Automated validation and execution of cryptographic key and certificate deployment and distribution
First Claim
Patent Images
1. A method for implementing automated validation and execution of cryptographic key and certificate deployment and distribution utilizing a computer processor, the method comprising:
- configuring the computer processor to provide one or more keys and automatically generate one or more keys on demand during deployment;
providing one or more key deployment points;
distributing the one or more keys to the one or more key deployment points in an automated manner based on a pattern-based mapping of each of the one or more keys to be distributed to each of the one or more key deployment points;
automatically adding and removing the key deployment points in response to the distribution of the one or more keys, wherein the key deployment changes are implemented by;
creating a desired deployment matrix based on the union of the desired deployment source and the current deployment source and on the union of the desired deployment destination and the current deployment destination; and
automatically updating the one or more keys in response to the distribution of the one or more keys, wherein updating the one or more keys is at least partly based on a previous distribution of each of said one or more keys.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for automated validation and execution of cryptographic key and certificate deployment and distribution includes providing one or more keys; providing one or more key deployment points; and distributing the one or more keys to the one or more key deployment points in an automated manner based on a matrix or pattern mapping of each of the one or more keys to be distributed to each of the one or more key deployment points.
22 Citations
25 Claims
-
1. A method for implementing automated validation and execution of cryptographic key and certificate deployment and distribution utilizing a computer processor, the method comprising:
-
configuring the computer processor to provide one or more keys and automatically generate one or more keys on demand during deployment; providing one or more key deployment points; distributing the one or more keys to the one or more key deployment points in an automated manner based on a pattern-based mapping of each of the one or more keys to be distributed to each of the one or more key deployment points; automatically adding and removing the key deployment points in response to the distribution of the one or more keys, wherein the key deployment changes are implemented by; creating a desired deployment matrix based on the union of the desired deployment source and the current deployment source and on the union of the desired deployment destination and the current deployment destination; and automatically updating the one or more keys in response to the distribution of the one or more keys, wherein updating the one or more keys is at least partly based on a previous distribution of each of said one or more keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product, comprising:
-
computer readable computer program code stored on a non-transient computer readable storage medium for implementing automated validation and execution of cryptographic key and certificate deployment and distribution; and instructions for causing a computer to provide one or more keys; provide one or more key deployment points; and distribute the one or more keys to the one or more key deployment points in an automated manner based on a mapping of each of the one or more keys to be distributed to each of the one or more key deployment points; create a desired deployment matrix based on the union of the desired deployment source and the current deployment source and on the union of the desired deployment destination and the current deployment destination; subtract the current deployment matrix from the desired deployment matrix; and automatically update the one or more keys in response to the distribution of the one or more keys, at least partly based on a previous distribution of each of said one or more keys. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for implementing automated validation and execution of cryptographic key and certificate deployment and distribution, comprising:
a computing network including a processing device in communication with one or more computer memory storage devices, the computing network being configured to implement a method for automated validation and execution of cryptographic key and certificate deployment and distribution, the method including; providing one or more keys; providing one or more key deployment points; and distributing the one or more keys to the one or more key deployment points in an automated manner based on a mapping of each of the one or more keys to be distributed to each of the one or more key deployment points, wherein each of the one or more keys does not appear more than once in the same key deployment point; creating a desired deployment matrix based on the union of the desired deployment source and the current deployment source and on the union of the desired deployment destination and the current deployment destination; and automatically updating the one or more keys in response to the distribution of the one or more keys, wherein updating the one or more keys comprises removing the one or more keys from at least one of the one or more key deployment points based at least partly on a previous distribution of keys. - View Dependent Claims (20, 21, 22, 23, 24, 25)
Specification