Demand based encryption and key generation and distribution systems and methods
First Claim
Patent Images
1. A requester system, comprising:
- a memory designed to store computer program code; and
a processor communicatively coupled to the memory;
wherein when the processor executes the computer program code, the processor is operable to at least;
generate a request, identification information identifying a receiver system, and one or more use parameters associate with a data file;
send the request to a key management system, wherein the sending of the request is configured to cause the key management system to generate a private encryption key and a public encryption key;
send the identification information to the key management system, wherein the sending of the identification information is configured to cause the key management system to send the public encryption key to the receiver system;
receive the private encryption key from the key management system;
modify the data file with the use parameters before the data file is encrypted;
encrypt the data file using the private encryption key; and
send the encrypted data file to the receiver system.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods providing a key management platform that generates and distributes demand-based encryption and decryption keys are described.
199 Citations
30 Claims
-
1. A requester system, comprising:
-
a memory designed to store computer program code; and a processor communicatively coupled to the memory; wherein when the processor executes the computer program code, the processor is operable to at least; generate a request, identification information identifying a receiver system, and one or more use parameters associate with a data file; send the request to a key management system, wherein the sending of the request is configured to cause the key management system to generate a private encryption key and a public encryption key; send the identification information to the key management system, wherein the sending of the identification information is configured to cause the key management system to send the public encryption key to the receiver system; receive the private encryption key from the key management system; modify the data file with the use parameters before the data file is encrypted; encrypt the data file using the private encryption key; and send the encrypted data file to the receiver system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A requester system, comprising:
-
a memory designed to store computer program code; and a processor communicatively coupled to the memory; wherein when the processor executes the computer program code, the processor is operable to at least; generate a request, identification information identifying a receiver system, and one or more use parameters associate with a data file; send the request to a key management system, wherein the sending of the request is configured to cause the key management system to generate a private encryption key and a public encryption key; send the identification information to the key management system, wherein the sending of the identification information is configured to cause the key management system to send the public encryption key to the receiver system; receive the private encryption key from the key management system; encrypt the data file using the private encryption key; send the encrypted data file to the receiver system; and send an access instruction to the receiver system, wherein the sending of the access instruction is configured to prohibit the receiver system from accessing the data file after a first number of access attempts by the receiver system and after an elapsed time period from when the encrypted data file was sent to the receiver system. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A key management system, the system comprising:
-
a memory designed to store computer program code; and a processor communicatively coupled to the memory; wherein when the processor executes the computer program code, the processor is operable to at least; receive, from a requester system, a request to generate a private encryption key and a public encryption key; receive, from the requester system, identification information identifying a receiver system; generate a first private encryption key and a first public encryption key in response to receiving the request; send the first private encryption key to the requester system; send the first public encryption key to the receiver system; and send an instruction specifying the use parameters to an application running on the receiver system, wherein the application controls access to an encrypted data file that was received from the system by the receiver system based on the instruction specifying the use parameters. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
Specification