×

KEY MANAGEMENT FOR COMPROMISED ENTERPRISE ENDPOINTS

  • US 20170078093A1
  • Filed: 11/23/2016
  • Published: 03/16/2017
  • Est. Priority Date: 09/14/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • labeling objects on an endpoint with a labeling scheme in which the objects are either in, wherein the objects conform to a compliance policy administered for the endpoint from a remote threat management facility, or the objects are out, wherein the objects do not conform to the compliance policy, thereby providing a plurality of in objects and a plurality of out objects, the objects including at least one of processes, files, and data;

    for in objects of the endpoint, providing access to encrypted files through a file system, with access to the encrypted files controlled by the file system;

    detecting a compromise of the endpoint based on a change in compliance of an in process; and

    in response to detecting the compromise, deleting key material cached on the endpoint, thereby revoking access to the encrypted files by the endpoint.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×