| CPC G06F 21/602 (2013.01) [G06F 21/6209 (2013.01); H04L 9/0822 (2013.01); H04L 9/3226 (2013.01); H04L 63/0428 (2013.01); H04L 63/06 (2013.01); H04L 9/0819 (2013.01); H04L 9/3242 (2013.01); H04L 9/3247 (2013.01); H04L 2209/76 (2013.01)] | 21 Claims | 

| 
               1. A computer-implemented method, comprising: 
            obtaining a cryptographic key; 
                providing, by a user to a computer system of a service provider, a request over a network, the request: 
                including the cryptographic key, wherein the cryptographic key is a symmetric key; and 
                  specifying data upon which to perform an encryption operation using the cryptographic key; 
                obtaining, by the user from the computer system, a response indicating fulfillment of the request to perform the encryption operation on the data, wherein the request is authenticated using a different cryptographic key; 
                further providing, by the user, a different request over the network, the different request including the cryptographic key and indicating the data upon which to perform a decryption operation using the cryptographic key to generate decrypted data; and 
                further obtaining, by the user, a different response indicating that the different request has been fulfilled. 
               |