SYSTEM AND METHODS FOR OPPORTUNISTIC CRYPTOGRAPHIC KEY MANAGEMENT ON AN ELECTRONIC DEVICE
First Claim
Patent Images
1. A method for opportunistic cryptographic key management comprising:
- on a first electronic device, generating a security capability score based on hardware capabilities, platform enabled capabilities, and qualitative capabilities of the first electronic device, wherein the security capability score is generated in part based on indirectly determined capabilities;
selecting a key management mode, comprising a generation mode and a storage mode, based on the security capability score, wherein the generation mode is one of an on-device generation mode, a cloud generation mode, and a second device generation mode, wherein the storage mode is one of a hardware security mode, a platform security mode, and a secured storage mode;
generating a cryptographic key based on the key management mode; and
storing the cryptographic key based on the key management mode.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for opportunistic cryptographic key management includes generating a security capability assessment on a first electronic device based on security capabilities of the device, selecting a key management mode based on the security capability assessment, generating a cryptographic key based on the key management mode, and storing the cryptographic key based on the key management mode.
31 Citations
20 Claims
-
1. A method for opportunistic cryptographic key management comprising:
-
on a first electronic device, generating a security capability score based on hardware capabilities, platform enabled capabilities, and qualitative capabilities of the first electronic device, wherein the security capability score is generated in part based on indirectly determined capabilities; selecting a key management mode, comprising a generation mode and a storage mode, based on the security capability score, wherein the generation mode is one of an on-device generation mode, a cloud generation mode, and a second device generation mode, wherein the storage mode is one of a hardware security mode, a platform security mode, and a secured storage mode; generating a cryptographic key based on the key management mode; and storing the cryptographic key based on the key management mode. - View Dependent Claims (2, 3)
-
-
4. A method for opportunistic cryptographic key management comprising:
-
on a first electronic device, generating a security capability assessment based on security capabilities of the first electronic device; selecting a key management mode based on the security capability assessment; generating a cryptographic key based on the key management mode; and storing the cryptographic key based on the key management mode. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification