Apparatus and method for performing end-to-end encryption
First Claim
1. An apparatus comprising:
- a memory;
a processor communicatively coupled to the memory;
a plurality of token-based rules stored in the memory, wherein a token-based rule facilitates access to a resource; and
computer instructions stored in the memory;
wherein the computer instructions, when executed by the processor, cause the processor to;
receive a first token indicating that a first form of encryption has been performed;
determine, based at least in part upon the first token, at least one token-based rule;
determine, based at least in part upon the token-based rule, that a second form of encryption should be performed, wherein the first form of encryption is associated with a lower layer of the open systems interconnection model than the second form of encryption;
receive a second token indicating that the second form of encryption has been performed;
determine that access to the resource should be granted in response to the determination that the second form of encryption has been performed;
generate a decision token representing the determination that access to the resource should be granted;
transmit the decision token;
grant access to the resource over a network, wherein;
the first token is associated with the network; and
the second token is associated with the resource;
determine, based at least in part upon the token-based rule, that a third form of encryption should be performed in response to receiving the second token;
generate a message indicating that the third form of encryption should be performed; and
transmit the message.
1 Assignment
0 Petitions
Accused Products
Abstract
According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule facilitates access to a resource. The apparatus may receive a first token indicating that a first form of encryption has been performed and determine, based at least in part upon the first token, at least one token-based rule. The apparatus may determine, based at least in part upon the token-based rule, that a second form of encryption should be performed. The apparatus may receive a second token indicating that the second form of encryption has been performed and determine that access to the resource should be granted in response to the determination that the second form of encryption has been performed. The apparatus may then generate a decision token representing the determination that access to the resource should be granted and transmit the decision token.
-
Citations
9 Claims
-
1. An apparatus comprising:
-
a memory; a processor communicatively coupled to the memory; a plurality of token-based rules stored in the memory, wherein a token-based rule facilitates access to a resource; and computer instructions stored in the memory; wherein the computer instructions, when executed by the processor, cause the processor to; receive a first token indicating that a first form of encryption has been performed; determine, based at least in part upon the first token, at least one token-based rule; determine, based at least in part upon the token-based rule, that a second form of encryption should be performed, wherein the first form of encryption is associated with a lower layer of the open systems interconnection model than the second form of encryption; receive a second token indicating that the second form of encryption has been performed; determine that access to the resource should be granted in response to the determination that the second form of encryption has been performed; generate a decision token representing the determination that access to the resource should be granted; transmit the decision token; grant access to the resource over a network, wherein; the first token is associated with the network; and the second token is associated with the resource; determine, based at least in part upon the token-based rule, that a third form of encryption should be performed in response to receiving the second token; generate a message indicating that the third form of encryption should be performed; and transmit the message. - View Dependent Claims (2, 3)
-
-
4. A method comprising:
-
storing, by a memory, a plurality of token-based rules, wherein a token-based rule facilitates access to a resource; receiving, by a processor communicatively coupled to the memory, a first token indicating that a first form of encryption has been performed; determining, by the processor, based at least in part upon the first token, at least one token-based rule; determining, by the processor, based at least in part upon the token-based rule, that a second form of encryption should be performed, wherein the first form of encryption is associated with a lower layer of the open systems interconnection model than the second form of encryption; receiving, by the processor, a second token indicating that the second form of encryption has been performed; determining, by the processor, that access to the resource should be granted in response to the determination that the second form of encryption has been performed; generating, by the processor, a decision token representing the determination that access to the resource should be granted; transmitting, by the processor, the decision token; granting access to the resource over a network, wherein; the first token is associated with the network; and the second token is associated with the resource; determining, by the processor, based at least in part upon the token-based rule, that a third form of encryption should be performed in response to receiving the second token; generating a message indicating that the third form of encryption should be performed; and transmitting the message. - View Dependent Claims (5, 6)
-
-
7. One or more computer-readable non-transitory storage media embodying software that when executed by a processor causes the processor to execute operations comprising:
-
storing a plurality of token-based rules, wherein a token-based rule facilitates access to a resource; receiving a first token indicating that a first form of encryption has been performed; determining, based at least in part upon the first token, at least one token-based rule; determining, based at least in part upon the token-based rule, that a second form of encryption should be performed, wherein the first form of encryption is associated with a lower layer of the open systems interconnection model than the second form of encryption; receiving a second token indicating that the second form of encryption has been performed; determining that access to the resource should be granted in response to the determination that the second form of encryption has been performed; generating a decision token representing the determination that access to the resource should be granted; transmitting the decision token; granting access to the resource over a network, wherein; the first token is associated with the network; and the second token is associated with the resource; determining, based at least in part upon the token-based rule, that a third form of encryption should be performed in response to receiving the second token; generating a message indicating that the third form of encryption should be performed; and transmitting the message. - View Dependent Claims (8, 9)
-
Specification