Safeguarding cryptographic keys

Aspects of the invention include generating a cryptographic key to restrict access to a resource. The cryptographic key being defined by a key token. An exemplary method includes designating a storage field in metadata of the key token, in metadata of a cryptographic key data set record that include...

Full description

Saved in:
Bibliographic Details
Main Authors Kenneth Kerr, Robert Petti, David Rossi, Eysha Shirrine Powers
Format Patent
LanguageEnglish
Published 29.05.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Aspects of the invention include generating a cryptographic key to restrict access to a resource. The cryptographic key being defined by a key token. An exemplary method includes designating a storage field in metadata of the key token, in metadata of a cryptographic key data set record that includes the key token, or in a resource access control database that controls use of the cryptographic key for inclusion of an indicator that the cryptographic key may or may not be deleted or modified. The indicator in the designated storage field is set to indicate whether or not the cryptographic key may be deleted or modified.
Bibliography:Application Number: GB20220013457