-
公开(公告)号:US20210185026A1
公开(公告)日:2021-06-17
申请号:US17162714
申请日:2021-01-29
申请人: Fornetix LLC
发明人: Charles White , Gary C. Gardner
IPC分类号: H04L29/06 , G06F21/60 , G06F12/128 , G06F12/14
摘要: Examples described herein relate to manipulation of a structure of a policy hierarchy, while reformulating policies associated with the manipulated nodes, or other nodes effected by the manipulation, of the hierarchy. In some examples, a node may be created, moved, and/or deleted, and the manipulated node (and other nodes effected by the manipulation of the node) may reformulate their respective policies based on their new positions within the policy hierarchy. In some examples, nodes indirectly effected by the hierarchy manipulation may be moved within the hierarchy as a result.
-
公开(公告)号:US10567355B2
公开(公告)日:2020-02-18
申请号:US15954280
申请日:2018-04-16
申请人: Fornetix LLC
发明人: Charles White , Stephen Edwards
IPC分类号: H04L29/06
摘要: Embodiments described herein relate to obtaining a public key for an application of a communication device, including, but not limited to, receiving a request from the communication device to obtain the public key, evaluating the request based on at least one policy, requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized, receiving the public key from the PKI, and sending the public key to the communication device.
-
公开(公告)号:US10257175B2
公开(公告)日:2019-04-09
申请号:US15269310
申请日:2016-09-19
申请人: Fornetix LLC
摘要: Apparatuses and methods are described herein discovering and managing key information, including, but not limited to, obtaining the key information associated with at least one segment, storing the key information, and at least one of generating at least one encryption report based on the key information, exporting the key information, or orchestrating keys based on the key information. In some embodiments, obtaining the key information includes at least interrogating encryption assets associated with at least one segment for key information, and receiving the key information from the encryption assets associated with the at least one segment.
-
公开(公告)号:US20170250799A1
公开(公告)日:2017-08-31
申请号:US15439839
申请日:2017-02-22
申请人: Fornetix LLC
CPC分类号: H04L9/0637 , H04L9/008 , H04L9/0861 , H04L9/088 , H04L2209/38
摘要: Examples describe herein relate to chaining operations under a molecular encryption scheme, including, but not limited to, defining a composite operation, wherein the composite operation comprises two or more separate operations, receiving input for the composite operation, invoking the composite operation for the input, performing the composite operation based on the input, and determining output corresponding to the input.
-
公开(公告)号:US11063980B2
公开(公告)日:2021-07-13
申请号:US15439861
申请日:2017-02-22
申请人: Fornetix LLC
摘要: Examples described herein relate to systems and methods for integrating and implementing ad hoc groups within a policy hierarchy environment. The ad hoc groups may implement particular guidelines for group membership, policy evaluations, and group actions. Systems and methods provide a framework for creating groups, removing groups, and associating groups, nodes, clients, and users with groups and policy. In some examples, there is provided a method for implementing ad hoc groups in a policy hierarchy environment, the method including: receiving a key orchestration operation request at a client associated with a node, a group, and a user; applying a sum of policies associated with the node to the request; applying a sum of policies associated with the group to the request; applying a sum of policies associated with the client to the request; applying a sum of policies associated with the user to the request; and evaluating the key orchestration operation request based on each of the sum of policies of the node, the group, the client, and the user.
-
公开(公告)号:US10931653B2
公开(公告)日:2021-02-23
申请号:US15439873
申请日:2017-02-22
申请人: Fornetix LLC
发明人: Charles White , Gary C. Gardner
IPC分类号: G06F12/128 , G06F12/14 , H04L29/06 , G06F21/60
摘要: Examples described herein relate to manipulation of a structure of a policy hierarchy, while reformulating policies associated with the manipulated nodes, or other nodes effected by the manipulation, of the hierarchy. In some examples, a node may be created, moved, and/or deleted, and the manipulated node (and other nodes effected by the manipulation of the node) may reformulate their respective policies based on their new positions within the policy hierarchy. In some examples, nodes indirectly effected by the hierarchy manipulation may be moved within the hierarchy as a result.
-
公开(公告)号:US10560440B2
公开(公告)日:2020-02-11
申请号:US15067035
申请日:2016-03-10
申请人: Fornetix LLC
发明人: Charles White , Stephen Edwards
IPC分类号: H04L29/06
摘要: Embodiments described herein relate to obtaining a public key for an application of a communication device, including, but not limited to, receiving a request from the communication device to obtain the public key, evaluating the request based on at least one policy, requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized, receiving the public key from the PKI, and sending the public key to the communication device.
-
公开(公告)号:US20190230131A1
公开(公告)日:2019-07-25
申请号:US16374522
申请日:2019-04-03
申请人: Fornetix LLC
发明人: Charles White , Joseph Brand , Stephen Edwards
IPC分类号: H04L29/06 , G06F16/245
摘要: Systems and methods are described for orchestrating a security object, including, for example, defining and storing a plurality of policies in a database coupled to a policy engine and receiving, by the policy engine, the security object and at least one object attribute associated with the security object. In addition, the policy engine determines the acceptability of the security object based, at least in part, on the at least one object attribute and at least one of the plurality of policies corresponding to the at least one object attribute. The security object to at least one communication device associated with the policy engine is distributed when the security object is determined to be acceptable. The at least one communication device establishes communication based, at least in part, on the security object.
-
公开(公告)号:US20170250811A1
公开(公告)日:2017-08-31
申请号:US15439455
申请日:2017-02-22
申请人: Fornetix LLC
发明人: Stephen Edwards
CPC分类号: H04L9/14 , H04L9/083 , H04L9/0861 , H04L9/088 , H04L9/0894 , H04L9/30 , H04L63/06 , H04L63/20 , H04W12/04
摘要: Examples described herein relate to apparatuses and methods for evaluating an encryption key based on policies for a policy operation, including, but not limited to, aggregating existing policies for evaluating at least one key attribute of the encryption key, executing a policy replacement operation replacing at least one existing policy with at least one ephemeral policy, and evaluating the at least one key attribute based, at least in part, on the at least one ephemeral policy.
-
10.
公开(公告)号:US20160269373A1
公开(公告)日:2016-09-15
申请号:US15067074
申请日:2016-03-10
申请人: Fornetix LLC
发明人: Charles White , Stephen Edwards
IPC分类号: H04L29/06
CPC分类号: H04L63/10 , H04L63/064
摘要: In various embodiments, there is provide a method for organizing devices in a policy hierarchy. The method includes creating a first node. The method further includes assigning a first policy to the first node. The method further includes creating a second node, the second node referencing the first node as a parent node such that the second node inherits the first policy of the first node.
摘要翻译: 在各种实施例中,提供了一种用于在策略层次结构中组织设备的方法。 该方法包括创建第一节点。 该方法还包括向第一节点分配第一策略。 该方法还包括创建第二节点,第二节点将第一节点引用为父节点,使得第二节点继承第一节点的第一策略。
-
-
-
-
-
-
-
-
-