Abstract: Systems and methods are described for orchestrating a security object, including, for example, defining and storing a plurality of policies in a database coupled to a policy engine and receiving, by the policy engine, the security object and at least one object attribute associated with the security object. In addition, the policy engine determines the acceptability of the security object based, at least in part, on the at least one object attribute and at least one of the plurality of policies corresponding to the at least one object attribute. The security object to at least one communication device associated with the policy engine is distributed when the security object is determined to be acceptable. The at least one communication device establishes communication based, at least in part, on the security object.
Type:
Grant
Filed:
October 3, 2014
Date of Patent:
August 8, 2017
Assignee:
Fornetix LLC
Inventors:
Charles White, Joseph Brand, Stephen Edwards
Abstract: Apparatuses and methods are described herein discovering and managing key information, including, but not limited to, obtaining the key information associated with at least one segment, storing the key information, and at least one of generating at least one encryption report based on the key information, exporting the key information, or orchestrating keys based on the key information. In some embodiments, obtaining the key information includes at least interrogating encryption assets associated with at least one segment for key information, and receiving the key information from the encryption assets associated with the at least one segment.
Type:
Application
Filed:
September 19, 2016
Publication date:
March 30, 2017
Applicant:
Fornetix LLC
Inventors:
Aravind Babu Thunuguntla, Jonathan Brant Mentzell, James M. Smith, Joseph Brand
Abstract: Embodiments described herein relate to obtaining a public key for an application of a communication device, including, but not limited to, receiving a request from the communication device to obtain the public key, evaluating the request based on at least one policy, requesting the public key from a public key infrastructure (PKI) in response to determining that the request is authorized, receiving the public key from the PKI, and sending the public key to the communication device.
Abstract: In various embodiments, there is provide a method for organizing devices in a policy hierarchy. The method includes creating a first node. The method further includes assigning a first policy to the first node. The method further includes creating a second node, the second node referencing the first node as a parent node such that the second node inherits the first policy of the first node.
Abstract: Embodiments described herein relate to apparatuses and methods for registering and storing a local key associated with a local application of a communication device, including, but not limited to, receiving a request from the communication device to register and store the local key, evaluating the request based on at least one first policy, and sending the request to register and store the local key to a secure key storage.
Abstract: Embodiments described herein relate to apparatuses and methods for enabling applied key management operations at a client including establishing a data connection with a file kernel driver of the client to enable the applied key management operation, receiving a request pertaining to encryption key data, relaying the request pertaining to the encryption key data to an applied key management system, and receiving a response regarding the request from the applied key management system based on at least one policy of the applied key management system.