SYSTEM AND METHOD FOR HIERARCHY MANIPULATION IN AN ENCRYPTION KEY MANAGEMENT SYSTEM

    公开(公告)号:US20210185026A1

    公开(公告)日:2021-06-17

    申请号:US17162714

    申请日:2021-01-29

    申请人: Fornetix LLC

    摘要: Examples described herein relate to manipulation of a structure of a policy hierarchy, while reformulating policies associated with the manipulated nodes, or other nodes effected by the manipulation, of the hierarchy. In some examples, a node may be created, moved, and/or deleted, and the manipulated node (and other nodes effected by the manipulation of the node) may reformulate their respective policies based on their new positions within the policy hierarchy. In some examples, nodes indirectly effected by the hierarchy manipulation may be moved within the hierarchy as a result.

    Server-client PKI for applied key management system and process

    公开(公告)号:US10567355B2

    公开(公告)日:2020-02-18

    申请号:US15954280

    申请日:2018-04-16

    申请人: Fornetix LLC

    IPC分类号: H04L29/06

    摘要: Embodiments described herein relate to obtaining a public key for an application of a communication device, including, but not limited to, receiving a request from the communication device to obtain the public key, evaluating the request based on at least one policy, requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized, receiving the public key from the PKI, and sending the public key to the communication device.

    Encryption deployment discovery
    3.
    发明授权

    公开(公告)号:US10257175B2

    公开(公告)日:2019-04-09

    申请号:US15269310

    申请日:2016-09-19

    申请人: Fornetix LLC

    IPC分类号: H04L29/06 H04L9/08

    摘要: Apparatuses and methods are described herein discovering and managing key information, including, but not limited to, obtaining the key information associated with at least one segment, storing the key information, and at least one of generating at least one encryption report based on the key information, exporting the key information, or orchestrating keys based on the key information. In some embodiments, obtaining the key information includes at least interrogating encryption assets associated with at least one segment for key information, and receiving the key information from the encryption assets associated with the at least one segment.

    System and method for associating encryption key management policy with device activity

    公开(公告)号:US11063980B2

    公开(公告)日:2021-07-13

    申请号:US15439861

    申请日:2017-02-22

    申请人: Fornetix LLC

    摘要: Examples described herein relate to systems and methods for integrating and implementing ad hoc groups within a policy hierarchy environment. The ad hoc groups may implement particular guidelines for group membership, policy evaluations, and group actions. Systems and methods provide a framework for creating groups, removing groups, and associating groups, nodes, clients, and users with groups and policy. In some examples, there is provided a method for implementing ad hoc groups in a policy hierarchy environment, the method including: receiving a key orchestration operation request at a client associated with a node, a group, and a user; applying a sum of policies associated with the node to the request; applying a sum of policies associated with the group to the request; applying a sum of policies associated with the client to the request; applying a sum of policies associated with the user to the request; and evaluating the key orchestration operation request based on each of the sum of policies of the node, the group, the client, and the user.

    System and method for hierarchy manipulation in an encryption key management system

    公开(公告)号:US10931653B2

    公开(公告)日:2021-02-23

    申请号:US15439873

    申请日:2017-02-22

    申请人: Fornetix LLC

    摘要: Examples described herein relate to manipulation of a structure of a policy hierarchy, while reformulating policies associated with the manipulated nodes, or other nodes effected by the manipulation, of the hierarchy. In some examples, a node may be created, moved, and/or deleted, and the manipulated node (and other nodes effected by the manipulation of the node) may reformulate their respective policies based on their new positions within the policy hierarchy. In some examples, nodes indirectly effected by the hierarchy manipulation may be moved within the hierarchy as a result.

    Server-client PKI for applied key management system and process

    公开(公告)号:US10560440B2

    公开(公告)日:2020-02-11

    申请号:US15067035

    申请日:2016-03-10

    申请人: Fornetix LLC

    IPC分类号: H04L29/06

    摘要: Embodiments described herein relate to obtaining a public key for an application of a communication device, including, but not limited to, receiving a request from the communication device to obtain the public key, evaluating the request based on at least one policy, requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized, receiving the public key from the PKI, and sending the public key to the communication device.

    SYSTEM AND METHOD FOR ENCRYPTION KEY MANAGEMENT, FEDERATION AND DISTRIBUTION

    公开(公告)号:US20190230131A1

    公开(公告)日:2019-07-25

    申请号:US16374522

    申请日:2019-04-03

    申请人: Fornetix LLC

    IPC分类号: H04L29/06 G06F16/245

    摘要: Systems and methods are described for orchestrating a security object, including, for example, defining and storing a plurality of policies in a database coupled to a policy engine and receiving, by the policy engine, the security object and at least one object attribute associated with the security object. In addition, the policy engine determines the acceptability of the security object based, at least in part, on the at least one object attribute and at least one of the plurality of policies corresponding to the at least one object attribute. The security object to at least one communication device associated with the policy engine is distributed when the security object is determined to be acceptable. The at least one communication device establishes communication based, at least in part, on the security object.

    SYSTEMS AND METHODS FOR ORGANIZING DEVICES IN A POLICY HIERARCHY
    10.
    发明申请
    SYSTEMS AND METHODS FOR ORGANIZING DEVICES IN A POLICY HIERARCHY 审中-公开
    用于在政策层级中组织设备的系统和方法

    公开(公告)号:US20160269373A1

    公开(公告)日:2016-09-15

    申请号:US15067074

    申请日:2016-03-10

    申请人: Fornetix LLC

    IPC分类号: H04L29/06

    CPC分类号: H04L63/10 H04L63/064

    摘要: In various embodiments, there is provide a method for organizing devices in a policy hierarchy. The method includes creating a first node. The method further includes assigning a first policy to the first node. The method further includes creating a second node, the second node referencing the first node as a parent node such that the second node inherits the first policy of the first node.

    摘要翻译: 在各种实施例中,提供了一种用于在策略层次结构中组织设备的方法。 该方法包括创建第一节点。 该方法还包括向第一节点分配第一策略。 该方法还包括创建第二节点,第二节点将第一节点引用为父节点,使得第二节点继承第一节点的第一策略。