×

Key management for compromised enterprise endpoints

  • US 10,063,373 B2
  • Filed: 11/23/2016
  • Issued: 08/28/2018
  • Est. Priority Date: 09/14/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • labeling processes on an endpoint with a labeling scheme in which the processes are either in, wherein the processes conform to a compliance policy administered for the endpoint from a remote threat management facility, or the processes are out, wherein the processes do not conform to the compliance policy, thereby providing a plurality of in processes and a plurality of out processes;

    for in processes of the endpoint, providing access to encrypted files through a file system, with access to the encrypted files controlled by the file system and limited to processes in compliance with the compliance policy;

    detecting a compromise of the endpoint based on a change of an in process to an out process when the in process falls out of compliance with the compliance policy; and

    in response to detecting the compromise, deleting key material cached on the endpoint to prevent decryption of the encrypted files through the file system for the in processes, thereby revoking access to the encrypted files by the processes executing on the endpoint.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×