SYSTEM AND METHOD FOR OBTAINING KEYS TO ACCESS PROTECTED INFORMATION
First Claim
1. A system comprising:
- a memory to store computer instructions; and
a processor in communication with the memory, wherein the processor, responsive to executing the computer instructions, performs operations comprising;
receiving a request to access information content from a file system;
identifying a network of software agents, each software agent configured to conduct a respective evaluation returning a respective portion of information;
requesting that each software agent in the network of software agents conducts its respective evaluation;
generating a key from the respective portions of information; and
accessing by the key, the information content from the file system.
1 Assignment
0 Petitions
Accused Products
Abstract
A server uses an encryption key to decrypt authentication information thereby facilitating communication with network-accessible applications that may be remotely located from the server. Servers can also use encryption keys to decrypt files containing sensitive data. The encryption key is obtained by a collection of software agents, each providing a portion of information necessary for generating the encryption key. Each software agent performs a respective examination, the results of which determine whether the respective portion of information is valid or not. A complete encryption key can be obtained only when all of the contributing portions of information are valid.
-
Citations
20 Claims
-
1. A system comprising:
-
a memory to store computer instructions; and a processor in communication with the memory, wherein the processor, responsive to executing the computer instructions, performs operations comprising; receiving a request to access information content from a file system; identifying a network of software agents, each software agent configured to conduct a respective evaluation returning a respective portion of information; requesting that each software agent in the network of software agents conducts its respective evaluation; generating a key from the respective portions of information; and accessing by the key, the information content from the file system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving, by a system comprising a processor, a request to access information content from a file system; identifying, by the system, a plurality of software agents, each software agent configured to conduct a respective evaluation returning a respective portion of information; requesting, by the system, that each software agent in the plurality of software agents conducts its respective evaluation; generating, by the system, a key from the respective portions of information; and accessing by the key, the information content from the file system. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A machine-readable storage device, comprising executable instructions which, responsive to being executed by at least one processor, cause the at least one processor to perform operations comprising:
-
receiving a request to access information content from a file system; identifying a chain of software agents, each software agent configured to conduct a respective evaluation returning a respective portion of information; requesting that each software agent in the chain of software agents conduct its respective evaluation; generating a key from the respective portions of information; and accessing the information content from the file system. - View Dependent Claims (18, 19, 20)
-
Specification