发明名称 DATA SECURITY USING REQUEST-SUPPLIED KEYS
摘要 Requests are submitted to a request processing entity where the requests include a cryptographic key to be used in fulfilling the request. The request processing entity, upon receipt of the request, extracts the key from the request and uses the key to perform one or more cryptographic operations to fulfill the request. The one or more cryptographic operations may include encryption/decryption of data that to be/is stored, in encrypted form, by a subsystem of the request processing entity. Upon fulfillment of the request, the request processing entity may perform one or more operations to lose access to the key in the request, thereby losing the ability to use the key.
申请公布号 US2016217290(A1) 申请公布日期 2016.07.28
申请号 US201615090315 申请日期 2016.04.04
申请人 Amazon Technologies, Inc. 发明人 Roth Gregory Branchek;Brandwine Eric Jason
分类号 G06F21/60;H04L9/32;H04L9/08 主分类号 G06F21/60
代理机构 代理人
主权项 1. A computer-implemented method, comprising: under the control of one or more computer systems of a service provider, the one or more computer systems configured with executable instructions, receive a request over a network, the request specifying data and including an encrypted cryptographic key;cause the encrypted cryptographic key to be decrypted, thereby resulting in a decrypted cryptographic key;perform one or more cryptographic operations on the specified data using the decrypted cryptographic key to fulfill the request; andprovide a result of performing the one or more cryptographic operations.
地址 Seattle WA US