×

Managing use of security keys

  • US 10,116,438 B1
  • Filed: 08/23/2017
  • Issued: 10/30/2018
  • Est. Priority Date: 12/31/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising steps of:

  • receiving a request for a key that serves as part of a data security system that limits a number of accesses to key or keys associated therewith, wherein the request comprises one or more attributes associated with the request;

    analyzing the one or more attributes associated with the request and a history in connection with one or more previous requests;

    based on the analysis, determining a riskiness in connection with the request, wherein the riskiness indicates a high risk in connection with the request; and

    upon determining the high risk in connection with the request, determining to refuse the request and creating a new limit that reduces the number of accesses to key or keys associated with the data security system;

    wherein the steps are performed by at least one processing device comprising a processor coupled to a memory.

View all claims
  • 17 Assignments
Timeline View
Assignment View
    ×
    ×