SG10201900294YA - System and method for encryption key management, federation and distribution - Google Patents

System and method for encryption key management, federation and distribution

Info

Publication number
SG10201900294YA
SG10201900294YA SG10201900294YA SG10201900294YA SG10201900294YA SG 10201900294Y A SG10201900294Y A SG 10201900294YA SG 10201900294Y A SG10201900294Y A SG 10201900294YA SG 10201900294Y A SG10201900294Y A SG 10201900294YA SG 10201900294Y A SG10201900294Y A SG 10201900294YA
Authority
SG
Singapore
Prior art keywords
security object
policy engine
federation
distribution
encryption key
Prior art date
Application number
SG10201900294YA
Inventor
Charles White
Joseph Brand
Stephen Edwards
Original Assignee
Fornetix Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fornetix Llc filed Critical Fornetix Llc
Publication of SG10201900294YA publication Critical patent/SG10201900294YA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computational Linguistics (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

Systems and methods are described for orchestrating a security object, including, for example, defining and storing a plurality of policies in a database coupled to a policy engine and receiving, by the policy engine, the security object and at least one object attribute associated with the security object. In addition, the policy engine determines the acceptability of the security object based, at least in part, on the at least one object attribute and at least one of the plurality of policies corresponding to the at least one object attribute. The security object to at least one communication device associated with the policy engine is distributed when the security object is determined to be acceptable. The at least one communication device establishes communication based, at least in part, on the security object. [Fig. 1]
SG10201900294YA 2013-10-07 2014-10-03 System and method for encryption key management, federation and distribution SG10201900294YA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201361887662P 2013-10-07 2013-10-07
US201461950362P 2014-03-10 2014-03-10

Publications (1)

Publication Number Publication Date
SG10201900294YA true SG10201900294YA (en) 2019-02-27

Family

ID=52778054

Family Applications (3)

Application Number Title Priority Date Filing Date
SG11201602711WA SG11201602711WA (en) 2013-10-07 2014-10-03 System and method for encryption key management, federation and distribution
SG10202005578QA SG10202005578QA (en) 2013-10-07 2014-10-03 System and method for encryption key management, federation and distribution
SG10201900294YA SG10201900294YA (en) 2013-10-07 2014-10-03 System and method for encryption key management, federation and distribution

Family Applications Before (2)

Application Number Title Priority Date Filing Date
SG11201602711WA SG11201602711WA (en) 2013-10-07 2014-10-03 System and method for encryption key management, federation and distribution
SG10202005578QA SG10202005578QA (en) 2013-10-07 2014-10-03 System and method for encryption key management, federation and distribution

Country Status (13)

Country Link
US (5) US9729577B2 (en)
EP (1) EP3055947A4 (en)
JP (1) JP6556706B2 (en)
CN (2) CN111523108B (en)
AU (3) AU2014332244A1 (en)
BR (1) BR112016007660B1 (en)
CA (1) CA2926651C (en)
EA (1) EA035011B1 (en)
IL (1) IL244948B (en)
MX (1) MX359594B (en)
MY (2) MY181303A (en)
SG (3) SG11201602711WA (en)
WO (1) WO2015054083A1 (en)

Families Citing this family (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9224000B1 (en) 2011-06-14 2015-12-29 Ionic Security, Inc. Systems and methods for providing information security using context-based keys
MY181303A (en) * 2013-10-07 2020-12-21 Fornetix Llc System and method for encryption key management, federation and distribution
US9647998B2 (en) 2014-03-21 2017-05-09 Venafi, Inc. Geo-fencing cryptographic key material
US9680827B2 (en) 2014-03-21 2017-06-13 Venafi, Inc. Geo-fencing cryptographic key material
US9577823B2 (en) * 2014-03-21 2017-02-21 Venafi, Inc. Rule-based validity of cryptographic key material
US9531533B2 (en) * 2014-03-21 2016-12-27 Venafi, Inc. Rule-based validity of cryptographic key material
US9686244B2 (en) * 2014-03-21 2017-06-20 Venafi, Inc. Rule-based validity of cryptographic key material
US9654922B2 (en) * 2014-03-21 2017-05-16 Venafi, Inc. Geo-fencing cryptographic key material
US10205593B2 (en) * 2014-07-17 2019-02-12 Venafi, Inc. Assisted improvement of security reliance scores
US9608809B1 (en) 2015-02-05 2017-03-28 Ionic Security Inc. Systems and methods for encryption and provision of information security using platform services
US10630686B2 (en) 2015-03-12 2020-04-21 Fornetix Llc Systems and methods for organizing devices in a policy hierarchy
US10560440B2 (en) 2015-03-12 2020-02-11 Fornetix Llc Server-client PKI for applied key management system and process
US9967289B2 (en) 2015-03-12 2018-05-08 Fornetix Llc Client services for applied key management systems and processes
US10965459B2 (en) * 2015-03-13 2021-03-30 Fornetix Llc Server-client key escrow for applied key management system and process
JP6500302B2 (en) * 2015-06-08 2019-04-17 株式会社タニタ Central device, peripheral device, communication system, communication method and program
EP3363150B1 (en) * 2015-10-16 2020-12-16 ORock Technologies, Inc. System for providing end-to-end protection against network-based attacks
US10038551B2 (en) 2015-11-29 2018-07-31 International Business Machines Corporation Securing enterprise data on mobile devices
US10503730B1 (en) 2015-12-28 2019-12-10 Ionic Security Inc. Systems and methods for cryptographically-secure queries using filters generated by multiple parties
US10740474B1 (en) 2015-12-28 2020-08-11 Ionic Security Inc. Systems and methods for generation of secure indexes for cryptographically-secure queries
US11063980B2 (en) 2016-02-26 2021-07-13 Fornetix Llc System and method for associating encryption key management policy with device activity
US10931653B2 (en) 2016-02-26 2021-02-23 Fornetix Llc System and method for hierarchy manipulation in an encryption key management system
US10917239B2 (en) 2016-02-26 2021-02-09 Fornetix Llc Policy-enabled encryption keys having ephemeral policies
US10348485B2 (en) 2016-02-26 2019-07-09 Fornetix Llc Linking encryption key management with granular policy
US10880281B2 (en) 2016-02-26 2020-12-29 Fornetix Llc Structure of policies for evaluating key attributes of encryption keys
US10860086B2 (en) * 2016-02-26 2020-12-08 Fornetix Llc Policy-enabled encryption keys having complex logical operations
US10572675B2 (en) * 2016-11-02 2020-02-25 Cisco Technology, Inc. Protecting and monitoring internal bus transactions
WO2018140758A1 (en) 2017-01-26 2018-08-02 Semper Fortis Solutions, LLC Multiple single levels of security (msls) in a multi-tenant cloud
US11210412B1 (en) 2017-02-01 2021-12-28 Ionic Security Inc. Systems and methods for requiring cryptographic data protection as a precondition of system access
JP6572926B2 (en) 2017-03-17 2019-09-11 富士ゼロックス株式会社 Document management system
EP3439229A1 (en) 2017-08-02 2019-02-06 Siemens Aktiengesellschaft Method and devices for achieving a safety function, particularly in the vicinity of a device control and/or system control
JP6789906B2 (en) 2017-09-20 2020-11-25 キオクシア株式会社 Data storage device
US11032251B2 (en) * 2018-06-29 2021-06-08 International Business Machines Corporation AI-powered cyber data concealment and targeted mission execution
US11368298B2 (en) * 2019-05-16 2022-06-21 Cisco Technology, Inc. Decentralized internet protocol security key negotiation
JP6733791B2 (en) * 2019-08-08 2020-08-05 富士ゼロックス株式会社 Management device and processing device
JP2019207732A (en) * 2019-08-08 2019-12-05 富士ゼロックス株式会社 Document management system, management device, and processing device
US11316684B2 (en) * 2020-05-19 2022-04-26 International Business Machines Corporation Restricting security key transfer from a key management server in an enterprise
CN112486500B (en) * 2020-11-03 2022-10-21 杭州云嘉云计算有限公司 System authorization deployment method

Family Cites Families (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7362868B2 (en) * 2000-10-20 2008-04-22 Eruces, Inc. Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
US7003117B2 (en) * 2003-02-05 2006-02-21 Voltage Security, Inc. Identity-based encryption system for secure data distribution
US7308711B2 (en) * 2003-06-06 2007-12-11 Microsoft Corporation Method and framework for integrating a plurality of network policies
JP3761557B2 (en) * 2004-04-08 2006-03-29 株式会社日立製作所 Key distribution method and system for encrypted communication
JP4081041B2 (en) * 2004-04-22 2008-04-23 ソフトバンクテレコム株式会社 Network system
JP4555046B2 (en) * 2004-10-15 2010-09-29 ヒタチグローバルストレージテクノロジーズネザーランドビーブイ Data transfer system and data transfer method
WO2006128273A1 (en) * 2005-06-01 2006-12-07 Research In Motion Limited System and method for determining a security encoding to be applied to outgoing messages
US7970143B2 (en) * 2005-08-05 2011-06-28 Hewlett-Packard Development Company, L.P. System, method and apparatus to obtain a key for encryption/decryption/data recovery from an enterprise cryptography key management system
US8340298B2 (en) 2006-04-18 2012-12-25 Magiq Technologies, Inc. Key management and user authentication for quantum cryptography networks
US9002018B2 (en) 2006-05-09 2015-04-07 Sync Up Technologies Corporation Encryption key exchange system and method
JP2007316759A (en) * 2006-05-23 2007-12-06 Hitachi Ltd Screen data generation method, screen data generation system and program
JP4939851B2 (en) * 2006-06-21 2012-05-30 パナソニック株式会社 Information processing terminal, secure device, and state processing method
FR2905217B1 (en) 2006-08-23 2008-12-19 Thales Sa SYSTEM AND METHOD FOR DECENTRALIZED MANAGEMENT OF A SECURE SYSTEM DELIVERING DIFFERENT SERVICES
CA2684229A1 (en) * 2007-04-12 2008-10-23 Ncipher Corporation Ltd. Method and system for identifying and managing keys
AU2008299852B2 (en) * 2007-09-14 2014-04-03 Security First Corp. Systems and methods for managing cryptographic keys
US8059820B2 (en) * 2007-10-11 2011-11-15 Microsoft Corporation Multi-factor content protection
FR2922392B1 (en) 2007-10-12 2011-03-04 Thales Sa DEVICE AND METHOD FOR HANDLING EXCHANGE FLOWS OF PUBLIC (OR NON-SENSITIVE) VALUES FOR CREATING COMMON SECRET KEYS BETWEEN SEVERAL ZONES.
FR2930663A1 (en) 2008-04-25 2009-10-30 Thales Sa METHOD FOR MANAGING CRYPTOGRAPHIC EQUIPMENT WITH UNIFIED ADMINISTRATION
US8213620B1 (en) * 2008-11-17 2012-07-03 Netapp, Inc. Method for managing cryptographic information
GB2472491B (en) 2009-02-06 2013-09-18 Thales Holdings Uk Plc System and method for multilevel secure object management
GB2467580B (en) * 2009-02-06 2013-06-12 Thales Holdings Uk Plc System and method for multilevel secure object management
US8885830B2 (en) 2009-05-04 2014-11-11 Mitre Corporation Method and apparatus for dynamically establishing and joining an encrypted collaborative communication session
JP5889525B2 (en) * 2010-12-21 2016-03-22 パナソニックIpマネジメント株式会社 Authentication system
US20130044882A1 (en) 2011-08-19 2013-02-21 International Business Machines Corporation Enhancing provisioning for keygroups using key management interoperability protocol (KMIP)
US8798273B2 (en) * 2011-08-19 2014-08-05 International Business Machines Corporation Extending credential type to group Key Management Interoperability Protocol (KMIP) clients
US8842840B2 (en) 2011-11-03 2014-09-23 Arvind Gidwani Demand based encryption and key generation and distribution systems and methods
JP5755557B2 (en) * 2011-12-19 2015-07-29 日本電信電話株式会社 Timed cryptographic system, timed cryptographic method, apparatus, and program
US9716728B1 (en) 2013-05-07 2017-07-25 Vormetric, Inc. Instant data security in untrusted environments
FR3009163B1 (en) 2013-07-25 2015-09-04 Thales Sa METHOD FOR SECURITY EXCHANGE OF DATA ON AN AD-HOC NETWORK USING XCAST BROADCAST SERVICE; ASSOCIATED NODE
US9124430B2 (en) 2013-09-23 2015-09-01 Venafi, Inc. Centralized policy management for security keys
MY181303A (en) * 2013-10-07 2020-12-21 Fornetix Llc System and method for encryption key management, federation and distribution
KR102469562B1 (en) * 2015-12-18 2022-11-22 삼성전자주식회사 Apparatus and method for sharing personal electronic-health data
US10523645B2 (en) 2016-10-21 2019-12-31 Thales Esecurity, Inc. Method and system for protecting user data using individualized keys to enable secure compartmentalized data backup/restore
US10547598B2 (en) 2017-02-13 2020-01-28 Thales Esecurity, Inc. Abstracted cryptographic material management across multiple service providers
FR3076423B1 (en) 2017-12-28 2020-01-31 Thales METHOD AND SYSTEM FOR CRYPTOGRAPHIC ACTIVATION OF A PLURALITY OF EQUIPMENT

Also Published As

Publication number Publication date
EP3055947A1 (en) 2016-08-17
EA201690730A1 (en) 2016-09-30
WO2015054083A1 (en) 2015-04-16
EA035011B1 (en) 2020-04-16
NZ757614A (en) 2021-05-28
CN111523108B (en) 2023-08-04
CA2926651C (en) 2022-09-13
MY197976A (en) 2023-07-25
EP3055947A4 (en) 2017-03-29
MY181303A (en) 2020-12-21
MX359594B (en) 2018-10-03
US11503076B2 (en) 2022-11-15
AU2014332244A1 (en) 2016-05-05
US20230083120A1 (en) 2023-03-16
CN106664198B (en) 2020-05-08
MX2016004394A (en) 2016-12-02
BR112016007660B1 (en) 2023-01-17
SG10202005578QA (en) 2020-07-29
US10742689B2 (en) 2020-08-11
IL244948A0 (en) 2016-05-31
IL244948B (en) 2020-03-31
CN106664198A (en) 2017-05-10
US10257230B2 (en) 2019-04-09
NZ718952A (en) 2021-05-28
US9729577B2 (en) 2017-08-08
SG11201602711WA (en) 2016-05-30
US20150101012A1 (en) 2015-04-09
JP2016535476A (en) 2016-11-10
US20170324780A1 (en) 2017-11-09
US20200351308A1 (en) 2020-11-05
AU2021229241B2 (en) 2023-07-06
US20190230131A1 (en) 2019-07-25
CN111523108A (en) 2020-08-11
CA2926651A1 (en) 2015-04-16
AU2019226240A1 (en) 2019-09-26
AU2021229241A1 (en) 2021-10-07
JP6556706B2 (en) 2019-08-07
BR112016007660A2 (en) 2017-08-01

Similar Documents

Publication Publication Date Title
SG10201900294YA (en) System and method for encryption key management, federation and distribution
NZ735353A (en) Systems and methods for organizing devices in a policy hierarchy
WO2014151157A3 (en) Secure query processing over encrypted data
MX347812B (en) Using inverse operators for queries on online social networks.
PH12016501848A1 (en) A device management system
WO2014179145A3 (en) Drive level encryption key management in a distributed storage system
WO2014108835A3 (en) A method for providing security using secure computation
MX2015012671A (en) Systems and methods for defining attributes of attended delivery/pickup locations.
WO2015017787A3 (en) Homomorphic database operations apparatuses, methods and systems
NZ770092A (en) Methods and systems for virtual file storage and encryption
GB2522372A (en) Storage system and method of storing and managing data
MX352801B (en) Physical security system having multiple server nodes.
WO2014033741A3 (en) System and method for combining deduplication and encryption of data
IN2015DN03160A (en)
SG11202106514TA (en) Key security management system and method, medium, and computer program
WO2017172436A3 (en) Advanced device locking criteria
WO2013170082A3 (en) Method and system for managing social network data
SG11201810377QA (en) Method, system, and device for managing database permissions, and computer-readable storage medium
MX346982B (en) Injection data management system and method.
GB2526505A (en) Social project management
EP3420672A4 (en) System and method for associating encryption key management policy with device activity
MY169957A (en) An access control system
SG10201805187WA (en) Entity authentication in network
GB2522584A (en) Managing performance policies based on workload scalability
EP3821562A4 (en) Security management for unauthorized requests in communication system with service-based architecture