×

KEY MANAGEMENT FOR COMPROMISED ENTERPRISE ENDPOINTS

  • US 20160191476A1
  • Filed: 09/14/2014
  • Published: 06/30/2016
  • Est. Priority Date: 09/14/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • labeling objects on an endpoint with a labeling scheme in which the objects are either in, wherein the objects conform to a compliance policy administered for the endpoint from a remote threat management facility, or the objects are out, wherein the objects do not conform to the compliance policy, thereby providing a plurality of in objects and a plurality of out objects, the objects including at least one of processes, files, and data;

    providing in objects of the endpoint access to encrypted files using a key ring that is remotely managed;

    detecting a compromise of the endpoint; and

    in response to detecting the compromise, deleting key material cached on the endpoint from the key ring, thereby revoking access to the encrypted files by the endpoint.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×