ENCRYPTION MANAGEMENT IN AN INFORMATION HANDLING SYSTEM
First Claim
Patent Images
1. A method of enforcing an encryption policy in an information handling system comprising steps of:
- receiving a request for access to data;
automatically identifying from a plurality of encryption policies a particular encryption policy associated with the requested data;
selecting an available encryption implementation module capable of enforcing the identified encryption policy; and
initiating an encryption or decryption of the requested data using the selected encryption implementation module.
8 Assignments
0 Petitions
Accused Products
Abstract
A method of enforcing an encryption policy in an information handling system for receiving a request for access to data, automatically identifying from a plurality of encryption policies a particular encryption policy associated with the requested data, selecting an available encryption implementation module capable of enforcing the identified encryption policy, and initiating an encryption or decryption of the requested data using the selected encryption implementation module.
-
Citations
20 Claims
-
1. A method of enforcing an encryption policy in an information handling system comprising steps of:
-
receiving a request for access to data; automatically identifying from a plurality of encryption policies a particular encryption policy associated with the requested data; selecting an available encryption implementation module capable of enforcing the identified encryption policy; and initiating an encryption or decryption of the requested data using the selected encryption implementation module. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. Software embodied in tangible computer-readable media and, when executed by a processor, operable to:
-
receive a request for access to data; automatically identify from a plurality of encryption policies a particular encryption policy associated with the requested data; select an available encryption implementation module capable of enforcing the identified encryption policy; and initiate an encryption or decryption of the requested data using the selected encryption implementation module. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An information handling system comprising:
-
a processor; a memory coupled to the processor; and a security policy enforcement subsystem enabled to; receive a request for access to data; automatically identify from a plurality of encryption policies a particular encryption policy associated with the requested data; select an available encryption implementation module capable of enforcing the identified encryption policy; and initiate an encryption or decryption of the requested data using the selected encryption implementation module. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification