| CPC G06F 21/602 (2013.01) [G06F 21/6209 (2013.01); H04L 9/0822 (2013.01); H04L 9/3226 (2013.01); H04L 63/0428 (2013.01); H04L 63/06 (2013.01); H04L 9/0819 (2013.01); H04L 9/3242 (2013.01); H04L 9/3247 (2013.01); H04L 2209/76 (2013.01)] | 21 Claims |

|
1. A computer-implemented method, comprising:
obtaining a cryptographic key;
providing, by a user to a computer system of a service provider, a request over a network, the request:
including the cryptographic key, wherein the cryptographic key is a symmetric key; and
specifying data upon which to perform an encryption operation using the cryptographic key;
obtaining, by the user from the computer system, a response indicating fulfillment of the request to perform the encryption operation on the data, wherein the request is authenticated using a different cryptographic key;
further providing, by the user, a different request over the network, the different request including the cryptographic key and indicating the data upon which to perform a decryption operation using the cryptographic key to generate decrypted data; and
further obtaining, by the user, a different response indicating that the different request has been fulfilled.
|