International Business Machines Corporation
Employing a protected key in performing operations

Last updated:

Abstract:

A select processor obtains a request to perform a requested operation. The request includes encrypted data and a protected key. The protected key is to be used by the select processor on behalf of an entity unauthorized to use the protected key. The encrypted data is decrypted using the protected key to obtain decrypted data. The requested operation is performed on the decrypted data to obtain resulting data. The resulting data is encrypted (e.g., using the protected key) to obtain encrypted resulting data. The encrypted resulting data is provided to a requestor of the request.

Status:
Grant
Type:

Utility

Filling date:

26 Mar 2019

Issue date:

28 Jun 2022