, the encrypted third key;

    receiving data for encryption;

    transmitting, to an identify and access management device (IAM), a request for a key identifier based on information associated with the data;

    receiving, from the IAM, the requested key identifier;

    transmitting, to the second computing device, a request for an encrypted first key that is associated with the key identifier;

    receiving, from the second computing device, the encrypted first key;

    transmitting, to the IAM, a request for an encrypted second key;

    receiving, from the IAM, the encrypted second key;

    decrypting the encrypted third key using the fourth key;

    decrypting the encrypted second key using the decrypted third key;

    decrypting the encrypted first key using the decrypted second key;

    encrypting the data using the decrypted first key; and

    deleting, from a cache of the first computing device, the decrypted first key after a period of time.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×