Linking encryption key management with granular policy
First Claim
Patent Images
1. A method, comprising:
- defining a composite operation, wherein the composite operation comprises two or more separate operations, wherein the two or more separate operations comprise at least one of an encryption management operation, an encryption operation, and a decryption operation and a second one of the encryption management operation, the encryption operation, and the decryption operation;
receiving input for the composite operation;
invoking the composite operation for the input;
performing the composite operation based on the input; and
determining output corresponding to the input.
2 Assignments
0 Petitions
Accused Products
Abstract
Examples describe herein relate to chaining operations under a molecular encryption scheme, including, but not limited to, defining a composite operation, wherein the composite operation comprises two or more separate operations, receiving input for the composite operation, invoking the composite operation for the input, performing the composite operation based on the input, and determining output corresponding to the input.
95 Citations
20 Claims
-
1. A method, comprising:
-
defining a composite operation, wherein the composite operation comprises two or more separate operations, wherein the two or more separate operations comprise at least one of an encryption management operation, an encryption operation, and a decryption operation and a second one of the encryption management operation, the encryption operation, and the decryption operation; receiving input for the composite operation; invoking the composite operation for the input; performing the composite operation based on the input; and determining output corresponding to the input. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable medium comprising computer-readable instructions such that, when executed, causes a processor to:
-
define a composite operation, wherein the composite operation comprises two or more separate operations, wherein the two or more separate operations comprise at least one of an encryption management operation, an encryption operation, and a decryption operation and a second one of the encryption management operation, the encryption operation, and the decryption operation; receive input for the composite operation; invoke the composite operation for the input; perform the composite operation based on the input; and determine output corresponding to the input.
-
-
19. A system, comprising:
-
a memory; and a processor configured to; define a composite operation, wherein the composite operation comprises two or more separate operations, wherein the two or more separate operations comprise at least one of an encryption management operation, an encryption operation, and a decryption operation and a second one of the encryption management operation, the encryption operation, and the decryption operation; receive input for the composite operation; invoke the composite operation for the input; perform the composite operation based on the input; and determine output corresponding to the input.
-
-
20. A system, comprising:
-
means for defining a composite operation, wherein the composite operation comprises two or more separate operations, wherein the two or more separate operations comprise at least one of an encryption management operation, an encryption operation, and a decryption operation and a second one of the encryption management operation, the encryption operation, and the decryption operation; means for receiving input for the composite operation; means for invoking the composite operation for the input; means for performing the composite operation based on the input; and means for determining output corresponding to the input.
-
Specification