×

System and methods for opportunistic cryptographic key management on an electronic device

  • US 9,774,448 B2
  • Filed: 10/27/2014
  • Issued: 09/26/2017
  • Est. Priority Date: 10/30/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for cryptographic key generation and management comprising:

  • configuring a first computing device to select a cryptographic key management mode, wherein selecting the cryptographic key management mode includes dynamically selecting the cryptographic key management mode according to an option prioritization, wherein option prioritization defines a priority of available key management modes and is based on cryptographic key management policy rules;

    prior to generating a cryptographic key for use by the first computing device, generating by the first computing device a security capability score of the first computing device, wherein the security capability score is based on a combination of hardware capabilities, platform enabled capabilities, and qualitative capabilities of the first computing device, wherein the security capability score is generated in part based on indirectly determined capabilities;

    in response to generating the security capability score, automatically selecting the cryptographic key management mode comprising a generation mode and a storage mode, wherein the generation mode is one of an on-device generation mode, a remote cloud generation mode, and a second computing device generation mode, wherein the storage mode is one of a hardware security mode, a platform security mode, and a secured storage mode;

    determining by the first computing device whether to generate the cryptographic key on the first computing device based on the security capability score of the first computing device and the selected key management mode, wherein;

    (i) if the security capability score of the first computing device satisfies a threshold, then generating the cryptographic key on the first computing device, and(ii) if the security capability score of the first computing device does not satisfy the threshold, then generating the cryptographic key at a remote cloud service or at a second computing device; and

    storing the cryptographic key based on the key management mode;

    selectively allowing and disallowing retrieval or use of the cryptographic key based on the selected cryptographic key management mode and a security measure.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×