Optimizing use of hardware security modules

Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: PECK JOHN T, YELLEPEDDY KRISHNA K, HAZLEWOOD KRISTIN M, MORGANTI JOHN A
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator PECK JOHN T
YELLEPEDDY KRISHNA K
HAZLEWOOD KRISTIN M
MORGANTI JOHN A
description Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US8675875B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US8675875B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US8675875B23</originalsourceid><addsrcrecordid>eNrjZND2LyjJzM2sysxLVygtTlXIT1PISCxKKU8sSlUoTk0uLcosqVTIzU8pzUkt5mFgTUvMKU7lhdLcDApuriHOHrqpBfnxqcUFicmpeakl8aHBFmbmphbmpk5GxkQoAQA9-imr</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Optimizing use of hardware security modules</title><source>esp@cenet</source><creator>PECK JOHN T ; YELLEPEDDY KRISHNA K ; HAZLEWOOD KRISTIN M ; MORGANTI JOHN A</creator><creatorcontrib>PECK JOHN T ; YELLEPEDDY KRISHNA K ; HAZLEWOOD KRISTIN M ; MORGANTI JOHN A</creatorcontrib><description>Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2014</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20140318&amp;DB=EPODOC&amp;CC=US&amp;NR=8675875B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,309,781,886,25568,76551</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20140318&amp;DB=EPODOC&amp;CC=US&amp;NR=8675875B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>PECK JOHN T</creatorcontrib><creatorcontrib>YELLEPEDDY KRISHNA K</creatorcontrib><creatorcontrib>HAZLEWOOD KRISTIN M</creatorcontrib><creatorcontrib>MORGANTI JOHN A</creatorcontrib><title>Optimizing use of hardware security modules</title><description>Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2014</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZND2LyjJzM2sysxLVygtTlXIT1PISCxKKU8sSlUoTk0uLcosqVTIzU8pzUkt5mFgTUvMKU7lhdLcDApuriHOHrqpBfnxqcUFicmpeakl8aHBFmbmphbmpk5GxkQoAQA9-imr</recordid><startdate>20140318</startdate><enddate>20140318</enddate><creator>PECK JOHN T</creator><creator>YELLEPEDDY KRISHNA K</creator><creator>HAZLEWOOD KRISTIN M</creator><creator>MORGANTI JOHN A</creator><scope>EVB</scope></search><sort><creationdate>20140318</creationdate><title>Optimizing use of hardware security modules</title><author>PECK JOHN T ; YELLEPEDDY KRISHNA K ; HAZLEWOOD KRISTIN M ; MORGANTI JOHN A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US8675875B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2014</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>PECK JOHN T</creatorcontrib><creatorcontrib>YELLEPEDDY KRISHNA K</creatorcontrib><creatorcontrib>HAZLEWOOD KRISTIN M</creatorcontrib><creatorcontrib>MORGANTI JOHN A</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>PECK JOHN T</au><au>YELLEPEDDY KRISHNA K</au><au>HAZLEWOOD KRISTIN M</au><au>MORGANTI JOHN A</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Optimizing use of hardware security modules</title><date>2014-03-18</date><risdate>2014</risdate><abstract>Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one or more rules, and subsequent to the evaluation, reclassifying the stored key for relocation, encrypting the reclassified key using a key-encryption key; relocating the reclassified key into the second, lower-security storage device, and storing the key-encryption key in the first storage device.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US8675875B2
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Optimizing use of hardware security modules
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-16T20%3A01%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=PECK%20JOHN%20T&rft.date=2014-03-18&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS8675875B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true