×

Method and system for managing security in a computing environment

  • US 9,560,019 B2
  • Filed: 02/19/2014
  • Issued: 01/31/2017
  • Est. Priority Date: 04/10/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for managing data security in a computing environment, said method comprising:

  • receiving, by a processor of a gateway server from a user device, at least one message, wherein each message requests that an encryption key be downloaded to the user device, and wherein the gateway server interfaces between the user device and a cloud comprising a plurality of interconnected computing systems external to the user device;

    in response to the received at least one message;

    said processor generating, for each message, at least one unique encryption key for encrypting and decrypting data, sending each encryption key of the at least one generated encryption key to the user device, and not storing any of the generated encryption keys in the cloud, wherein the at least one generated encryption key comprises a first encryption key;

    for each encryption key of the at least one generated encryption key having been sent to the user device, said processor receiving each sent encryption key of the at least one generated encryption key returned from the user device;

    for each received encryption key, said processor validating each received encryption key for use by the processor to encrypt data to be stored in the cloud, wherein said validating each received encryption key comprises storing each received encryption key in the cloud at a time specific to each received encryption key, wherein said storing each received encryption key in the cloud comprises storing the first encryption key in the cloud at a first key storage time;

    said processor storing first data in the cloud at a first data storage time after the first key storage time;

    said processor encrypting the first data, at a first data encryption time after the first data storage time, by using the first encryption key to encrypt the first data; and

    said processor decrypting the encrypted first data, at a first data decryption time after the first data encryption time, by using the first encryption key to decrypt the encrypted first data.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×