Demand Based Encryption and Key Generation and Distribution Systems and Methods
First Claim
Patent Images
1. A requester system, the system comprising:
- processor operable to;
generate a request, identification information identifying a receiver system, and one or more use parameters associate with a data file;
send the request to a key management system, wherein the sending of the request is configured to cause the key management system to generate a private encryption key and a public encryption key;
send the identification information to the key management system, wherein the sending of the identification information is configured to cause the key management system to send the public encryption key to the receiver system;
receive the private encryption key from the key management system;
encrypt the data file using the private encryption key; and
send the encrypted data file to the receiving system.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods providing a key management platform that generates and distributes demand-based encryption and decryption keys are described.
9 Citations
24 Claims
-
1. A requester system, the system comprising:
processor operable to; generate a request, identification information identifying a receiver system, and one or more use parameters associate with a data file; send the request to a key management system, wherein the sending of the request is configured to cause the key management system to generate a private encryption key and a public encryption key; send the identification information to the key management system, wherein the sending of the identification information is configured to cause the key management system to send the public encryption key to the receiver system; receive the private encryption key from the key management system; encrypt the data file using the private encryption key; and send the encrypted data file to the receiving system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A key management system, the system comprising:
-
a processor operable to; receive, from a requester system, a request to generate a private encryption key and a public encryption key; receive, from the requester system, identification information identifying a receiver system; generate a first private encryption key and a first public encryption key in response to receiving the request; send the first private encryption key to the requester system; and
send the first public encryption key to the receiver system. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A requester system, the system comprising:
-
an interface for receiving an input from a user; and a processor operable to; generate a request for encryption, identification information identifying a receiver system, and one or more use parameters associate with a data file based upon the input from the user; send the request to a key management system, wherein the sending of the request is configured to cause the key management system to identify the user and generate a private encryption key and a public encryption key; send the identification information to the key management system, wherein the sending of the identification information is configured to cause the key management system to send the public encryption key to the receiver system; receive the private encryption key from the key management system; encrypt the data file using the private encryption key and based on the use parameters; and send the encrypted data file to the receiver system. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification