US20070189541A1 - Method and system for initialzing a key management system - Google Patents
Method and system for initialzing a key management system Download PDFInfo
- Publication number
- US20070189541A1 US20070189541A1 US11/728,619 US72861907A US2007189541A1 US 20070189541 A1 US20070189541 A1 US 20070189541A1 US 72861907 A US72861907 A US 72861907A US 2007189541 A1 US2007189541 A1 US 2007189541A1
- Authority
- US
- United States
- Prior art keywords
- data
- key
- kek
- kms
- data structure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000000875 corresponding Effects 0.000 claims description 8
- 238000000034 method Methods 0.000 abstract description 16
- 150000003839 salts Chemical class 0.000 description 12
- 239000011780 sodium chloride Substances 0.000 description 10
- 230000004048 modification Effects 0.000 description 2
- 238000006011 modification reaction Methods 0.000 description 2
- 235000010384 tocopherol Nutrition 0.000 description 2
- 235000019731 tricalcium phosphate Nutrition 0.000 description 2
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Abstract
A network system for key management including a server, a key management system providing process logic for key management system initialization located on the server, a key management system storage providing a secure data storage for the key management system, and an interface providing a means for inputting data into the key management system.
Description
- This application is a continuation of U.S. patent application No. 10/037,153, filed Dec. 21, 2001.
- Connection of company networks to the Internet has resulted in a requirement for increased network security. This has resulted in some software systems, i.e. Financial Software Systems, requiring security information as part of their operation. Security information includes such information as encryption/decryption keys for encrypted databases, administrator passwords to access external resources such as a directory server, etc. Security information is typically stored in a configuration file that is accessible by the software systems.
- While security information is used to ensure the security of particular software systems and the data they use, security information itself is typically not secure. Security information typically stored in a configuration file is in “clear text” i.e. text in ASCII format. However, some software systems include devices to safeguard security information, such as, storing security information in encrypted form. While this will protect the security information when it is not being used, it does not protect the security information when it is accessed. When security information is accessed by a particular software system, the security information must first be decrypted prior to being used. During this time the security information is in clear text and thus is exposed.
- To protect security information, software system operators typically use Hardware Security Modules (HSM). HSM physically protect security information by providing tamper-resistant security information storage. Additionally, HSM perform functions such as security information generation, security information backup, security information management, etc. Security information inside an HSM is typically accessed by a proprietary software interface.
FIG. 1 illustrates a typical network system using HSM. - Typically, the network system has a security server (10) that contains root security information. The root security information allows a user with that information to access any resource on the network. Security information used by the security server is stored on an HSM (12). Additionally, the security server (10) runs the HSM interface that allows the security server to control all HMS (12) on the network. The network system as also typically has an application server (14) and a directory server (16). The application server (14) typically runs the business logic for a server-based application. The directory server typically runs a directory service. The directory service enables a user to locate hosts and services on a network. The application server (14) and the directory server (16) also both store security information in HSM (12). Finally, the network system contains a web server (18). The web server (18) typically runs server software that uses HyperText Transfer Protocol to serve up HyperText Mark-up Language documents and any associated files and scripts when requested by a client, such as a Web browser (20). The web server (18) stores security information in a HSM (11).
- When a web browser (20) is running a web application via a web server (18) and an application server (14), there may be a request to access sensitive data such as a financial data located on the application server (14). The application server (14) on behalf of the web browser (20) will request some security information from the HSM (12). The security information on the HSM (12) is then accessed via the HSM Interface (11).
- In general, in one aspect, the invention relates to a network system for key management, comprising: a server, a key management system providing process logic for key management system initialization located on the server, a key management system storage providing a secure data storage for the key management system, and an interface providing a means for inputting data into the key management system.
- In general, in one aspect, the invention relates to a network system for key management, comprising: a server, a key management system providing process logic for key management system initialization located on the server, a key management system storage providing a secure data storage for the key management system, an interface providing a means for inputting data into the key management system, and a client computer operatively connected to the server, wherein the client computer comprises a user interface to input data into the key management system.
- In general, in one aspect, the invention relates to a method for initializing a key management system comprising: entering data into a key management system interface, entering a key encryption key into the key management system interface, combining data into a tuple, encrypting the tuple with the key encryption key to produce a secret token, storing the secret token in a vector, hashing the key encryption key, storing a hashed key encryption key in the vector, storing a list of keys in the vector, serializing the vector to produce a serialized file, and storing the serialized file in a key management system storage.
- In general, in one aspect, the invention relates to a method for initializing a key management system comprising: entering data into a key management system interface, entering a key encryption key into the key management system interface, combining data into a tuple, encrypting the tuple with the key encryption key to produce a secret token, storing the secret token in a vector, hashing the key encryption key, storing a hashed key encryption key in the vector, storing a list of keys in the vector, serializing the vector to produce a serialized file, storing the serialized file in a key management system storage, encoding a key field of the tuple, randomizing the order of the list of keys, randomizing the order of the secret tokens in the vector, and generating data to encrypt.
- In general, in one aspect, the invention relates to an apparatus for initializing a key management system comprising: means for entering data into a key management system interface, means for entering a key encryption key into the key management system interface, means for combining data into a tuple, means for encrypting the tuple with the key encryption key to produce a secret token, means for storing the secret token in a vector, means for hashing the key encryption key, means for storing a hashed key encryption key in the vector, means for storing a list of keys in the vector, means for serializing the vector to produce a serialized file, means for storing the serialized file in a key management system storage, means for encoding a key field of the tuple, means for randomizing the order of the list of keys, means for randomizing the order of the secret tokens in the vector, and means for generating data to encrypt.
- Other aspects and advantages of the invention will be apparent from the following description and the appended claims.
-
FIG. 1 illustrates a typical network system using Hardware Security Modules. -
FIG. 2 illustrates a typical network system in accordance with one or more embodiments of the present invention. -
FIG. 3 illustrates a Key Management System in accordance with one or more embodiments of the present invention. -
FIG. 4 illustrates a 3-tuple in accordance with an embodiment of the present invention. -
FIG. 5 illustrates a vector in accordance with an embodiment of the present invention. -
FIG. 6 illustrates a typical graphical user interface to input data, in one or more embodiments of the present invention. -
FIG. 7 illustrates, in flow chart form, the typical steps involved in initializing a Key Management System. -
FIG. 8 illustrates a typical 4-tuple used in another embodiment of the present invention. -
FIG. 9 illustrates a vector in accordance with another embodiment of the present invention. - In the following detailed description of the invention, numerous specific details are set forth in order to provide a more thorough understanding of the invention. However, it will be apparent to one of ordinary skill in the art that the invention may be practiced without these specific details. In other instances, well-known features have not been described in detail to avoid obscuring the invention.
- The present invention relates to initializing a key management system. Further, the present invention relates to a method for securing keys within the key management system. Further, the present invention relates to a method for storing keys within the key management system.
-
FIG. 2 illustrates an exemplary network system in accordance with one or more embodiments of the present invention. The network system typically includes a web server (22), and a client computer (28) containing a web browser (30). Additionally, the web server (22) is typically operatively connected to an application server (32) containing a Software Application (25), a Key Management System (KMS) (24) and a Key Management System Storage (KMS Storage) (26), and to a directory server (34). The software application (25) represents a generic software application, such as a financial data application, an authentication application, etc. The web server (22) and the web browser (30) typically communicate using Hypertext Transfer Protocol (HTTP) running over Transport Control Protocol/Internet Protocol (TCP/IP). The KMS (24) contains process logic, and the KMS storage (26) provides a secure data storage location e.g., a hard drive, where information processed by the KMS (24) is stored. Further, the KMS storage (26) is secured by the operating system via file permissions. - In one or more embodiments of the present invention, the KMS storage (26) is located on a different computer than the KMS (24). Further, the computers are connected via a secure connection such as a connection using 128-bit encryption running over a Secure Socket Layer (SSL).
- While the present invention is described in according to one embodiment those skilled in the art will appreciate that the KMS (24) and KMS storage (26) may be distributed across the network system.
-
FIG. 3 illustrates a Key Management System (KMS) in accordance with one or more embodiments of the present invention. The KMS (24) includes a memory (36), a hashing module (38), an encryption module (42), an encoding module (40), and a serialization module (46). The memory cache (36) is a random access memory (RAM) subsystem in which frequently used data values are duplicated for quick access. Specifically, within the KMS (24) the memory (36) stores data initially sent to the KMS (24) prior to processing. The hashing module (38) hashes a Key Encryption Key (KEK) within the KMS (24). By applying a hashing function to a piece of data, the resulting data is a reorganized version of the original data. Additionally, hash functions used to secure data are typically designed such that they can not be “reverse engineered.” The purpose of hashing the KEK is to provide a means to store the KEK in a secure format. In one embodiment of the present invention, MD5 is used as the hash function. Those in the art will appreciate that different hashing functions may be employed, e.g., MD2, MD4, etc. - The encryption module (42) contains encryption tools. The encryption tools include tools for key generation and tools for encryption. The key generation tools typically use a randomly generated seed as part of the input to the key generation tool. Specifically, within the KMS (24), the encryption module (42) includes process logic that generates the random seed for input to the key generation tool. The generated keys are used to access secure systems and/or applications such as a directory server. The encryption tool obtains data to be encrypted from the memory (36), or KMS generated keys from the key generation tools within the encryption module (42), and encrypts them using a specified encryption function. The encryption module (42) uses a KEK as the encryption key. In one embodiment of the present invention, the KEK includes three distinct parts: a KEK Pin, a KEK Salt, and a KEK Iteration. Constraints may be placed on all three parts of the KEK. For example, the KEK Pin may have a requirement to be at least 10 characters with a minimum of 3 numbers (N) and 3 letters (L) e.g., KEK Pin: NNNLNLLNLN. Depending on the encryption algorithm used, the KEK may have greater or fewer than three parts. Additionally, some encryption algorithms may also apply constraints to individual KEK parts. For example, in one embodiment of the present invention uses PBE with MD5 in combination with Triple Data Encryption Standard (DES) as the encryption algorithm. This imposes a constraint on the KEK salt by limiting the KEK salt to eight characters. Further, the KEK Iteration is limited to an integer. Those skilled in the art will appreciate that different encryption algorithms or combination of encryption algorithms may be used in conjunction with the present invention.
- In one embodiment of the present invention, the encryption module uses a symmetric algorithm e.g., Triple Data Encryption Standard (DES). Symmetric algorithms rely on encryption and decrypting data using the same encryption key. Thus, a KEK is used to encrypt and decrypt data within the KMS.
- In another embodiment of the present invention, the encryption module uses an asymmetric algorithm such as Rivest-Shamir-Adleman (RSA) algorithm. RSA creates a pair of related keys, one key to encrypt data and another key to decrypt data. Thus, a KEK may be used to encrypt the data and a corresponding Key Decryption Key (KDK) may be used to decrypt the data. The KEK and KDK are created simultaneously using the same algorithm e.g., RSA algorithm. The key generation tools within the encryption module generate the KEK and KDK using random input either generated by the user or by the key generation tool.
- The encoding module (40) converts the data into a binary representation that is 64 bit encoded. Typically, encoding is performed to hide the clear text names of the data being encrypted. The serialization module (46) obtains input from the hashing module (38), the encoding module (40) and encryption module (42) and stores it in a vector. Once all the data has been received, the serialization module (46) processes the vector to create a serialized file. Serialization is the process of saving an object's state to a sequence of bytes, such that it may be rebuilt into a live object at some future time. Specifically, within the KMS the vector is converted into an object within the serialization module (46) and subsequently converted into a serialized file. The serialized file allows the data within the vector to persist beyond the time the KMS (24) is active. Additionally, the serialized file may be copied and transferred to another system where it may be stored as a backup. The process of creating the serialized filed is typically carried out using a Java™ Serialization Application Program Interface (API).
- The KMS (24) uses three main data structures: an n-tuple, a data structure (e.g., a vector), and a serialized file.
FIG. 4 illustrates a 3-tuple in accordance with an embodiment of the present invention. The 3-tuple (47) includes three data fields: a key field (48), a value field (50), and a type field (52). The key field (48) contains an identifying name of a value, e.g., Admin_Password. The value field (50) contains a value identified by the name in the key field (48). The type field (52) may contain either “USER” or “GENERATED.” “USER” corresponds to a value in the value field (50) that was entered by the user. “GENERATED” corresponds to a value in the value field (50) that was generated by the KMS, specifically the key generation tool in the encryption module. The three fields are combined to produce a 3-tuple (47). Data input into the KMS is first stored as a 3-tuple (47) within the memory prior to processing. -
FIG. 5 illustrates a vector in accordance with one or more embodiments of the present invention. In data structures, a vector is a one-dimensional array, where an array is a set of items arranged in a single column or row. Additionally, the vector data structure can also dynamically grow based on the size of the items within the set. Specifically, a vector (54) with a KMS includes three distinction portions: a secret token portion (56), a KEK Hash portion (58), and an encoded key portion (60). The secret token portion (56) contains all the encrypted 3-tuples, each encrypted 3-tuple is herein referred to as a secret token. In one embodiment of the present invention the secret tokens are stored in a random order within the secret token portion (56). Following the secret token portion (56) is the KEK Hash portion (58). The KEK Hash portion (58) holds the result of applying the hash function to the KEK. The KEK Hash is output from the Hashing Module. The final portion is the Encoded Key Portion (60), the encoded key portion (60) contains an encoded list of Keys (from the Key field in the 3-tuple). In one embodiment each key is 64-bit encoded and separated by a semi-colon. In another embodiment, the keys are combined into a list and the list is subsequently encoded. For example, if there were three keys then the encoded key portion (60) may have the following content: ENCODED (Key_A; Key_B; Key_C). Those skilled in the art will appreciate that the encoded keys may be separated in different manner. Encoded keys are output from the encoding module, and then stored in the vector (54). In one embodiment of the present invention, the list of Keys may be placed in a random order prior to encoding. - A serialized file is a flat-file. A flat-file is a file that consists of a single record type in which there is not embedded structure information that governs relationships between the records. Specifically, with serialized flat-files they are “flattened” by the Sun® Mircosystem's Java™ Serialization Application Program Interface (API) such that they may be rebuilt at some future time. The serialization module takes a vector as input and produces a serialized file as output.
-
FIG. 6 illustrates a typical graphical user interface (GUI) to input data, in one or more embodiments of the present invention. The GUI (60) may be part of a stand alone application or integrated into a web browser. The GUI (60) provides the user with a means to input data into the KMS. A field name section (64) contains the key's e.g., card.ldap.admin.dn, which are stored in the key field of the 3-tuple. A value input section (66) contains two input text boxes: a value text box (68) and a confirm text box (70). The user inputs a value corresponding to a key in the field name section (64) into the corresponding value text box (68), the user then re-enters the value in the confirm text box (70). In one embodiment of the present invention the text typed into the value text box (68) and the confirm text box (70) is displayed as “clear text.” In another embodiment of the present invention the text typed into the value text box (68) and the confirm text box (70) is displayed as a series of asterisks. A generate randomly section (72) contains a series of checkboxes, one for each key. The user may check a box for a given key, which prompts the KMS to generate a value for that particular key. As mentioned above, the KMS generates the values using a key generation tool within the encryption module. - Once the user enters data into the above mentioned sections the user then proceeds to enter in a Key Encryption Key (KEK) section (74) on the GUI (62). The KEK section (74) on the GUI contains text-input fields for each portion of the KEK that is required. For example, referring to
FIG. 6 , the KEK section (74) requires the user to input three pieces of information: a KEK PIN (76), KEK Salt (78), and a KEK Iteration (80). Similar to entering data into the value input section (66), the KEK section also requires the user to enter the data twice. In one embodiment of the present invention the text typed into the KEK section, (74) is displayed as clear text. In another embodiment of the present invention the text typed into the KEK section, (74) is displayed as a series of asterisks. - Once all the data has been entered user may check the “Write KEK to file for automatic KMS Initialization” checkbox (82). By checking the “Write KEK to file for automatic KMS Initialization” checkbox, the KEK section (74) information will be saved in a file that is accessed when the KMS is used. If this box is not checked, then every time the KMS is started the user will have to enter the KEK section (74) information. After the user has made a decision to check the “Write KEK to file for automatic KMS Initialization” checkbox (82), the user may click a “Create File” Button (84) to input the data into the KMS for it to be processed.
- Referring again to
FIG. 2 , consider the following scenario. A network operator adds a directory server (34) to the companies existing network infrastructure e.g. a web server (22) and application server (32). The application server (32) is running an security application that is used to verify remote web users. The security application stores user name and password information in encrypted form on the directory server (34) running a Lightweight Directory Application Protocol (LDAP) compliant directory service. Thus, the security application requires an administrator level username and password to logon onto the LDAP-compliant directory service running on the directory server (34). Additionally, the security application requires the decryption keys to decrypt the data on the directory server (34). The present invention allows all the required access data i.e., administrator username, administrator password, decryption key to be stored on the web server (22) in a secure format. The user initially enters all the required access data into a KMS (26) GUI. The GUI may be integrated with a web browser (30). The web browser is typically running a secure connection such as Secure Socket Layer (SSL). The user then proceeds to create a serialized file which contains all the required data in a secure format and then stores the serialized file in the KMS storage (26). -
FIG. 7 illustrates, in flow chart form, typical steps involved in initializing a Key Management System. The user enters data into the KMS GUI (Step 100). For example, referring to the above scenario, a user may enter the administrator username, administrator password, etc. The user then enters a KEK into the GUI (Step 102). Once the user clicks the “Create File” Button, the KMS combines the data into 3-tuples as mentioned above (Step 104). The key field of a first 3-tuple is then stored in the memory (Step 106). The KMS then encrypts the 3-tuple using the KEK as the encryption key to produce a secret token (Step 108). The secret token is then stored in a vector (Step 110). If there are any more 3-tuples to encrypt (Step 112), the above steps are repeated. If there are no more 3-tuples to encrypt (Step 112), the KMS hashes the KEK with a specified hashing algorithm. The result of hashing the KEK is then stored in the vector (Step 114). The KMS then combines the keys into a list, 64 bit encodes them and stores them in the vector (Step 116). The vector is then processed by the serialization module to produce a serialized file (Step 118). The serialized file is then stored in the KMS storage (Step 120). - In one embodiment of the present invention, the KEK is stored on a smart card and input into the KMS via a GUI that has an interface with a smart card reader.
- In one embodiment of the present invention, the 3-tuple is converted to a 4-tuple allowing the KMS to scale to use with multiple application simultaneously. For example, consider the above scenario with the security application. If another application such as an accounting application is added to the application server, then a another set of data will be required e.g., administrator name, administrator password, etc. to access the accounting application and the accounting application data.
FIG. 8 illustrates a typical 4-tuple used in a KMS serving multiple applications. The 4-tuple (86) contains all three fields that the 3-tuple contains e.g., a key field (88), a value field (90) and a type field (92) plus an additional field: an application name field (94). The application name field (94) contains the name of the application. - In addition to modification made to the 3-tuple, the content in the vector is also modified.
FIG. 9 illustrates a typical vector used in a KMS serving multiple applications. A modified vector (96) contains the same portions as the previous embodiment of the vector e.g., a secret token portion (98), a key encryption key portion (100), and an encoded key portion (102). All content in the secret portion (98) of the modified vector (96) is tagged with the application name obtained from the application name field in the 4-tuple. The application name tag may be 64-bit encoded. The secret tokens for all applications are then stored in the modified vector. The content in the encoded key portion (102) of the modified vector (96) is modified such that each key is tagged with an application name. All the tagged keys are then combined into a list, 64-bit encoded, and stored in the vector. The vector is then serialized as described above. The KMS GUI is modified to allow input of the application name. - Advantages of the present may include one or more of the following. In some embodiments, the present invention provides a software solution to key management system. Further, the present invention may be integrated into existing network infrastructure without requiring additional hardware. In some embodiments, the present invention is scalable to manage keys for multiple applications. In some embodiments, the present invention allows sensitive data to be readily backed-up and recovered. In some embodiments of the present invention, the keys are never stored as clear text. Further, the present invention allows the KMS to be distributed over multiple servers within a network system. Further, the present invention allows the KEK to contain multiple portions e.g., salt, count, integer, such that KEK may be distributed to multiple security officers. Those skilled in the art can appreciate that the present invention may include other advantages and features.
- While the invention has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this disclosure, will appreciate that other embodiments can be devised which do not depart from the scope of the invention as disclosed herein. Accordingly, the scope of the invention should be limited only by the attached claims.
Claims (23)
1-35. (canceled)
36. A method for securing data in a key management system (KMS), comprising:
receiving the data in the KMS, wherein the data comprises a key name, a key value, and a key type;
receiving a key encryption key (KEK) in the KMS;
encrypting the data using the KEK to generate a secret token;
hashing the KEK to generate a hashed KEK;
generating a data structure comprising the secret token and the hashed KEK; and
storing the data structure in a KMS storage.
37. The method of claim 36 , further comprising:
storing the data in a data structure prior to encrypting the data.
38. The method of claim 37 , further comprising:
encoding the key name to obtain an encoded key name after storing the key name in the data structure.
39. The method of claim 38 , wherein the data structure comprises an encoded key list and wherein the encoded key list comprises the encoded key name.
40. The method of claim 36 , further comprising:
associating the secret token with an application.
41. The method of claim 40 , wherein the data structure comprises an application name tag corresponding to the application.
42. The method of claim 36 , wherein storing the data structure comprises:
serializing the data structure to generate a serialized file; and
storing the serialized file in the KMS storage.
43. The method of claim 36 , wherein encrypting the data comprises using one selected from a group consisting of a symmetric algorithm and an asymmetric algorithm.
44. The method of claim 36 , wherein the data is received from a client over a network.
45. The method of claim 36 , wherein the KEK is received from a client using a security device interfacing over the network with the KMS and wherein the security device stores the KEK.
46. The method of claim 36 , wherein the data is encrypted by the KMS.
47. A system for securing data, comprising:
a key management system (KMS) configured to receive data and a key encryption key (KEK), comprising:
an encryption module configured to encrypt the data using the KEK to generate a secret token;
a hashing module configured to hash the KEK to generate a hashed KEK;
a serialization module configured to generate a data structure comprising the secret token and the hashed KEK; and
a KMS storage configured to store the data structure,
wherein the data comprises a key name, a key value, and a key type.
48. The system of claim 47 , further comprising:
a graphical user interface configured to receive the data.
49. The system of claim 48 , wherein the graphical user interface is integrated into a web browser.
50. The system of claim 47 , wherein the data is received from a client over a network.
51. The system of claim 47 , wherein the KEK is received from a client using a security device interfacing over the network with the KMS, and wherein the security device stores the KEK.
52. The system of claim 47 , wherein the data structure is stored in the KMS storage as a serialized file.
53. The system of claim 47 , wherein the KMS is further configured to store the data in a data structure prior to encrypting the data.
54. The system of claim 53 , wherein the encoding module is further configured to encode the key name to obtain an encoded key name after the key name is stored in the data structure.
55. The system of claim 54 , wherein the data structure comprises an encoded key list comprising the encoded key name.
56. The system of claim 47 , wherein the KMS is further configured to:
tag the secret token to associate the secret token with an application, wherein the data structure further comprises the tag.
57. A computer readable medium storing instructions for execution on a processor, wherein the instructions comprise functionality to:
receive the data in the KMS, wherein the data comprises a key name, a key value, and a key type;
receive a key encryption key (KEK) in the KMS;
encrypt the data using the KEK to generate a secret token;
hash the KEK to generate a hashed KEK;
generate a data structure comprising the secret token and the hashed KEK; and
store the data structure in a KMS storage.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/728,619 US20070189541A1 (en) | 2001-12-21 | 2007-03-26 | Method and system for initialzing a key management system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/037,153 US7225161B2 (en) | 2001-12-21 | 2001-12-21 | Method and system for initializing a key management system |
US11/728,619 US20070189541A1 (en) | 2001-12-21 | 2007-03-26 | Method and system for initialzing a key management system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date | |
---|---|---|---|---|
US10/037,153 Continuation US7225161B2 (en) | 2001-12-21 | 2001-12-21 | Method and system for initializing a key management system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070189541A1 true US20070189541A1 (en) | 2007-08-16 |
Family
ID=21892722
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/037,153 Expired - Fee Related US7225161B2 (en) | 2001-12-21 | 2001-12-21 | Method and system for initializing a key management system |
US11/728,619 Abandoned US20070189541A1 (en) | 2001-12-21 | 2007-03-26 | Method and system for initialzing a key management system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/037,153 Expired - Fee Related US7225161B2 (en) | 2001-12-21 | 2001-12-21 | Method and system for initializing a key management system |
Country Status (3)
Country | Link |
---|---|
US (2) | US7225161B2 (en) |
AU (1) | AU2002361804A1 (en) |
WO (1) | WO2003061191A2 (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120281836A1 (en) * | 2011-05-04 | 2012-11-08 | International Business Machines Corporation | Secure key management |
US8566913B2 (en) | 2011-05-04 | 2013-10-22 | International Business Machines Corporation | Secure key management |
US8619992B2 (en) | 2011-04-27 | 2013-12-31 | International Business Machines Corporation | Secure key creation |
US8713709B2 (en) | 2011-05-04 | 2014-04-29 | International Business Machines Corporation | Key management policies for cryptographic keys |
US8739297B2 (en) | 2011-05-04 | 2014-05-27 | International Business Machines Corporation | Key usage policies for cryptographic keys |
CN104935553A (en) * | 2014-03-19 | 2015-09-23 | 北京安讯奔科技有限责任公司 | Unified identity authentication platform and authentication method |
US9231920B1 (en) | 2011-12-13 | 2016-01-05 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9264230B2 (en) | 2011-03-14 | 2016-02-16 | International Business Machines Corporation | Secure key management |
US9288191B1 (en) | 2011-12-13 | 2016-03-15 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9292696B1 (en) | 2011-03-08 | 2016-03-22 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9300637B1 (en) | 2011-03-08 | 2016-03-29 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9323818B1 (en) | 2011-03-08 | 2016-04-26 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9338220B1 (en) | 2011-03-08 | 2016-05-10 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9356993B1 (en) | 2011-03-08 | 2016-05-31 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9413526B1 (en) * | 2011-03-08 | 2016-08-09 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9432342B1 (en) | 2011-03-08 | 2016-08-30 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9667741B1 (en) | 2011-03-08 | 2017-05-30 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
WO2017165288A1 (en) * | 2016-03-24 | 2017-09-28 | Snowflake Computing Inc. | Systems, methods, and devices for securely managing network connections |
US9852311B1 (en) | 2011-03-08 | 2017-12-26 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US11228566B1 (en) | 2011-03-08 | 2022-01-18 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
Families Citing this family (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7392384B2 (en) * | 2002-06-28 | 2008-06-24 | Hewlett-Packard Development Company, L.P. | Method and system for secure storage, transmission and control of cryptographic keys |
US9020854B2 (en) | 2004-03-08 | 2015-04-28 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
RU2007127725A (en) | 2004-12-20 | 2009-01-27 | ПРОКСЕНС, ЭлЭлСи (US) | PERSONAL DATA (PDK) AUTHENTICATION BY BIOMETRIC KEY |
US8433919B2 (en) * | 2005-11-30 | 2013-04-30 | Proxense, Llc | Two-level authentication for secure transactions |
US8036152B2 (en) | 2006-01-06 | 2011-10-11 | Proxense, Llc | Integrated power management of a client device via system time slot assignment |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US9269221B2 (en) | 2006-11-13 | 2016-02-23 | John J. Gobbi | Configuration of interfaces for a location detection system and application |
CN101400059B (en) * | 2007-09-28 | 2010-12-08 | 华为技术有限公司 | Cipher key updating method and device under active state |
WO2009062194A1 (en) | 2007-11-09 | 2009-05-14 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US8171528B1 (en) | 2007-12-06 | 2012-05-01 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
WO2009079666A1 (en) | 2007-12-19 | 2009-06-25 | Proxense, Llc | Security system and method for controlling access to computing resources |
US8508336B2 (en) | 2008-02-14 | 2013-08-13 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US11120449B2 (en) | 2008-04-08 | 2021-09-14 | Proxense, Llc | Automated service-based order processing |
US20100115261A1 (en) * | 2008-11-06 | 2010-05-06 | International Business Machines Corporation | Extensible seal management for encrypted data |
CN102055747B (en) * | 2009-11-06 | 2014-09-10 | 中兴通讯股份有限公司 | Method for acquiring key management server information, and monitoring method, system and equipment |
US9418205B2 (en) | 2010-03-15 | 2016-08-16 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US8918854B1 (en) | 2010-07-15 | 2014-12-23 | Proxense, Llc | Proximity-based system for automatic application initialization |
US9191200B1 (en) * | 2010-10-07 | 2015-11-17 | L-3 Communications Corp. | System and method for changing the security level of a communications terminal during operation |
US8857716B1 (en) | 2011-02-21 | 2014-10-14 | Proxense, Llc | Implementation of a proximity-based system for object tracking and automatic application initialization |
US8918853B2 (en) * | 2011-06-29 | 2014-12-23 | Sharp Laboratories Of America, Inc. | Method and system for automatic recovery from lost security token on embedded device |
TWI459230B (en) | 2011-08-08 | 2014-11-01 | Ind Tech Res Inst | Drm apparatus and drm method |
US20130103685A1 (en) * | 2011-09-01 | 2013-04-25 | Protegrity Corporation | Multiple Table Tokenization |
TWI475879B (en) * | 2011-12-06 | 2015-03-01 | Ind Tech Res Inst | Method and apparatus for enciphering/deciphering digital rights management object |
WO2014183106A2 (en) | 2013-05-10 | 2014-11-13 | Proxense, Llc | Secure element as a digital pocket |
US9235714B1 (en) * | 2013-11-12 | 2016-01-12 | Amazon Technologies, Inc. | Preventing persistent storage of cryptographic information using signaling |
US10223538B1 (en) | 2013-11-12 | 2019-03-05 | Amazon Technologies, Inc. | Preventing persistent storage of cryptographic information |
US9231923B1 (en) | 2013-11-12 | 2016-01-05 | Amazon Technologies, Inc. | Secure data destruction in a distributed environment using key protection mechanisms |
JP2018516030A (en) | 2015-05-05 | 2018-06-14 | ショカード、インコーポレイテッド | ID management service using blockchain |
CN106921489B (en) * | 2015-12-25 | 2020-02-18 | 中国移动通信集团公司 | Data encryption method and device |
EP4027254A3 (en) | 2016-03-04 | 2022-10-05 | Ping Identity Corporation | Method for authenticated session using static or dynamic codes |
US10007826B2 (en) | 2016-03-07 | 2018-06-26 | ShoCard, Inc. | Transferring data files using a series of visual codes |
US10509932B2 (en) | 2016-03-07 | 2019-12-17 | ShoCard, Inc. | Large data transfer using visual codes with feedback confirmation |
US10498541B2 (en) | 2017-02-06 | 2019-12-03 | ShocCard, Inc. | Electronic identification verification methods and systems |
EP3721578B1 (en) * | 2017-12-08 | 2022-09-07 | Ping Identity Corporation | Methods and systems for recovering data using dynamic passwords |
US10979227B2 (en) | 2018-10-17 | 2021-04-13 | Ping Identity Corporation | Blockchain ID connect |
US11082221B2 (en) | 2018-10-17 | 2021-08-03 | Ping Identity Corporation | Methods and systems for creating and recovering accounts using dynamic passwords |
CN111092866A (en) * | 2019-12-06 | 2020-05-01 | 航天信息股份有限公司 | Key management method and device based on Hadoop |
US11170130B1 (en) | 2021-04-08 | 2021-11-09 | Aster Key, LLC | Apparatus, systems and methods for storing user profile data on a distributed database for anonymous verification |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5673316A (en) * | 1996-03-29 | 1997-09-30 | International Business Machines Corporation | Creation and distribution of cryptographic envelope |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US20010019614A1 (en) * | 2000-10-20 | 2001-09-06 | Medna, Llc | Hidden Link Dynamic Key Manager for use in Computer Systems with Database Structure for Storage and Retrieval of Encrypted Data |
US6757903B1 (en) * | 1999-04-05 | 2004-06-29 | Gateway, Inc. | Object driven software architecture method and apparatus |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5164988A (en) * | 1991-10-31 | 1992-11-17 | International Business Machines Corporation | Method to establish and enforce a network cryptographic security policy in a public key cryptosystem |
US5373561A (en) | 1992-12-21 | 1994-12-13 | Bell Communications Research, Inc. | Method of extending the validity of a cryptographic certificate |
AP626A (en) | 1994-01-13 | 1998-01-16 | Certco Llc | Cryptographic system and method with key escrow feature. |
US5499298A (en) * | 1994-03-17 | 1996-03-12 | National University Of Singapore | Controlled dissemination of digital information |
US5495533A (en) * | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive |
JP3850058B2 (en) * | 1994-12-13 | 2006-11-29 | インターシア ソフトウェア エルエルシー | Cryptographic key system |
US5646997A (en) | 1994-12-14 | 1997-07-08 | Barton; James M. | Method and apparatus for embedding authentication information within digital data |
US6658568B1 (en) * | 1995-02-13 | 2003-12-02 | Intertrust Technologies Corporation | Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management |
US6035402A (en) | 1996-12-20 | 2000-03-07 | Gte Cybertrust Solutions Incorporated | Virtual certificate authority |
US6157723A (en) | 1997-03-03 | 2000-12-05 | Motorola, Inc. | Method and apparatus for secure communications with encryption key scheduling |
US6351812B1 (en) | 1998-09-04 | 2002-02-26 | At&T Corp | Method and apparatus for authenticating participants in electronic commerce |
AU6278299A (en) | 1998-10-01 | 2000-04-17 | University Of Maryland | Distributed shared key generation and management using fractional keys |
WO2000025466A1 (en) | 1998-10-23 | 2000-05-04 | L-3 Communications Corporation | Apparatus and methods for managing key material in heterogeneous cryptographic assets |
US6370250B1 (en) | 1998-10-29 | 2002-04-09 | International Business Machines Corporation | Method of authentication and storage of private keys in a public key cryptography system (PKCS) |
US6301585B1 (en) * | 1999-03-17 | 2001-10-09 | Sun Microsystems, Inc. | Redundancy elimination in the persistence of object graphs |
US6792424B1 (en) | 1999-04-23 | 2004-09-14 | International Business Machines Corporation | System and method for managing authentication and coherency in a storage area network |
AT274266T (en) | 1999-08-31 | 2004-09-15 | Motorola Inc | KEY MANAGEMENT METHOD FOR SECURE COMMUNICATION SYSTEMS |
-
2001
- 2001-12-21 US US10/037,153 patent/US7225161B2/en not_active Expired - Fee Related
-
2002
- 2002-12-20 AU AU2002361804A patent/AU2002361804A1/en not_active Abandoned
- 2002-12-20 WO PCT/US2002/040783 patent/WO2003061191A2/en not_active Application Discontinuation
-
2007
- 2007-03-26 US US11/728,619 patent/US20070189541A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5673316A (en) * | 1996-03-29 | 1997-09-30 | International Business Machines Corporation | Creation and distribution of cryptographic envelope |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6757903B1 (en) * | 1999-04-05 | 2004-06-29 | Gateway, Inc. | Object driven software architecture method and apparatus |
US20010019614A1 (en) * | 2000-10-20 | 2001-09-06 | Medna, Llc | Hidden Link Dynamic Key Manager for use in Computer Systems with Database Structure for Storage and Retrieval of Encrypted Data |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9338220B1 (en) | 2011-03-08 | 2016-05-10 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9356993B1 (en) | 2011-03-08 | 2016-05-31 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9852311B1 (en) | 2011-03-08 | 2017-12-26 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9292696B1 (en) | 2011-03-08 | 2016-03-22 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9300637B1 (en) | 2011-03-08 | 2016-03-29 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9667741B1 (en) | 2011-03-08 | 2017-05-30 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US11228566B1 (en) | 2011-03-08 | 2022-01-18 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9432342B1 (en) | 2011-03-08 | 2016-08-30 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9323818B1 (en) | 2011-03-08 | 2016-04-26 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9413526B1 (en) * | 2011-03-08 | 2016-08-09 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9288051B2 (en) | 2011-03-14 | 2016-03-15 | International Business Machines Corporation | Secure key management |
US9264230B2 (en) | 2011-03-14 | 2016-02-16 | International Business Machines Corporation | Secure key management |
US8619990B2 (en) | 2011-04-27 | 2013-12-31 | International Business Machines Corporation | Secure key creation |
US8619992B2 (en) | 2011-04-27 | 2013-12-31 | International Business Machines Corporation | Secure key creation |
US8789210B2 (en) | 2011-05-04 | 2014-07-22 | International Business Machines Corporation | Key usage policies for cryptographic keys |
US8634561B2 (en) * | 2011-05-04 | 2014-01-21 | International Business Machines Corporation | Secure key management |
US20130039494A1 (en) * | 2011-05-04 | 2013-02-14 | International Business Machines Corporation | Secure key management |
US8566913B2 (en) | 2011-05-04 | 2013-10-22 | International Business Machines Corporation | Secure key management |
US9306745B2 (en) * | 2011-05-04 | 2016-04-05 | International Business Machines Corporation | Secure key management |
US8856520B2 (en) | 2011-05-04 | 2014-10-07 | International Business Machines Corporation | Secure key management |
US20120281836A1 (en) * | 2011-05-04 | 2012-11-08 | International Business Machines Corporation | Secure key management |
US8755527B2 (en) | 2011-05-04 | 2014-06-17 | International Business Machines Corporation | Key management policies for cryptographic keys |
US8739297B2 (en) | 2011-05-04 | 2014-05-27 | International Business Machines Corporation | Key usage policies for cryptographic keys |
US8713709B2 (en) | 2011-05-04 | 2014-04-29 | International Business Machines Corporation | Key management policies for cryptographic keys |
US9288191B1 (en) | 2011-12-13 | 2016-03-15 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
US9231920B1 (en) | 2011-12-13 | 2016-01-05 | Ciphercloud, Inc. | System and method to anonymize data transmitted to a destination computing device |
TWI571093B (en) * | 2014-03-19 | 2017-02-11 | ||
CN104935553A (en) * | 2014-03-19 | 2015-09-23 | 北京安讯奔科技有限责任公司 | Unified identity authentication platform and authentication method |
US10764332B1 (en) | 2016-03-24 | 2020-09-01 | Snowflake Inc. | Systems, methods, and devices for securely managing network connections |
US10757141B2 (en) | 2016-03-24 | 2020-08-25 | Snowflake Inc. | Systems, methods, and devices for securely managing network connections |
US10594731B2 (en) | 2016-03-24 | 2020-03-17 | Snowflake Inc. | Systems, methods, and devices for securely managing network connections |
US10924516B2 (en) | 2016-03-24 | 2021-02-16 | Snowflake Inc. | Managing network connections based on their endpoints |
US11108829B2 (en) | 2016-03-24 | 2021-08-31 | Snowflake Inc. | Managing network connections based on their endpoints |
US11159574B2 (en) | 2016-03-24 | 2021-10-26 | Snowflake Inc. | Securely managing network connections |
WO2017165288A1 (en) * | 2016-03-24 | 2017-09-28 | Snowflake Computing Inc. | Systems, methods, and devices for securely managing network connections |
US11290496B2 (en) | 2016-03-24 | 2022-03-29 | Snowflake Inc. | Securely managing network connections |
US11368495B2 (en) | 2016-03-24 | 2022-06-21 | Snowflake Inc. | Securely managing network connections |
US11496524B2 (en) | 2016-03-24 | 2022-11-08 | Snowflake Inc. | Securely managing network connections |
Also Published As
Publication number | Publication date |
---|---|
WO2003061191A3 (en) | 2004-03-04 |
AU2002361804A8 (en) | 2003-07-30 |
AU2002361804A1 (en) | 2003-07-30 |
US20030120598A1 (en) | 2003-06-26 |
US7225161B2 (en) | 2007-05-29 |
WO2003061191A2 (en) | 2003-07-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7225161B2 (en) | Method and system for initializing a key management system | |
US7251635B2 (en) | Method and apparatus for managing a key management system | |
US11451386B2 (en) | Method and system for many-to-many symmetric cryptography and a network employing the same | |
JP5650348B2 (en) | System and method for securing data in motion | |
US5901227A (en) | Method and apparatus for implementing partial and complete optional key escrow | |
US7792300B1 (en) | Method and apparatus for re-encrypting data in a transaction-based secure storage system | |
US7587608B2 (en) | Method and apparatus for storing data on the application layer in mobile devices | |
US7565702B2 (en) | Password-based key management | |
US7526795B2 (en) | Data security for digital data storage | |
US20080077803A1 (en) | System and method for cryptographic data management | |
US20040175000A1 (en) | Method and apparatus for a transaction-based secure storage file system | |
US20100205446A1 (en) | Multi-level file digests | |
US7392402B2 (en) | Method and apparatus for data integration security | |
US20210119781A1 (en) | Systems and methods for re-using cold storage keys | |
US10990691B2 (en) | Secure deferred file decryption | |
US11095438B1 (en) | Database encryption key management | |
US11184158B1 (en) | Secure key exchange electronic transactions | |
TW201426395A (en) | Data security system and method | |
US20080091955A1 (en) | System and method for rotating data in crypto system | |
US20210349986A1 (en) | Binding a hardware security token to a host device to prevent exploitation by other host devices | |
US11206131B1 (en) | Post quantum unique key per token system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |