Cryptographic configuration control
First Claim
Patent Images
1. A method of providing object security, comprising:
- selecting an object to secure;
selecting at least one criterion for authorization to access the object;
generating an authorization profile based on the at least one criterion;
generating an encryption key;
binding the authorization profile to at least one of the object and the key; and
encrypting the object with the encryption key.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of providing object security includes selecting an object to secure, selecting at least one criterion for authorization to access the object, generating an authorization profile based on the at least one criterion, generating an encryption key, binding the authorization profile to at least one of the object and the key, and encrypting the object with the encryption key.
143 Citations
23 Claims
-
1. A method of providing object security, comprising:
-
selecting an object to secure;
selecting at least one criterion for authorization to access the object;
generating an authorization profile based on the at least one criterion;
generating an encryption key;
binding the authorization profile to at least one of the object and the key; and
encrypting the object with the encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
Specification