-
公开(公告)号:US09628274B1
公开(公告)日:2017-04-18
申请号:US14542288
申请日:2014-11-14
Applicant: Amazon Technologies, Inc.
Inventor: Jason Jenks , Tushaar Sethi , Brandon B. Low , Jason Cetina , Jesper Mikael Johansson , Waylon Brunette , Hanson Char , Spencer Proffit
CPC classification number: H04L9/0877 , G06Q20/3226 , G06Q20/3823 , G06Q20/385 , G06Q20/409 , H04L9/0866 , H04L9/0894 , H04L29/06 , H04L63/06 , H04L2209/127 , H04L2463/062
Abstract: A method of using a hardware security module and an adjunct application programming interface to harden tokenization security and encryption key rotation is disclosed. In various embodiments, the method comprises receiving encrypted data at a processor of a computer system, decrypting the encrypted data to cleartext in the processor, and issuing a unique token associated with the data.
-
公开(公告)号:US20150278804A1
公开(公告)日:2015-10-01
申请号:US14733795
申请日:2015-06-08
Applicant: Amazon Technologies, Inc.
Inventor: Jason Jenks , Brandon B. Low , Hanson Char , Peter S. Vosshall , Waylon Brunette
CPC classification number: G06Q20/3674 , G06Q20/382 , G06Q20/3823 , G06Q20/401 , H04L9/3226
Abstract: Disclosed is secure decryption and business rule validation of encrypted confidential data within a hardware security module (HSM). The validation may include the use of a Bloom filter stored and executing within the HSM. The return order of encrypted data within the HSM as well as requests for external data relating to validation may be randomized to further harden against correlation attacks.
Abstract translation: 披露了硬件安全模块(HSM)内的加密机密数据的安全解密和业务规则验证。 验证可以包括使用在HSM内存储和执行的Bloom过滤器。 HSM内加密数据的返回顺序以及与验证相关的外部数据请求可能被随机化以进一步加强相关攻击。
-
公开(公告)号:US10885516B2
公开(公告)日:2021-01-05
申请号:US14733795
申请日:2015-06-08
Applicant: Amazon Technologies, Inc.
Inventor: Jason Jenks , Brandon B. Low , Hanson Char , Peter S. Vosshall , Waylon Brunette
Abstract: Disclosed is secure decryption and business rule validation of encrypted confidential data within a hardware security module (HSM). The validation may include the use of a Bloom filter stored and executing within the HSM. The return order of encrypted data within the HSM as well as requests for external data relating to validation may be randomized to further harden against correlation attacks.
-
-