Trusted data verification
    1.
    发明授权

    公开(公告)号:US10181953B1

    公开(公告)日:2019-01-15

    申请号:US14027843

    申请日:2013-09-16

    Abstract: Electronically signed data is persistently stored in data storage. After the passage of time, the data may be accessed and presented to a trusted entity for verification of the data. The trusted entity may have access to secret information used to sign the data. The trusted entity may use the secret information to verify an electronic signature of the data. One or more actions may be taken based at least in part on a response provided by the verification system.

    Key management and hardware security integration

    公开(公告)号:US10909250B2

    公开(公告)日:2021-02-02

    申请号:US15969695

    申请日:2018-05-02

    Abstract: A network-based service for the management of cryptographic key, such as a key management service (“KMS”), provides a web service application programming interface (“API”). Cryptographic keys managed by the service may be stored in a one or more network-connected cryptographic devices such as network-connected hardware security modules (“HSM”). The key management service maintains metadata associated with the cryptographic keys. When a request is received by the key management service, the key management service uses an identifier provided with the request to identify metadata associated with a cryptographic key used to fulfill the request. The key management service uses the metadata to identify a cryptographic device containing the cryptographic key. The key management service generates a set of commands for fulfilling the request such that the commands are compatible with a protocol implemented by the identified cryptographic device, and the set of commands are sent to the identified cryptographic device.

    TRUSTED DATA VERIFICATION
    3.
    发明申请

    公开(公告)号:US20190149339A1

    公开(公告)日:2019-05-16

    申请号:US16246331

    申请日:2019-01-11

    Abstract: Electronically signed data is persistently stored in data storage. After the passage of time, the data may be accessed and presented to a trusted entity for verification of the data. The trusted entity may have access to secret information used to sign the data. The trusted entity may use the secret information to verify an electronic signature of the data. One or more actions may be taken based at least in part on a response provided by the verification system.

    User defined application code for electronic mail

    公开(公告)号:US10999231B1

    公开(公告)日:2021-05-04

    申请号:US16369668

    申请日:2019-03-29

    Abstract: Method and systems are disclosed for providing a function as a service for an application. The application may comprise an email application. A user may define or select an application codes set for performing a specific functionality. The user may define rules that associate specific events with execution of the application code set. Upon detection of an event, a condition may be checked associated with the application. If the condition is satisfied, the application code set may be caused to be executed. The application code set may modify data, such as an email message.

    Epoch-based management of security credentials

    公开(公告)号:US09847983B1

    公开(公告)日:2017-12-19

    申请号:US14264897

    申请日:2014-04-29

    CPC classification number: H04L63/08 H04L63/0428 H04L63/068

    Abstract: Technologies are disclosed herein for epoch-based expiration of temporary security credentials. A temporary security credential is issued that identifies one or more epochs and that specifies one or more versions of the identified epochs during which the temporary security credential is valid. The temporary security credential may then be utilized to request access to another system, service or component. In order to determine whether such a request may be granted, current epoch versions for the epochs identified in the temporary security credential are obtained. The current epoch versions for the identified epochs are then compared to epoch versions specified in the temporary security credential to determine if the request can be granted. The current epoch versions may be periodically modified in order to expire previously issued temporary security credentials. A temporary security credential might also specify an expiration time after which the temporary security credential is no longer valid.

    Trusted data verification
    6.
    发明授权

    公开(公告)号:US11258611B2

    公开(公告)日:2022-02-22

    申请号:US16246331

    申请日:2019-01-11

    Abstract: Electronically signed data is persistently stored in data storage. After the passage of time, the data may be accessed and presented to a trusted entity for verification of the data. The trusted entity may have access to secret information used to sign the data. The trusted entity may use the secret information to verify an electronic signature of the data. One or more actions may be taken based at least in part on a response provided by the verification system.

    KEY MANAGEMENT SYSTEM AND METHOD
    8.
    发明申请

    公开(公告)号:US20190342079A1

    公开(公告)日:2019-11-07

    申请号:US15969695

    申请日:2018-05-02

    Abstract: A network-based service for the management of cryptographic key, such as a key management service (“KMS”), provides a web service application programming interface (“API”). Cryptographic keys managed by the service may be stored in a one or more network-connected cryptographic devices such as network-connected hardware security modules (“HSM”). The key management service maintains metadata associated with the cryptographic keys. When a request is received by the key management service, the key management service uses an identifier provided with the request to identify metadata associated with a cryptographic key used to fulfill the request. The key management service uses the metadata to identify a cryptographic device containing the cryptographic key. The key management service generates a set of commands for fulfilling the request such that the commands are compatible with a protocol implemented by the identified cryptographic device, and the set of commands are sent to the identified cryptographic device.

Patent Agency Ranking