Systems and methods for creating and maintaining a centralized key store
First Claim
1. A method of creating and maintaining a centralized key store comprising:
- providing at least one security policy, wherein each security policy includes an application instance identifier associated with a security service; and
creating at least one security association, wherein the at least one security association is created based upon the security service associated with the application instance identifier to thereby create a centralized key store including the at least one security policy and at least one security association.
2 Assignments
0 Petitions
Accused Products
Abstract
A system, method, security gateway and computer program product are provided for creating and maintaining a centralized key store. The system includes a first security gateway and a second security gateway. The first security gateway is capable of applying a security service associated with an application instance identifier to at least one packet of data to thereby transform the at least one packet of data. In this regard, the first security gateway can apply the security service to the packet based upon at least one security policy and at least one security association. The second security gateway, in turn, is capable of applying the security service associated with the application instance identifier to the transformed packet of data to thereby generate a representation of the packet of data.
81 Citations
20 Claims
-
1. A method of creating and maintaining a centralized key store comprising:
-
providing at least one security policy, wherein each security policy includes an application instance identifier associated with a security service; and
creating at least one security association, wherein the at least one security association is created based upon the security service associated with the application instance identifier to thereby create a centralized key store including the at least one security policy and at least one security association. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for creating and maintaining a centralized key store comprising:
-
a first security gateway capable of applying a security service associated with an application instance identifier to at least one packet of data to thereby transform the at least one packet of data, wherein the first security gateway is capable of applying the security service to the at least one packet based upon at least one security policy and at least one security association; and
a second security gateway capable of applying the security service associated with the application instance identifier to the at least one transformed packet of data to thereby generate a representation of the at least one packet of data. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A security gateway for creating and maintaining a centralized key store comprising:
-
a security policy database capable of storing at least one security policy, wherein each security policy includes an application instance identifier associated with a security service;
a security association database capable of storing at least one security association; and
a processor capable of creating at least one security association based upon the security service associated with the application instance identifier to thereby create a centralized key store including the at least one security policy and the at least one security association. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer program product for creating and maintaining a centralized key store, the computer program product comprising a computer-readable storage medium having computer-readable program code portions stored therein, the computer-readable program portions comprising:
-
a first executable portion for providing at least one security policy, wherein each security policy includes an application instance identifier associated with a security service; and
a second executable portion for creating at least one security association, wherein the at least one security association is created based upon the security service associated with the application instance identifier to thereby create a centralized key store including the at least one security policy and at least one security association. - View Dependent Claims (17, 18, 19, 20)
-
Specification