Automatic key rotation
    12.
    发明授权

    公开(公告)号:US11372993B2

    公开(公告)日:2022-06-28

    申请号:US16673753

    申请日:2019-11-04

    Abstract: Requests submitted to a computer system are evaluated for compliance with policy to ensure data security. Plaintext and associated data are used as inputs into a cipher to produce ciphertext. Whether a result of decrypting the ciphertext can be provided in response to a request is determined based at least in part on evaluation of a policy that itself is based at least in part on the associated data. Other policies include automatic rotation of keys to prevent keys from being used in enough operations to enable cryptographic attacks intended to determine the keys.

    ACCESS CONTROL USING IMPERSONIZATION
    15.
    发明申请

    公开(公告)号:US20180183837A1

    公开(公告)日:2018-06-28

    申请号:US15900465

    申请日:2018-02-20

    Abstract: A first service submits a request to a second service on behalf of a customer of a service provider. The request may have been triggered by a request of the customer to the first service. To process the request, the second service evaluates one or more policies to determine whether fulfillment of the request is allowed by policy associated with the customer. The one or more policies may state one or more conditions on one or more services that played a role in submission of the request. If determined that the policy allows fulfillment of the request, the second service fulfills the request.

    VIRTUAL SERVICE PROVIDER ZONES
    16.
    发明申请

    公开(公告)号:US20180025168A1

    公开(公告)日:2018-01-25

    申请号:US15712043

    申请日:2017-09-21

    Abstract: A service proxy services as an application programming interface proxy to a service, which may involve data storage. When a request to store data is received by the service proxy, the service proxy encrypts the data and stores the data in encrypted form at the service. Similarly, when a request to retrieve data is received by the service proxy, the service proxy obtains encrypted data from the service and decrypts the data. The data may be encrypted using a key that is kept inaccessible to the service.

    FEDERATED KEY MANAGEMENT
    19.
    发明申请

    公开(公告)号:US20170093581A1

    公开(公告)日:2017-03-30

    申请号:US15376451

    申请日:2016-12-12

    Abstract: A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by a requestor using a key such that the system processing the request can verify that the requestor has the key and that the information is authentic. The information may include information that identifies a holder of a key needed for processing the request, where the holder of the key can be the system or another, possibly third party, system. Requests to decrypt data may be processed to ensure that a certain amount of time passes before access to the decrypted data is provided, thereby providing an opportunity to cancel such requests and/or otherwise mitigate potential security breaches.

Patent Agency Ranking