Amazon.com, Inc.
Trust framework against systematic cryptographic

Last updated:

Abstract:

A computing system receives encrypted data that can be decrypted by a first secret to obtain data, wherein the first secret is securely stored by the system, determines that the data encodes a second secret and executable code usable to perform cryptographic operations, and run the executable code to perform the cryptographic operations. The first secret may be a one-time pad.

Status:
Grant
Type:

Utility

Filling date:

18 Jun 2018

Issue date:

19 Oct 2021