×

System and method for policy driven protection of remote computing environments

  • US 9,355,228 B2
  • Filed: 07/15/2013
  • Issued: 05/31/2016
  • Est. Priority Date: 07/13/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for securely producing a cryptographic session key, comprising:

  • establishing, by a transportable device comprising at least one processor and a plurality of sensors, a software agent network comprising a plurality of software agents networked together in a predetermined configuration according to a network definition file, wherein the transportable device, when deployed in a predetermined environment, contains encrypted sensitive information;

    obtaining, by the transportable device, a plurality of examination results based on sensory information obtained from the plurality of sensors operating within the predetermined environment when deployed therein, wherein the sensory information comprises a combination of more than one of temperature, humidity, light, position, orientation, altitude, motion, speed, acceleration, biological information, and mission status, and wherein each software agent of the plurality of software agents conducts a review of a respective examination result of the plurality of examination results of the predetermined environment based on a plurality of predetermined sensory ranges, to obtain reviews of the plurality of examination results of the predetermined environment;

    generating, by the transportable device, a plurality of encryption key fragments in response to the reviews of the plurality of examination results of the predetermined environment, wherein each encryption key fragment of the plurality of encryption key fragments is determined by a respective software agent of the plurality of software agents, based on the review of the respective examination result of the plurality of examination results of the predetermined environment;

    combining, by the transportable device, the plurality of encryption key fragments based on the network definition file, to obtain a field-determined cryptographic session key;

    responsive to the plurality of examination results of the predetermined environment falling within the plurality of sensory ranges, decrypting, by the transportable device, the encrypted sensitive information by way of the field-determined session key, to obtain a clear text version of the sensitive information at the transportable device; and

    responsive to at least one of the plurality of examination results of the predetermined environment falling outside of the plurality of sensory ranges, preventing, by the transportable device, decryption of the encrypted sensitive information at the transportable device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×