Key management interface to multiple and simultaneous protocols
First Claim
1. A key management interface system for interfacing with multiple protocols to perform secure key management, the key management interface system comprising:
- one or more applications comprising, a first application for streaming real-time data;
a second application for provisioning real-time data;
a daemon for performing key management, the daemon interfacing with the first application to secure cryptographic keys for securely streaming the real-time data; and
the daemon interfacing with the second application to secure cryptographic keys for secure provisioning of the real-time data.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for interfacing protocol applications with a daemon to perform secure key management between the a computer system and a second computer system. The method includes providing a first protocol application running on the first computer, and specifying an application role value from the first protocol application to the daemon, the application role for identifying the first protocol application. Further, the method includes specifying an object containing application data specific to the first protocol application, and employing the object and the application role value for performing key management in order to secure communication of real-time data between the first computer system and the second computer systems.
52 Citations
17 Claims
-
1. A key management interface system for interfacing with multiple protocols to perform secure key management, the key management interface system comprising:
-
one or more applications comprising, a first application for streaming real-time data;
a second application for provisioning real-time data;
a daemon for performing key management, the daemon interfacing with the first application to secure cryptographic keys for securely streaming the real-time data; and
the daemon interfacing with the second application to secure cryptographic keys for secure provisioning of the real-time data. - View Dependent Claims (2, 15)
-
-
3. In a communication system having a daemon running on a first computer, a method for interfacing protocol applications with the daemon to perform secure key management, the method comprising:
-
providing a first protocol application running on the first computer;
specifying a role value for identifying the first protocol application;
specifying an object containing application data specific to the first protocol application; and
using the object and the application role value for performing key management in order to secure communication of real-time data. - View Dependent Claims (4, 5, 6, 7, 8, 13, 14)
-
-
9. A key management interface for interfacing with multiple to securely transfer real-time data, the key management interface comprising:
-
a first computer system further comprising a first protocol application;
a second protocol application;
a daemon for performing key management;
upon request for key management from the first protocol application, the daemon interfaces with the first protocol application to perform a first function relating to secure transfer of the real-time data; and
upon request for key management from the second protocol application, the daemon interfaces with the second protocol application to perform a second function relating to secure transfer of the real-time data. - View Dependent Claims (10, 11, 12)
-
-
16. A key management interface system comprising:
-
a first computer system further comprising a first protocol application;
a second protocol application; and
a daemon for performing key management;
upon request, the daemon interfaces with the first protocol application and the second protocol application to perform at least one key management function. - View Dependent Claims (17)
-
Specification