Encryption key management of client devices and endpoints within a protected network
Abstract:
Disclosed are various examples for establishing encrypted channels or tunnels within a TCP or other communication session between a tunnel endpoint and tunnel client on a client device. A tunnel endpoint on the client device can determine an encryption key based upon whether a client device is in compliance with encryption policies of the enterprise.
Information query
Patent Agency Ranking
0/0