-
公开(公告)号:US10587405B2
公开(公告)日:2020-03-10
申请号:US15947690
申请日:2018-04-06
Applicant: Amazon Technologies, Inc.
Abstract: A request a request to perform a cryptographic operation is received, the request including a first identifier assigned to a key group, the key group comprising a plurality of second identifiers, with the plurality of second identifiers corresponding to a plurality of cryptographic keys. A second identifier is determined, according to a distribution scheme, from the plurality of second identifiers, and the cryptographic operation is performed using a cryptographic key of the plurality of cryptographic keys that corresponds to the second identifier that was determined.
-
公开(公告)号:US09942036B2
公开(公告)日:2018-04-10
申请号:US15250738
申请日:2016-08-29
Applicant: Amazon Technologies, Inc.
CPC classification number: H04L9/0891 , H04L9/088 , H04L9/14 , H04L63/065
Abstract: A request a request to perform a cryptographic operation is received, the request including a first identifier assigned to a key group, the key group comprising a plurality of second identifiers, with the plurality of second identifiers corresponding to a plurality of cryptographic keys. A second identifier is determined, according to a distribution scheme, from the plurality of second identifiers, and the cryptographic operation is performed using a cryptographic key of the plurality of cryptographic keys that corresponds to the second identifier that was determined.
-
公开(公告)号:US20170093569A1
公开(公告)日:2017-03-30
申请号:US15250738
申请日:2016-08-29
Applicant: Amazon Technologies, Inc.
CPC classification number: H04L9/0891 , H04L9/088 , H04L9/14 , H04L63/065
Abstract: A request a request to perform a cryptographic operation is received, the request including a first identifier assigned to a key group, the key group comprising a plurality of second identifiers, with the plurality of second identifiers corresponding to a plurality of cryptographic keys. A second identifier is determined, according to a distribution scheme, from the plurality of second identifiers, and the cryptographic operation is performed using a cryptographic key of the plurality of cryptographic keys that corresponds to the second identifier that was determined.
-
-