METHOD AND SYSTEM FOR MANAGING SECURITY IN A COMPUTING ENVIRONMENT
First Claim
1. A method for managing data security in a computing environment, said method comprising:
- receiving, by a processor of a gateway server from a user device, at least one message, wherein each message requests that an encryption key be downloaded to the user device, and wherein the gateway server interfaces between the user device and a cloud comprising a plurality of interconnected computing systems external to the user device;
in response to the received at least one message;
said processor generating at least one unique encryption key for each message, sending the at least one generated encryption key to the user device, and not storing any of the generated encryption keys in the cloud;
for each encryption key having been sent to the user device, said processor receiving each encryption key returned from the user device; and
for each received encryption key, said processor storing each received encryption key in the cloudat a time specific to each received encryption key.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for managing data security in a computing environment. A processor at the gateway server receives, from a user device, at least one message. Each message requests that an encryption key be downloaded to the user device. The gateway server interfaces between the user device and a cloud that includes interconnected computing systems external to the user device. In response to the received at least one message, the processor generates at least one unique encryption key for each message and sends the at least one generated encryption key to the user device, but does not store any of the generated encryption keys in the cloud. For each encryption key having been sent to the user device, the processor receives each encryption key returned from the user device. For each encryption key received from the user device, the processor stores each received encryption key in the cloud.
-
Citations
20 Claims
-
1. A method for managing data security in a computing environment, said method comprising:
-
receiving, by a processor of a gateway server from a user device, at least one message, wherein each message requests that an encryption key be downloaded to the user device, and wherein the gateway server interfaces between the user device and a cloud comprising a plurality of interconnected computing systems external to the user device; in response to the received at least one message;
said processor generating at least one unique encryption key for each message, sending the at least one generated encryption key to the user device, and not storing any of the generated encryption keys in the cloud;for each encryption key having been sent to the user device, said processor receiving each encryption key returned from the user device; and for each received encryption key, said processor storing each received encryption key in the cloudat a time specific to each received encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product, comprising a computer readable storage device having computer readable program code stored therein, said program code containing instructions which, upon being executed by a processor of a gateway server of a computer system implements a method for managing data security in a computing environment, said method comprising:
-
receiving, by the processor of the gateway server from a user device, at least one message, wherein each message requests that an encryption key be downloaded to the user device, and wherein the gateway server interfaces between the user device and a cloud comprising a plurality of interconnected computing systems external to the user device; in response to the received at least one message;
said processor generating at least one unique encryption key for each message, sending the at least one generated encryption key to the user device, and not storing any of the generated encryption keys in the cloud;for each encryption key having been sent to the user device, said processor receiving each encryption key returned from the user device; and for each received encryption key, said processor storing each received encryption key in the cloud at a time specific to each received encryption key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer system comprising a gateway server that includes a processor, a memory coupled to the processor, and a computer readable storage device coupled to the processor, said storage device containing program code which, upon being executed by the processor, implements a method for managing data security in a computing environment, said method comprising:
-
receiving, by the processor of the gateway server from a user device, at least one message, wherein each message requests that an encryption key be downloaded to the user device, and wherein the gateway server interfaces between the user device and a cloud comprising a plurality of interconnected computing systems external to the user device; in response to the received at least one message;
said processor generating at least one unique encryption key for each message, sending the at least one generated encryption key to the user device, and not storing any of the generated encryption keys in the cloud;for each encryption key having been sent to the user device, said processor receiving each encryption key returned from the user device; and for each received encryption key, said processor storing each received encryption key in the cloud at a time specific to each received encryption key. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification