Systems and methods to secure data using computer system attributes
First Claim
Patent Images
1. A method for securing data in a computing system, comprising:
- receiving, at the computing system, data for storage to a data storage device;
acquiring values of one or more system attributes from a plurality of system attributes associated with the computing system based on a key generation policy;
transforming the values of the one or more system attributes using a transformation function based on the key generation policy to generate a cryptographic key;
encrypting the received data using the generated cryptographic key to generate an encrypted data file;
adding a decryption algorithm to the encrypted data file; and
providing the encrypted data file to a requesting device, wherein the requesting device generates the received data from the encrypted data file using the decryption algorithm contained in the encrypted file, and the generated cryptographic key.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods of the present disclosure are directed to a computing system configured to provide seamless protection to data (which can include, without limitation, data files, executable files, system configuration files, program files, and other data) stored in the computing system, while making it nearly impossible for attackers to be able to access the data outside of the computing system. The computing system uses targeted encryption and decryption, in which values of one or more system attribute are used to generate a cryptographic key used for encryption and decryption of data stored in the computing system.
28 Citations
20 Claims
-
1. A method for securing data in a computing system, comprising:
-
receiving, at the computing system, data for storage to a data storage device; acquiring values of one or more system attributes from a plurality of system attributes associated with the computing system based on a key generation policy; transforming the values of the one or more system attributes using a transformation function based on the key generation policy to generate a cryptographic key; encrypting the received data using the generated cryptographic key to generate an encrypted data file; adding a decryption algorithm to the encrypted data file; and providing the encrypted data file to a requesting device, wherein the requesting device generates the received data from the encrypted data file using the decryption algorithm contained in the encrypted file, and the generated cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 17, 18)
-
-
9. A computing system, comprising:
-
a computer processor having programmed instructions to acquire values of one or more system attributes from a plurality of system attributes associated with the computing system based on a key generation policy, and transforms the values of the one or more system attributes using a transformation function based on the key generation policy to generate a cryptographic key; an input/output port that receives a request for encrypting data for storage in a data storage device, wherein the computer processor encrypts the received data to generate an encrypted data file using the cryptographic key and adds a decryption algorithm to the encrypted data file, and the computer processor provides the encrypted data file to a requesting device, wherein the requesting device generates the received data from the encrypted data file using the decryption algorithm contained in the encrypted file, and the generated cryptographic key. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 19, 20)
-
Specification