Amazon.com, Inc.
Trust framework against systematic cryptographic
Last updated:
Abstract:
A computing system receives encrypted data that can be decrypted by a first secret to obtain data, wherein the first secret is securely stored by the system, determines that the data encodes a second secret and executable code usable to perform cryptographic operations, and run the executable code to perform the cryptographic operations. The first secret may be a one-time pad.
Status:
Grant
Type:
Utility
Filling date:
18 Jun 2018
Issue date:
19 Oct 2021