Amazon.com, Inc.
Key management for expiring ciphertexts

Last updated:

Abstract:

Techniques described herein enhance information security in contexts that utilize key management systems and cryptographic keys. A cryptographic structure is utilized to maintain cryptographic keys with associated expiration times such that after an expiration time associated with a cryptographic key has passed, the cryptographic key is no longer accessible.

Status:
Grant
Type:

Utility

Filling date:

19 Jun 2019

Issue date:

1 Feb 2022