Safeguarding cryptographic keys
Aspects of the invention include generating a cryptographic key to restrict access to a resource. The cryptographic key being defined by a key token. An exemplary method includes designating a storage field in metadata of the key token, in metadata of a cryptographic key data set record that include...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | English |
Published |
29.05.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Aspects of the invention include generating a cryptographic key to restrict access to a resource. The cryptographic key being defined by a key token. An exemplary method includes designating a storage field in metadata of the key token, in metadata of a cryptographic key data set record that includes the key token, or in a resource access control database that controls use of the cryptographic key for inclusion of an indicator that the cryptographic key may or may not be deleted or modified. The indicator in the designated storage field is set to indicate whether or not the cryptographic key may be deleted or modified. |
---|---|
Bibliography: | Application Number: GB20220013457 |