-
公开(公告)号:US20210185026A1
公开(公告)日:2021-06-17
申请号:US17162714
申请日:2021-01-29
申请人: Fornetix LLC
发明人: Charles White , Gary C. Gardner
IPC分类号: H04L29/06 , G06F21/60 , G06F12/128 , G06F12/14
摘要: Examples described herein relate to manipulation of a structure of a policy hierarchy, while reformulating policies associated with the manipulated nodes, or other nodes effected by the manipulation, of the hierarchy. In some examples, a node may be created, moved, and/or deleted, and the manipulated node (and other nodes effected by the manipulation of the node) may reformulate their respective policies based on their new positions within the policy hierarchy. In some examples, nodes indirectly effected by the hierarchy manipulation may be moved within the hierarchy as a result.
-
公开(公告)号:US10567355B2
公开(公告)日:2020-02-18
申请号:US15954280
申请日:2018-04-16
申请人: Fornetix LLC
发明人: Charles White , Stephen Edwards
IPC分类号: H04L29/06
摘要: Embodiments described herein relate to obtaining a public key for an application of a communication device, including, but not limited to, receiving a request from the communication device to obtain the public key, evaluating the request based on at least one policy, requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized, receiving the public key from the PKI, and sending the public key to the communication device.
-
公开(公告)号:US10257175B2
公开(公告)日:2019-04-09
申请号:US15269310
申请日:2016-09-19
申请人: Fornetix LLC
摘要: Apparatuses and methods are described herein discovering and managing key information, including, but not limited to, obtaining the key information associated with at least one segment, storing the key information, and at least one of generating at least one encryption report based on the key information, exporting the key information, or orchestrating keys based on the key information. In some embodiments, obtaining the key information includes at least interrogating encryption assets associated with at least one segment for key information, and receiving the key information from the encryption assets associated with the at least one segment.
-
公开(公告)号:US11470086B2
公开(公告)日:2022-10-11
申请号:US16820517
申请日:2020-03-16
申请人: Fornetix LLC
发明人: Charles White , Stephen Edwards
IPC分类号: H04L9/40
摘要: In various embodiments, there is provide a method for organizing devices in a policy hierarchy. The method includes creating a first node. The method further includes assigning a first policy to the first node. The method further includes creating a second node, the second node referencing the first node as a parent node such that the second node inherits the first policy of the first node.
-
公开(公告)号:US20220300656A1
公开(公告)日:2022-09-22
申请号:US17695695
申请日:2022-03-15
申请人: Fornetix LLC
发明人: Charles White , Gerald Stueve
摘要: Methods are described herein for associating one or more first systems with one or more second systems, where the first system has a first cryptographic boundary and the second system has a second cryptographic boundary, identifying, at the one or more first systems, one or more security objects on one or more second systems in the second cryptographic boundary, performing one or more security functions at the one or more first systems using the one or more security objects, the performance of the security function occurring in the first cryptographic boundary, and transmitting, by the one or more first systems, one or more results based on the performed one or more security functions.
-
公开(公告)号:US20170093819A1
公开(公告)日:2017-03-30
申请号:US15269310
申请日:2016-09-19
申请人: Fornetix LLC
CPC分类号: H04L63/06 , H04L9/0866 , H04L9/0872 , H04L9/088 , H04L9/0894 , H04L63/20 , H04L2209/24
摘要: Apparatuses and methods are described herein discovering and managing key information, including, but not limited to, obtaining the key information associated with at least one segment, storing the key information, and at least one of generating at least one encryption report based on the key information, exporting the key information, or orchestrating keys based on the key information. In some embodiments, obtaining the key information includes at least interrogating encryption assets associated with at least one segment for key information, and receiving the key information from the encryption assets associated with the at least one segment.
-
7.
公开(公告)号:US20160269370A1
公开(公告)日:2016-09-15
申请号:US15067035
申请日:2016-03-10
申请人: Fornetix LLC
发明人: Charles White , Stephen Edwards
IPC分类号: H04L29/06
摘要: Embodiments described herein relate to obtaining a public key for an application of a communication device, including, but not limited to, receiving a request from the communication device to obtain the public key, evaluating the request based on at least one policy, requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized, receiving the public key from the PKI, and sending the public key to the communication device.
摘要翻译: 本文描述的实施例涉及获得用于通信设备的应用的公钥,包括但不限于从通信设备接收获得公开密钥的请求,基于至少一个策略来评估请求,请求公众 响应于确定请求被授权,从公共密钥基础设施(PKI)获取密钥,从PKI接收公共密钥,并将公钥发送到通信设备。
-
公开(公告)号:US11063980B2
公开(公告)日:2021-07-13
申请号:US15439861
申请日:2017-02-22
申请人: Fornetix LLC
摘要: Examples described herein relate to systems and methods for integrating and implementing ad hoc groups within a policy hierarchy environment. The ad hoc groups may implement particular guidelines for group membership, policy evaluations, and group actions. Systems and methods provide a framework for creating groups, removing groups, and associating groups, nodes, clients, and users with groups and policy. In some examples, there is provided a method for implementing ad hoc groups in a policy hierarchy environment, the method including: receiving a key orchestration operation request at a client associated with a node, a group, and a user; applying a sum of policies associated with the node to the request; applying a sum of policies associated with the group to the request; applying a sum of policies associated with the client to the request; applying a sum of policies associated with the user to the request; and evaluating the key orchestration operation request based on each of the sum of policies of the node, the group, the client, and the user.
-
公开(公告)号:US10931653B2
公开(公告)日:2021-02-23
申请号:US15439873
申请日:2017-02-22
申请人: Fornetix LLC
发明人: Charles White , Gary C. Gardner
IPC分类号: G06F12/128 , G06F12/14 , H04L29/06 , G06F21/60
摘要: Examples described herein relate to manipulation of a structure of a policy hierarchy, while reformulating policies associated with the manipulated nodes, or other nodes effected by the manipulation, of the hierarchy. In some examples, a node may be created, moved, and/or deleted, and the manipulated node (and other nodes effected by the manipulation of the node) may reformulate their respective policies based on their new positions within the policy hierarchy. In some examples, nodes indirectly effected by the hierarchy manipulation may be moved within the hierarchy as a result.
-
公开(公告)号:US10560440B2
公开(公告)日:2020-02-11
申请号:US15067035
申请日:2016-03-10
申请人: Fornetix LLC
发明人: Charles White , Stephen Edwards
IPC分类号: H04L29/06
摘要: Embodiments described herein relate to obtaining a public key for an application of a communication device, including, but not limited to, receiving a request from the communication device to obtain the public key, evaluating the request based on at least one policy, requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized, receiving the public key from the PKI, and sending the public key to the communication device.
-
-
-
-
-
-
-
-
-