The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 22, 2019

Filed:

Aug. 04, 2014
Applicant:

Oracle International Corporation, Redwood City, CA (US);

Inventors:

Sebastian J. Hans, Berlin, DE;

Eric M. Vetillard, Valbonne, FR;

Assignee:

Oracle International Corporation, Redwood City, CA (US);

Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 9/08 (2006.01); G06F 12/14 (2006.01); G06F 21/72 (2013.01); G06F 21/77 (2013.01);
U.S. Cl.
CPC ...
G06F 12/1408 (2013.01); G06F 21/72 (2013.01); G06F 21/77 (2013.01); H04L 9/0861 (2013.01); H04L 9/0869 (2013.01); H04L 9/0877 (2013.01); G06F 12/14 (2013.01); H04L 9/08 (2013.01);
Abstract

Secure key derivation within a virtualized execution environment may involve a key derivation module executing within a platform layer of the execution environment. An application executing within an application layer of the execution environment may access the key derivation module in order to generate a cryptographic key according to a key derivation function. Instead of being returned to the application, the derived key may be stored within a secure storage area of the execution environment without being stored, even temporarily in the application layer, or other non-secure areas, of the execution environment. The application may receive a reference to the derived key usable by other cryptographic processes. The application may pass the key reference to a method of a cryptographic module and the cryptographic module may use the key reference to access the derived key from the secure storage for use in performing any of various cryptographic processes.


Find Patent Forward Citations

Loading…