International Business Machines Corporation
HSM self-destruction in a hybrid cloud KMS solution

Last updated:

Abstract:

A method includes: federating, by a computer device, a proxy hardware security module from a physical hardware security module; storing, by the computer device, the proxy hardware security module; receiving, by the computer device, a first one of a plurality of periodic identifying communications from the physical hardware security module; and erasing, by the computer device, the proxy hardware security module as a result of the computer device not receiving a second one of the plurality of periodic identifying communications.

Status:
Grant
Type:

Utility

Filling date:

12 Jul 2019

Issue date:

16 Nov 2021