×

Cryptographic proxy service

  • US 10,469,465 B2
  • Filed: 02/22/2017
  • Issued: 11/05/2019
  • Est. Priority Date: 06/23/2014
  • Status: Active Grant
First Claim
Patent Images

1. A cryptographic proxy system comprising:

  • a memory store; and

    a processor coupled to the memory store, wherein the processor is configured to execute operations comprising;

    receiving identification of a network destination where a computing device is attempting to transmit sensitive data, wherein the sensitive data is identified by the computing device, prior to transmitting the sensitive data, based on content evaluation rules that cause the computing device to search the sensitive data for keywords and compare the network destination to a list of network destinations;

    conditionally blocking transmission of the sensitive data based on a determination that a secure channel cannot be established between the computing device and the network destination identified in the list of network destinations;

    obtaining a spoofed security certificate that impersonates the network destination, the spoofed security certificate including a first public key corresponding to a first private key;

    verifying that the computing device is in compliance with a compliance rule specifying management restrictions that must be satisfied to establish compliance, the management restrictions comprising an encryption requirement and a firmware-version requirement;

    in response to verifying that the computing device is in compliance with the compliance rule, sending the first public key to the computing device to use for encrypting the sensitive data;

    receiving the encrypted sensitive data;

    decrypting the sensitive data using the first private key;

    re-encrypting the sensitive data according to a second security certificate associated with the network destination;

    forwarding the re-encrypted data to the network destination;

    operating as a certificate authority for the spoofed security certificate.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×