Amazon.com, Inc.
Key management for expiring ciphertexts
Last updated:
Abstract:
Techniques described herein enhance information security in contexts that utilize key management systems and cryptographic keys. A cryptographic structure is utilized to maintain cryptographic keys with associated expiration times such that after an expiration time associated with a cryptographic key has passed, the cryptographic key is no longer accessible.
Status:
Grant
Type:
Utility
Filling date:
19 Jun 2019
Issue date:
1 Feb 2022