SYSTEMS AND METHODS FOR MANAGEMENT AND AUTO-GENERATION OF ENCRYPTION KEYS
First Claim
1. An encryption key management system, comprising:
- a key manager to determine when an application program requesting one or more keys is authorized to receive the requested one or more keys and to produce a map of the requested keys;
a key scheduler to schedule at least one key generation event at a pre-determinable time;
a key generator to the at least one generated key at a scheduled key generation event wherein the generated keys are associated with a key set and a key set group and wherein a key set comprises one or more keys and a key set group comprises one or more key sets; and
a key store to store the at least one generated key along with attributes of the key so that each key is associated with a set of attributes of the key.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods and media for managing and generating encryption keys are disclosed. In one embodiment, a processor executes encryption key processing computer code to receive requests for keys from an application program. The processor determines whether the requesting application program executes on a node or server that is within the scope of machines authorized to receive the requested keys. If authorized, the processor produces a key map and sends the key map to the application program, enabling the application program to access one or more keys in the key map. The keys are updated automatically according to a specifiable schedule.
40 Citations
20 Claims
-
1. An encryption key management system, comprising:
-
a key manager to determine when an application program requesting one or more keys is authorized to receive the requested one or more keys and to produce a map of the requested keys; a key scheduler to schedule at least one key generation event at a pre-determinable time; a key generator to the at least one generated key at a scheduled key generation event wherein the generated keys are associated with a key set and a key set group and wherein a key set comprises one or more keys and a key set group comprises one or more key sets; and a key store to store the at least one generated key along with attributes of the key so that each key is associated with a set of attributes of the key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for managing encryption keys, comprising:
-
receiving a call from an application program to provide at least one key associated with a key set or key set group, wherein a key set comprises at least one key and a key set group comprises at least one key set; determining if the application program is within a scope specified for the associated key set or key set group; if the application is within the associated scope, then producing a map of the at least one key associated with the key set or key set group; and generating the at least one key to include in the key set or key set group according to a specifiable schedule. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer program product comprising a computer useable medium having a computer readable program, wherein the computer readable program when executed on a computer causes the computer to:
-
receive a request from an application program to provide one or more keys in a key set or key set group, wherein a key set comprises at least one key and a key set group comprises at least one key set; determine if the application program is within a scope specified for the key set or key set group; if the application is within the specified scope, then produce a map of the requested keys; and generate new keys for a key set according to a predetermined schedule. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification