Amazon.com, Inc.
Key export techniques

Last updated:

Abstract:

A computer system performs cryptographic operations as a service. The computer system is configured to allow users of the service to maintain control of their respective cryptographic material. The computer system uses inaccessible cryptographic material to encrypt a user's cryptographic material in a token that is then provided to the user. The user is unable to access a plaintext copy of the cryptographic material in the token, but can provide the token back to the service to cause the service to decrypt and use the cryptographic material.

Status:
Grant
Type:

Utility

Filling date:

4 Nov 2019

Issue date:

28 Jun 2022