Method and system for initialzing a key management system

a key management system and key management technology, applied in the field of key management system initialization, can solve the problems of not protecting security information when it is accessed, and the security information itself is typically not secur

Inactive Publication Date: 2007-08-16
SCHLUMBERGER OMNES
View PDF4 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This has resulted in some software systems, i.e. Financial Software Systems, requiring security information as part of their operation.
While security information is used to ensure the security of particular software systems and the data they use, security information itself is typically not secure.
While this will protect the security information when it is not being used, it does not protect the security information when it is accessed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for initialzing a key management system
  • Method and system for initialzing a key management system
  • Method and system for initialzing a key management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In the following detailed description of the invention, numerous specific details are set forth in order to provide a more thorough understanding of the invention. However, it will be apparent to one of ordinary skill in the art that the invention may be practiced without these specific details. In other instances, well-known features have not been described in detail to avoid obscuring the invention.

[0023] The present invention relates to initializing a key management system. Further, the present invention relates to a method for securing keys within the key management system. Further, the present invention relates to a method for storing keys within the key management system.

[0024]FIG. 2 illustrates an exemplary network system in accordance with one or more embodiments of the present invention. The network system typically includes a web server (22), and a client computer (28) containing a web browser (30). Additionally, the web server (22) is typically operatively connec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A network system for key management including a server, a key management system providing process logic for key management system initialization located on the server, a key management system storage providing a secure data storage for the key management system, and an interface providing a means for inputting data into the key management system.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS [0001] This application is a continuation of U.S. patent application No. 10 / 037,153, filed Dec. 21, 2001.BACKGROUND OF INVENTION [0002] Connection of company networks to the Internet has resulted in a requirement for increased network security. This has resulted in some software systems, i.e. Financial Software Systems, requiring security information as part of their operation. Security information includes such information as encryption / decryption keys for encrypted databases, administrator passwords to access external resources such as a directory server, etc. Security information is typically stored in a configuration file that is accessible by the software systems. [0003] While security information is used to ensure the security of particular software systems and the data they use, security information itself is typically not secure. Security information typically stored in a configuration file is in “clear text” i.e. text in ASCII format....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/00H04L9/08H04L29/06
CPCG06Q20/367G06Q20/382H04L63/0428H04L2209/60H04L9/0822H04L9/083H04L9/0894H04L63/06
Inventor LAM, CHUI-SHAN TERESASYED, JAMEEL UR RAHMAN
Owner SCHLUMBERGER OMNES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products