Method and apparatus for managing a key management system

key management technology, applied in the field of methods and apparatus for managing a key management system, can solve the problems of storing information in encrypted form and unable to protect security information when it is accessed, and the security information itself is typically not secur

Inactive Publication Date: 2007-06-07
SCHLUMBERGER TECH CORP
View PDF19 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0012] In general, in one aspect, the invention relates to an apparatus for retrieving a value secured in a key management system comprising for receiving a request for the value secured in the key management system, means for searching for a key corresponding to the value in a decoded key list, and means for retrieving a tuple corresponding to the value, if the key corresponding to the value is in the decoded key list.
[0013] In general, in one aspect, the invention relates to an apparatus for retrieving a value secured in a key management system comprising means for receiving a request for the value secured in the key management system, means for retrieving a serialized file from a key management system storage, means for de-serializing the serialized file producing a de-serialized file, means for decoding an encoded key list i

Problems solved by technology

This has resulted in some software systems, i.e., Financial Software Systems, requiring security information as part of their operation.
While security information is used to ensure the security of particular software systems and the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for managing a key management system
  • Method and apparatus for managing a key management system
  • Method and apparatus for managing a key management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Exemplary embodiments of the invention will be described with reference to the accompanying drawings. Like items in the drawings are shown with the same reference numbers.

[0029] In the following detailed description of the invention, numerous specific details are set forth in order to provide a more thorough understanding of the invention. However, it will be apparent to one of ordinary skill in the art that the invention may be practiced without these specific details. In other instances, well-known features have not been described in detail to avoid obscuring the invention.

[0030] The invention relates to management of a key management system. Further, the invention relates to a method for retrieving data secured within the key management system. Further, the invention relates to methods for managing data secured within the key management system.

[0031]FIG. 2 illustrates an exemplary network system in accordance with one or more embodiments of the present invention. The ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A network system for key management, including a server, a key management system providing process logic for key management system management located on the server, a key management system storage providing a secure data storage for the key management system, an application using the key management system to manage an application key, and an interface providing a means for managing the key management system.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS [0001] This application claims benefit of U.S. non-Provisional Application Ser. No. 10 / 037,153 filed Dec. 21, 2001 entitled “Method and System for Initializing a Key Management System”, in the names of Chui-Shan Teresa Lam and Jameel ur Rahman Syed.BACKGROUND OF INVENTION [0002] Connection of company networks to the Internet has resulted in a requirement for increased network security. This has resulted in some software systems, i.e., Financial Software Systems, requiring security information as part of their operation. Security information includes such information as encryption / decryption keys for encrypted databases, administrator passwords to access external resources such as a directory server, etc. Security information is typically stored in a configuration file that is accessible by the software systems. [0003] While security information is used to ensure the security of particular software systems and the data they use, security inform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00G06Q10/10G06Q20/02G06Q20/38H04L9/08H04L29/06
CPCG06Q10/103G06Q20/027G06Q20/3829H04L63/06H04L63/12H04L9/0822H04L9/0891
Inventor LAM, CHUI-SHAN TERESASYED, JAMEEL UR RAHMAN
Owner SCHLUMBERGER TECH CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products