Tokenized Hardware Security Module
A hardware security module and hardware technology, which is applied to secure communication devices, computer security devices, and key distribution, and can solve problems such as insecure encryption key storage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] The hardware security module allows users to encapsulate cryptographic secrets and authorizes which users are permitted to perform cryptographic operations on the cryptographic secrets. When a hardware security module is integrated within a cloud environment (e.g., a distributed system) and users store their cryptographic keys in the cloud environment, the provider of the cloud environment excessively has more than all cryptographic keys stored on behalf of the user full privileges and thus defeats the purpose of using a hardware security module in controlling and restricting access to cryptographic keys. Embodiments herein relate to requiring a user to request that a hardware security module integrated within a cloud environment process cryptographic operations to provide a packaged ( wrapped) cryptographic key. The hardware security module can verify that the hardware security module has generated and signed an authorization token. The hardware security module furth...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


