×

Instant data security in untrusted environments

  • US 9,716,728 B1
  • Filed: 09/10/2013
  • Issued: 07/25/2017
  • Est. Priority Date: 05/07/2013
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of managing keys and policies, comprising:

  • communicating enterprise policies from a key and policy manager in a computing device in an enterprise environment to an agent while the agent is in a computing or communication device in a cloud environment;

    generating keys at the key and policy manager;

    distributing one or more of the keys from the key and policy manager in the enterprise environment to computing or communication devices in the enterprise environment, in accordance with the enterprise policies; and

    enforcing the enterprise policies in the cloud environment via an application of the enterprise policies by the agent in the cloud environment, wherein at least one method operation is executed through a processor,migrating data in the cloud environment from usage of keys generated in the cloud environment to usage of the keys generated at the key and policy manager, via decryption with the keys generated in the cloud environment and re-encryption with the keys generated at the key and policy manager.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×