Patents Assigned to Fornetix LLC
-
Patent number: 11924345Abstract: Embodiments described herein relate to apparatuses and methods for registering and storing a local key associated with a local application of a communication device, including, but not limited to, receiving a request from the communication device to register and store the local key, evaluating the request based on at least one first policy, and sending the request to register and store the local key to a secure key storage.Type: GrantFiled: March 26, 2021Date of Patent: March 5, 2024Assignee: Fornetix LLCInventors: Charles White, Joseph Brand
-
Patent number: 11700244Abstract: Examples described herein relate to apparatuses and methods for evaluating an encryption key based on policies for a policy operation, including, but not limited to, receiving user request for the policy operation, determining one or more of a node, group, client, or user associated with the user request, determining the policies associated with the one or more of the node, group, client, or user based on priority, and evaluating at least one key attribute of an encryption key based, at least in part, on the policies.Type: GrantFiled: December 4, 2020Date of Patent: July 11, 2023Assignee: Fornetix LLCInventors: Stephen Edwards, Gary C. Gardner, Charles White
-
Patent number: 11537195Abstract: Examples described herein relate to a system for orchestrating a security object, including a memory and processor configured to define a plurality of complex policies in a database, wherein the complex policies comprises one or more of EQUAL policy, ONE-OF policy, MEMBER OF policy, NULL policy, NOT-NULL policy, GREATER-THAN policy, GREATER-THAN-OR-EQUAL-TO policy, LESS-THAN policy, or LESS-THAN-OR-EQUAL-TO policy, receive the security object and at least one object attribute associated with the security object, determine acceptability of the security object based, at least in part, on the at least one object attribute and at least one of the plurality of complex policies corresponding to the at least one object attribute, and distribute the security object to at least one communication device associated with the processor when the security object is determined to be acceptable, wherein the at least one communication device establishes communication based, at least in part, on the security object.Type: GrantFiled: November 2, 2020Date of Patent: December 27, 2022Assignee: Fornetix LLCInventors: Charles White, Stephen Edwards
-
Patent number: 11503076Abstract: Systems and methods are described for orchestrating a security object, including, for example, defining and storing a plurality of policies in a database coupled to a policy engine and receiving, by the policy engine, the security object and at least one object attribute associated with the security object. In addition, the policy engine determines the acceptability of the security object based, at least in part, on the at least one object attribute and at least one of the plurality of policies corresponding to the at least one object attribute. The security object to at least one communication device associated with the policy engine is distributed when the security object is determined to be acceptable. The at least one communication device establishes communication based, at least in part, on the security object.Type: GrantFiled: July 20, 2020Date of Patent: November 15, 2022Assignee: Fornetix LLCInventors: Charles White, Joseph Brand, Stephen Edwards
-
Patent number: 11470086Abstract: In various embodiments, there is provide a method for organizing devices in a policy hierarchy. The method includes creating a first node. The method further includes assigning a first policy to the first node. The method further includes creating a second node, the second node referencing the first node as a parent node such that the second node inherits the first policy of the first node.Type: GrantFiled: March 16, 2020Date of Patent: October 11, 2022Assignee: Fornetix LLCInventors: Charles White, Stephen Edwards
-
Publication number: 20210226786Abstract: Embodiments described herein relate to apparatuses and methods for registering and storing a local key associated with a local application of a communication device, including, but not limited to, receiving a request from the communication device to register and store the local key, evaluating the request based on at least one first policy, and sending the request to register and store the local key to a secure key storage.Type: ApplicationFiled: March 26, 2021Publication date: July 22, 2021Applicant: Fornetix LLCInventors: Charles White, Joseph Brand
-
Patent number: 11063980Abstract: Examples described herein relate to systems and methods for integrating and implementing ad hoc groups within a policy hierarchy environment. The ad hoc groups may implement particular guidelines for group membership, policy evaluations, and group actions. Systems and methods provide a framework for creating groups, removing groups, and associating groups, nodes, clients, and users with groups and policy.Type: GrantFiled: February 22, 2017Date of Patent: July 13, 2021Assignee: Fornetix LLCInventors: Stephen Edwards, Gerald J. Stueve, Gary C. Gardner, Charles White
-
Patent number: 10965459Abstract: Embodiments described herein relate to apparatuses and methods for registering and storing a local key associated with a local application of a communication device, including, but not limited to, receiving a request from the communication device to register and store the local key, evaluating the request based on at least one first policy, and sending the request to register and store the local key to a secure key storage.Type: GrantFiled: March 10, 2016Date of Patent: March 30, 2021Assignee: Fornetix LLCInventors: Charles White, Joseph Brand
-
Patent number: 10931653Abstract: Examples described herein relate to manipulation of a structure of a policy hierarchy, while reformulating policies associated with the manipulated nodes, or other nodes effected by the manipulation, of the hierarchy. In some examples, a node may be created, moved, and/or deleted, and the manipulated node (and other nodes effected by the manipulation of the node) may reformulate their respective policies based on their new positions within the policy hierarchy. In some examples, nodes indirectly effected by the hierarchy manipulation may be moved within the hierarchy as a result.Type: GrantFiled: February 22, 2017Date of Patent: February 23, 2021Assignee: Fornetix LLCInventors: Charles White, Gary C. Gardner
-
Patent number: 10917239Abstract: Apparatus and methods for evaluating an encryption key based on policies for a policy operation, including, but not limited to, aggregating existing policies for evaluating at least one key attribute of the encryption key, executing a policy replacement operation replacing at least one existing policy with at least one ephemeral policy, and evaluating the at least one key attribute based, at least in part, on the at least one ephemeral policy.Type: GrantFiled: February 22, 2017Date of Patent: February 9, 2021Assignee: Fornetix LLCInventor: Stephen Edwards
-
Patent number: 10880281Abstract: Examples described herein relate to apparatuses and methods for evaluating an encryption key based on policies for a policy operation, including, but not limited to, receiving user request for the policy operation, determining one or more of a node, group, client, or user associated with the user request, determining the policies associated with the one or more of the node, group, client, or user based on priority, and evaluating at least one key attribute of an encryption key based, at least in part, on the policies.Type: GrantFiled: February 22, 2017Date of Patent: December 29, 2020Assignee: Fornetix LLCInventors: Stephen Edwards, Gary C. Gardner, Charles White
-
Patent number: 10860086Abstract: Examples described herein relate to a system for orchestrating a security object, including a memory and processor configured to define a plurality of complex policies in a database, wherein the complex policies comprises one or more of EQUAL policy, ONE-OF policy, MEMBER OF policy, NULL policy, NOT-NULL policy, GREATER-THAN policy, GREATER-THAN-OR-EQUAL-TO policy, LESS-THAN policy, or LESS-THAN-OR-EQUAL-TO policy, receive the security object and at least one object attribute associated with the security object, determine acceptability of the security object based, at least in part, on the at least one object attribute and at least one of the plurality of complex policies corresponding to the at least one object attribute, and distribute the security object to at least one communication device associated with the processor when the security object is determined to be acceptable, wherein the at least one communication device establishes communication based, at least in part, on the security object.Type: GrantFiled: February 22, 2017Date of Patent: December 8, 2020Assignee: Fornetix LLCInventors: Charles White, Stephen Edwards
-
Patent number: 10742689Abstract: Systems and methods are described for orchestrating a security object, including, for example, defining and storing a plurality of policies in a database coupled to a policy engine and receiving, by the policy engine, the security object and at least one object attribute associated with the security object. In addition, the policy engine determines the acceptability of the security object based, at least in part, on the at least one object attribute and at least one of the plurality of policies corresponding to the at least one object attribute. The security object to at least one communication device associated with the policy engine is distributed when the security object is determined to be acceptable. The at least one communication device establishes communication based, at least in part, on the security object.Type: GrantFiled: April 3, 2019Date of Patent: August 11, 2020Assignee: Fornetix LLCInventors: Charles White, Joseph Brand, Stephen Edwards
-
Patent number: 10630686Abstract: In various embodiments, there is provide a method for organizing devices in a policy hierarchy. The method includes creating a first node. The method further includes assigning a first policy to the first node. The method further includes creating a second node, the second node referencing the first node as a parent node such that the second node inherits the first policy of the first node.Type: GrantFiled: March 10, 2016Date of Patent: April 21, 2020Assignee: Fornetix LLCInventors: Charles White, Stephen Edwards
-
Patent number: 10567355Abstract: Embodiments described herein relate to obtaining a public key for an application of a communication device, including, but not limited to, receiving a request from the communication device to obtain the public key, evaluating the request based on at least one policy, requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized, receiving the public key from the PKI, and sending the public key to the communication device.Type: GrantFiled: April 16, 2018Date of Patent: February 18, 2020Assignee: FORNETIX LLCInventors: Charles White, Stephen Edwards
-
Patent number: 10560440Abstract: Embodiments described herein relate to obtaining a public key for an application of a communication device, including, but not limited to, receiving a request from the communication device to obtain the public key, evaluating the request based on at least one policy, requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized, receiving the public key from the PKI, and sending the public key to the communication device.Type: GrantFiled: March 10, 2016Date of Patent: February 11, 2020Assignee: FORNETIX LLCInventors: Charles White, Stephen Edwards
-
Patent number: 10348485Abstract: Examples describe herein relate to chaining operations under a molecular encryption scheme, including, but not limited to, defining a composite operation, wherein the composite operation comprises two or more separate operations, receiving input for the composite operation, invoking the composite operation for the input, performing the composite operation based on the input, and determining output corresponding to the input.Type: GrantFiled: February 22, 2017Date of Patent: July 9, 2019Assignee: FORNETIX LLCInventors: Gerald J. Stueve, Stephen Edwards, Lina M. Baquero, Charles White
-
Patent number: 10257230Abstract: Systems and methods are described for orchestrating a security object, including, for example, defining and storing a plurality of policies in a database coupled to a policy engine and receiving, by the policy engine, the security object and at least one object attribute associated with the security object. In addition, the policy engine determines the acceptability of the security object based, at least in part, on the at least one object attribute and at least one of the plurality of policies corresponding to the at least one object attribute. The security object to at least one communication device associated with the policy engine is distributed when the security object is determined to be acceptable. The at least one communication device establishes communication based, at least in part, on the security object.Type: GrantFiled: July 27, 2017Date of Patent: April 9, 2019Assignee: FORNETIX LLCInventors: Charles White, Joseph Brand, Stephen Edwards
-
Patent number: 10257175Abstract: Apparatuses and methods are described herein discovering and managing key information, including, but not limited to, obtaining the key information associated with at least one segment, storing the key information, and at least one of generating at least one encryption report based on the key information, exporting the key information, or orchestrating keys based on the key information. In some embodiments, obtaining the key information includes at least interrogating encryption assets associated with at least one segment for key information, and receiving the key information from the encryption assets associated with the at least one segment.Type: GrantFiled: September 19, 2016Date of Patent: April 9, 2019Assignee: FORNETIX LLCInventors: Aravind Babu Thunuguntla, Jonathan Brant Mentzell, James M. Smith, Joseph Brand
-
Patent number: 9967289Abstract: Embodiments described herein relate to apparatuses and methods for enabling applied key management operations at a client including establishing a data connection with a file kernel driver of the client to enable the applied key management operation, receiving a request pertaining to encryption key data, relaying the request pertaining to the encryption key data to an applied key management system, and receiving a response regarding the request from the applied key management system based on at least one policy of the applied key management system.Type: GrantFiled: March 11, 2016Date of Patent: May 8, 2018Assignee: FORNETIX LLCInventors: Charles White, Stephen Edwards