Managing use of security keys
First Claim
Patent Images
1. A method comprising steps of:
- receiving a request for a key that serves as part of a data security system that limits a number of accesses to key or keys associated therewith, wherein the request comprises one or more attributes associated with the request;
analyzing the one or more attributes associated with the request and a history in connection with one or more previous requests;
based on the analysis, determining a riskiness in connection with the request, wherein the riskiness indicates a high risk in connection with the request; and
upon determining the high risk in connection with the request, determining to refuse the request and creating a new limit that reduces the number of accesses to key or keys associated with the data security system;
wherein the steps are performed by at least one processing device comprising a processor coupled to a memory.
17 Assignments
0 Petitions
Accused Products
Abstract
A method is used in managing use of security keys. Based on a request for use of a key that serves as part of a data security system, a set of criteria to apply to the request is determined. The set of criteria pertain to security management of the key that is subject of the request. The set of criteria is applied to the request; and a result is determined based on the application of the set of criteria.
-
Citations
3 Claims
-
1. A method comprising steps of:
-
receiving a request for a key that serves as part of a data security system that limits a number of accesses to key or keys associated therewith, wherein the request comprises one or more attributes associated with the request; analyzing the one or more attributes associated with the request and a history in connection with one or more previous requests; based on the analysis, determining a riskiness in connection with the request, wherein the riskiness indicates a high risk in connection with the request; and upon determining the high risk in connection with the request, determining to refuse the request and creating a new limit that reduces the number of accesses to key or keys associated with the data security system; wherein the steps are performed by at least one processing device comprising a processor coupled to a memory.
-
-
2. An apparatus comprising:
-
at least one processing device comprising a processor coupled to a memory; said at least one processing device being configured to; receive a request for a key that serves as part of a data security system that limits a number of accesses to key or keys associated therewith, wherein the request comprises one or more attributes associated with the request; analyze the one or more attributes associated with the request and a history in connection with one or more previous requests; based on the analysis, determine a riskiness in connection with the request, wherein the riskiness indicates a high risk in connection with the request; and upon determining the high risk in connection with the request, determine to refuse the request and create a new limit that reduces the number of accesses to key or keys associated with the data security system.
-
-
3. An article of manufacture comprising a processor-readable non-transitory storage medium having stored therein program code of one or more software programs, wherein the program code when executed by at least one processing device causes said at least one processing device to:
-
receive a request for a key that serves as part of a data security system that limits a number of accesses to key or keys associated therewith, wherein the request comprises one or more attributes associated with the request; analyze the one or more attributes associated with the request and a history in connection with one or more previous requests; based on the analysis, determine a riskiness in connection with the request, wherein the riskiness indicates a high risk in connection with the request; and upon determining the high risk in connection with the request, determine to refuse the request and create a new limit that reduces the number of accesses to key or keys associated with the data security system.
-
Specification