SECURE MANAGEMENT OF KEYS IN A KEY REPOSITORY
    3.
    发明申请
    SECURE MANAGEMENT OF KEYS IN A KEY REPOSITORY 有权
    密钥管理中的密钥管理

    公开(公告)号:US20120213369A1

    公开(公告)日:2012-08-23

    申请号:US13459675

    申请日:2012-04-30

    IPC分类号: H04L9/00

    摘要: A method for managing keys in a computer memory including receiving a request to store a first key to a first key repository, storing the first key to a second key repository in response to the request, and storing the first key from the second key repository to the first key repository within said computer memory based on a predetermined periodicity.

    摘要翻译: 一种用于管理计算机存储器中的密钥的方法,包括接收将第一密钥存储到第一密钥存储库的请求,以响应于该请求将第一密钥存储到第二密钥存储库,以及将第一密钥从第二密钥存储库存储到 基于预定周期的所述计算机存储器内的第一密钥库。

    Managing keys used for encrypting data
    4.
    发明授权
    Managing keys used for encrypting data 有权
    管理用于加密数据的密钥

    公开(公告)号:US09378388B2

    公开(公告)日:2016-06-28

    申请号:US12763811

    申请日:2010-04-20

    摘要: A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information.

    摘要翻译: 一种用于管理加密信息的方法,数据处理系统和计算机程序产品。 响应于从请求者接收到对密码信息的请求,确定是否创建加密信息时的第一时间戳是否比密码信息的备份的第二时间戳更新。 加密信息用于加密数据。 响应于密码信息创建的第一时间戳比密码信息的备份的第二时间戳更新的确定,防止加密信息被提供给请求者。

    Secure management of keys in a key repository
    5.
    发明授权
    Secure management of keys in a key repository 有权
    密钥存储库中密钥的安全管理

    公开(公告)号:US08630418B2

    公开(公告)日:2014-01-14

    申请号:US12984869

    申请日:2011-01-05

    摘要: A system or computer usable program product for managing keys in a computer memory including receiving a request to store a first key to a first key repository, storing the first key to a second key repository in response to the request, and storing the first key from the second key repository to the first key repository within said computer memory based on a predetermined periodicity.

    摘要翻译: 一种用于管理计算机存储器中的密钥的系统或计算机可用程序产品,包括接收将第一密钥存储到第一密钥存储库的请求,以响应于该请求将第一密钥存储到第二密钥存储库,并将第一密钥从 基于预定周期性,将所述计算机存储器内的所述第一密钥库的所述第二密钥存储库。

    Optimizing use of hardware security modules
    6.
    发明授权
    Optimizing use of hardware security modules 有权
    优化使用硬件安全模块

    公开(公告)号:US08675875B2

    公开(公告)日:2014-03-18

    申请号:US12782551

    申请日:2010-05-18

    IPC分类号: H04L9/00

    摘要: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.

    摘要翻译: 加密密钥存储硬件安全模块的使用在具有第一稀缺的高安全密钥存储设备和第二更多的低安全密钥存储设备的系统中被优化,包括通过初始地存储密钥来将密码密钥保护到较高的安全级别 在所述第一存储装置中,响应于事件,针对一个或多个规则评估所述存储的密钥,并且在所述评估之后,重新分类存储的密钥进行重新定位,使用密钥加密密钥加密重分类密钥; 将重分类密钥重定位到第二低安全性存储设备中,并将密钥加密密钥存储在第一存储设备中。

    Optimizing Use of Hardware Security Modules
    7.
    发明申请
    Optimizing Use of Hardware Security Modules 有权
    优化使用硬件安全模块

    公开(公告)号:US20110289324A1

    公开(公告)日:2011-11-24

    申请号:US12782551

    申请日:2010-05-18

    IPC分类号: G06F12/14

    摘要: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.

    摘要翻译: 加密密钥存储硬件安全模块的使用在具有第一稀缺的高安全密钥存储设备和第二更多的低安全密钥存储设备的系统中被优化,包括通过初始地存储密钥来将密码密钥保护到较高的安全级别 在所述第一存储装置中,响应于事件,针对一个或多个规则评估所述存储的密钥,并且在所述评估之后,重新分类存储的密钥进行重新定位,使用密钥加密密钥加密重分类密钥; 将重分类密钥重定位到第二低安全性存储设备中,并将密钥加密密钥存储在第一存储设备中。

    METHOD AND APPARATUS FOR MANAGING KEYS USED FOR ENCRYPTING DATA
    8.
    发明申请
    METHOD AND APPARATUS FOR MANAGING KEYS USED FOR ENCRYPTING DATA 有权
    用于管理用于加密数据的密钥的方法和装置

    公开(公告)号:US20110258458A1

    公开(公告)日:2011-10-20

    申请号:US12763811

    申请日:2010-04-20

    IPC分类号: G06F21/00

    摘要: A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information.

    摘要翻译: 一种用于管理加密信息的方法,数据处理系统和计算机程序产品。 响应于从请求者接收到对密码信息的请求,确定是否创建加密信息时的第一时间戳是否比密码信息的备份的第二时间戳更新。 加密信息用于加密数据。 响应于密码信息创建的第一时间戳比密码信息的备份的第二时间戳更新的确定,防止加密信息被提供给请求者。

    Optimizing Use of Hardware Security Modules
    9.
    发明申请
    Optimizing Use of Hardware Security Modules 有权
    优化使用硬件安全模块

    公开(公告)号:US20120159192A1

    公开(公告)日:2012-06-21

    申请号:US13409717

    申请日:2012-03-01

    IPC分类号: G06F12/14

    摘要: Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.

    摘要翻译: 加密密钥存储硬件安全模块的使用在具有第一稀缺的高安全密钥存储设备和第二更多的低安全密钥存储设备的系统中被优化,包括通过初始地存储密钥来将密码密钥保护到较高的安全级别 在所述第一存储装置中,响应于事件,针对一个或多个规则评估所述存储的密钥,并且在所述评估之后,重新分类存储的密钥进行重新定位,使用密钥加密密钥加密重分类密钥; 将重分类密钥重定位到第二低安全性存储设备中,并将密钥加密密钥存储在第一存储设备中。

    Managing keys used for encrypting data
    10.
    发明授权
    Managing keys used for encrypting data 有权
    管理用于加密数据的密钥

    公开(公告)号:US09594920B2

    公开(公告)日:2017-03-14

    申请号:US13424428

    申请日:2012-03-20

    摘要: A method, a data processing system, and a computer program product for managing cryptographic information. A determination is made as to whether a first time stamp of when cryptographic information was created is more recent than a second time stamp of a backup of the cryptographic information in response to receiving a request for the cryptographic information from a requester. The cryptographic information is used to encrypt data. The cryptographic information is prevented from being provided to the requester in response to a determination that the first time stamp of cryptographic information creation is more recent than the second time stamp of the backup of the cryptographic information.

    摘要翻译: 一种用于管理加密信息的方法,数据处理系统和计算机程序产品。 响应于从请求者接收到对密码信息的请求,确定是否创建加密信息时的第一时间戳是否比密码信息的备份的第二时间戳更新。 加密信息用于加密数据。 响应于密码信息创建的第一时间戳比密码信息的备份的第二时间戳更新的确定,防止加密信息被提供给请求者。