POLICY-ENABLED ENCRYPTION KEYS HAVING EPHEMERAL POLICIES
First Claim
Patent Images
1. A method for evaluating an encryption key based on policies for a policy operation, the method comprising:
- aggregating existing policies for evaluating at least one key attribute of the encryption key;
executing a policy replacement operation replacing at least one existing policy with at least one ephemeral policy; and
evaluating the at least one key attribute based, at least in part, on the at least one ephemeral policy.
2 Assignments
0 Petitions
Accused Products
Abstract
Examples described herein relate to apparatuses and methods for evaluating an encryption key based on policies for a policy operation, including, but not limited to, aggregating existing policies for evaluating at least one key attribute of the encryption key, executing a policy replacement operation replacing at least one existing policy with at least one ephemeral policy, and evaluating the at least one key attribute based, at least in part, on the at least one ephemeral policy.
26 Citations
20 Claims
-
1. A method for evaluating an encryption key based on policies for a policy operation, the method comprising:
-
aggregating existing policies for evaluating at least one key attribute of the encryption key; executing a policy replacement operation replacing at least one existing policy with at least one ephemeral policy; and evaluating the at least one key attribute based, at least in part, on the at least one ephemeral policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable medium comprising computer-readable instructions such that, when executed, causes a processor to:
-
aggregate existing policies for evaluating at least one key attribute of the encryption key; execute a policy replacement operation replacing at least one existing policy with at least one ephemeral policy; and evaluate the at least one key attribute based, at least in part, on the at least one ephemeral policy. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for orchestrating a security object, the system comprising:
-
a memory; and a processor configured to aggregate existing policies for evaluating at least one key attribute of the encryption key; execute a policy replacement operation replacing at least one existing policy with at least one ephemeral policy; and evaluate the at least one key attribute based, at least in part, on the at least one ephemeral policy. - View Dependent Claims (20)
-
Specification