Managing use of security keys
First Claim
Patent Images
1. A computer-implemented method, comprising executing, on at, least one processor, the steps of:
- receiving a current request for use of a key that serves as part of a data security system, wherein the current request comprises a current location and a current time and a device identifier identifying a device associated with the current request;
upon receiving the current request, determining at least one policy pertaining to security management of the key to apply to the current request, wherein the at least one policy requires a risk analysis of the current request, further wherein the at least one policy indicates a limit that limits a number of times the key or keys that are part of the data security system can be accessed by the device or a group of devices;
applying the at least one policy to the current request, wherein the said application of the at least one policy comprises analyzing the current, location and the current time and a history in connection with previous requests;
determining a first level of riskiness in connection with the current request based on the application of the at least one policy, wherein the first level of riskiness indicates a high risk in connection with the current request; and
based on the first level of riskiness, determining to refuse permission to use the key, wherein the said determination includes creating a new limit to replace the limit in order to reduce the number of times the key or keys that are part of the data security system can be accessed by the device or the group of devices.
18 Assignments
0 Petitions
Accused Products
Abstract
A method is used in managing use of security keys. Based on a request for use of a key that serves as part of a data security system, a set of criteria to apply to the request is determined. The set of criteria pertain to security management of the key that is subject of the request. The set of criteria is applied to the request; and a result is determined based on the application of the set of criteria.
-
Citations
12 Claims
-
1. A computer-implemented method, comprising executing, on at, least one processor, the steps of:
-
receiving a current request for use of a key that serves as part of a data security system, wherein the current request comprises a current location and a current time and a device identifier identifying a device associated with the current request; upon receiving the current request, determining at least one policy pertaining to security management of the key to apply to the current request, wherein the at least one policy requires a risk analysis of the current request, further wherein the at least one policy indicates a limit that limits a number of times the key or keys that are part of the data security system can be accessed by the device or a group of devices; applying the at least one policy to the current request, wherein the said application of the at least one policy comprises analyzing the current, location and the current time and a history in connection with previous requests; determining a first level of riskiness in connection with the current request based on the application of the at least one policy, wherein the first level of riskiness indicates a high risk in connection with the current request; and based on the first level of riskiness, determining to refuse permission to use the key, wherein the said determination includes creating a new limit to replace the limit in order to reduce the number of times the key or keys that are part of the data security system can be accessed by the device or the group of devices. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system, comprising:
-
a processor and memory; the system configured to; receive a current request for use of a key that serves as part of a data security system, wherein the current request comprises a current location and a current time and a device identifier identifying a device associated with the current request; upon receiving the current request, determine at least one policy pertaining to security management of the key to apply to the current request, wherein the at least one policy requires a risk analysis of the current request, further wherein the at least one policy indicates a limit that limits a number of times the key or keys that are part of the data security system can be accessed by the device or a group of devices; apply the at least one policy to the current request, wherein the said application of the at least one policy comprises analyzing the current location and the current time and a history in connection with previous requests; determine a first level of riskiness in connection with the current request based on the application of the at least one policy, wherein the first level of riskiness indicates a high risk in connection with the current request; and based on the first level of riskiness, determine to refuse permission to use the key, wherein the said determination includes creating a new limit to replace the limit in order to reduce the number of times the key or keys that are part of the data security system can be accessed by the device or the group of devices. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification