Apparatus and Method for Performing End-to-End Encryption
First Claim
1. An apparatus comprising:
- a memory operable to store a plurality of token-based rules, wherein a token-based rule facilitates access to a resource; and
a processor communicatively coupled to the memory and operable to;
receive a first token indicating that a first form of encryption has been performed;
determine, based at least in part upon the first token, at least one token-based rule;
determine, based at least in part upon the token-based rule, that a second form of encryption should be performed;
receive a second token indicating that the second form of encryption has been performed;
determine that access to the resource should be granted in response to the determination that the second form of encryption has been performed;
generate a decision token representing the determination that access to the resource should be granted; and
transmit the decision token.
1 Assignment
0 Petitions
Accused Products
Abstract
According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule facilitates access to a resource. The apparatus may receive a first token indicating that a first form of encryption has been performed and determine, based at least in part upon the first token, at least one token-based rule. The apparatus may determine, based at least in part upon the token-based rule, that a second form of encryption should be performed. The apparatus may receive a second token indicating that the second form of encryption has been performed and determine that access to the resource should be granted in response to the determination that the second form of encryption has been performed. The apparatus may then generate a decision token representing the determination that access to the resource should be granted and transmit the decision token.
-
Citations
18 Claims
-
1. An apparatus comprising:
-
a memory operable to store a plurality of token-based rules, wherein a token-based rule facilitates access to a resource; and a processor communicatively coupled to the memory and operable to; receive a first token indicating that a first form of encryption has been performed; determine, based at least in part upon the first token, at least one token-based rule; determine, based at least in part upon the token-based rule, that a second form of encryption should be performed; receive a second token indicating that the second form of encryption has been performed; determine that access to the resource should be granted in response to the determination that the second form of encryption has been performed; generate a decision token representing the determination that access to the resource should be granted; and transmit the decision token. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
storing, by a memory, a plurality of token-based rules, wherein a token-based rule facilitates access to a resource; receiving, by a processor communicatively coupled to the memory, a first token indicating that a first form of encryption has been performed; determining, by the processor, based at least in part upon the first token, at least one token-based rule; determining, by the processor, based at least in part upon the token-based rule, that a second form of encryption should be performed; receiving, by the processor, a second token indicating that the second form of encryption has been performed; determining, by the processor, that access to the resource should be granted in response to the determination that the second form of encryption has been performed; generating, by the processor, a decision token representing the determination that access to the resource should be granted; and transmitting, by the processor, the decision token. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
store a plurality of token-based rules, wherein a token-based rule facilitates access to a resource; receive a first token indicating that a first form of encryption has been performed; determine, based at least in part upon the first token, at least one token-based rule; determine, based at least in part upon the token-based rule, that a second form of encryption should be performed; receive a second token indicating that the second form of encryption has been performed; determine that access to the resource should be granted in response to the determination that the second form of encryption has been performed; generate a decision token representing the determination that access to the resource should be granted; and transmit the decision token. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification