×

Managing use of security keys

  • US 9,774,446 B1
  • Filed: 12/31/2012
  • Issued: 09/26/2017
  • Est. Priority Date: 12/31/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising executing, on at, least one processor, the steps of:

  • receiving a current request for use of a key that serves as part of a data security system, wherein the current request comprises a current location and a current time and a device identifier identifying a device associated with the current request;

    upon receiving the current request, determining at least one policy pertaining to security management of the key to apply to the current request, wherein the at least one policy requires a risk analysis of the current request, further wherein the at least one policy indicates a limit that limits a number of times the key or keys that are part of the data security system can be accessed by the device or a group of devices;

    applying the at least one policy to the current request, wherein the said application of the at least one policy comprises analyzing the current, location and the current time and a history in connection with previous requests;

    determining a first level of riskiness in connection with the current request based on the application of the at least one policy, wherein the first level of riskiness indicates a high risk in connection with the current request; and

    based on the first level of riskiness, determining to refuse permission to use the key, wherein the said determination includes creating a new limit to replace the limit in order to reduce the number of times the key or keys that are part of the data security system can be accessed by the device or the group of devices.

View all claims
  • 18 Assignments
Timeline View
Assignment View
    ×
    ×