http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2019212773-A1

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_6963a306ec33074f03fcf967dc0b4148
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0841
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-72
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-602
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-083
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-06
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0897
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0841
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-60
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-08
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06
filingDate 2019-04-19-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_872f0813ebac1454aded227e64034057
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_9e1d631631cef122071b6def9cdfb4f0
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_ffbe8a9b546536fae03b3fc8b8c1c2a0
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_8a82d476d5318914c485a2d7a5fbd96a
publicationDate 2019-11-07-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber WO-2019212773-A1
titleOfInvention Key management system and method
abstract A network-based service for the management of cryptographic key, such as a key management service ("KMS"), provides a web service application programming interface ("API"). Cryptographic keys managed by the service may be stored in a one or more network connected cryptographic devices such as network-connected hardware security modules ("HSM"). The key management service maintains metadata associated with the cryptographic keys. When a request is received by the key management service, the key management service uses an identifier provided with the request to identify metadata associated with a cryptographic key used to fulfill the request. The key management service uses the metadata to identify a cryptographic device containing the cryptographic key. The key management service generates a set of commands for fulfilling the request such that the commands are compatible with a protocol implemented by the identified cryptographic device, and the set of commands are sent to the identified cryptographic device.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2022254274-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11575508-B2
priorityDate 2018-05-02-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2012131354-A1
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/taxonomy/TAXID37610
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID415859406
http://rdf.ncbi.nlm.nih.gov/pubchem/anatomy/ANATOMYID37610
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID164073

Total number of triples: 29.