Data protection for organizations on computing devices
    1.
    发明授权
    Data protection for organizations on computing devices 有权
    计算设备上组织的数据保护

    公开(公告)号:US09430664B2

    公开(公告)日:2016-08-30

    申请号:US13933928

    申请日:2013-07-02

    CPC classification number: G06F21/6218 G06F2221/2143 H04L63/0428

    Abstract: An application on a device can communicate with organization services. The application accesses a protection system on the device, which encrypts data obtained by the application from an organization service using an encryption key, and includes with the data an indication of a decryption key usable to decrypt the encrypted data. The protection system maintains a record of the encryption and decryption keys associated with the organization. The data can be stored in various locations on at least the device, and can be read by various applications on at least the device. If the organization determines that data of the organization stored on a device is to no longer be accessible on the device (e.g., is to be revoked from the device), a command is communicated to the device to revoke data associated with the organization. In response to this command, the protection system deletes the decryption key.

    Abstract translation: 设备上的应用程序可以与组织服务进行通信。 应用程序访问设备上的保护系统,该保护系统使用加密密钥从组织服务加密由应用获得的数据,并且与数据一起包括可用于解密加密数据的解密密钥的指示。 保护系统维护与组织相关联的加密和解密密钥的记录。 该数据可以存储在至少该设备上的各种位置,并且可以至少在该设备上的各种应用程序读取。 如果组织确定存储在设备上的组织的数据在设备上不再可访问(例如,将从设备撤销),则将命令传达到设备以撤销与组织相关联的数据。 响应该命令,保护系统删除解密密钥。

    On-demand emergency management operations in a distributed computing system

    公开(公告)号:US11451405B2

    公开(公告)日:2022-09-20

    申请号:US16276538

    申请日:2019-02-14

    Abstract: Various methods and systems are provided for providing on-demand emergency management. On-demand emergency management includes emergency management operations (e.g., certificate update operations or managed-secrets rollover operations) for accelerated deployment and expedited installation of certificates or secrets. In operation, a host secret manager on a host machine communicates with client secret managers on virtual machines running the host machine, to provide expedited installation of secrets on the virtual machines. During the certificate update operations, the host secret manager communicates the certificate update secret package having a new secret state to a client secret manager that installs the new certificate state on the virtual machine. And, during managed-secrets rollover operations, based on accessing a managed-secrets rollover secret package having a notification-based new secret state, the host secret manager polls a dSMS service, and communicates with a client secret manager, such that client secret manager installs the new secret on the virtual machine.

    Key attestation statement generation providing device anonymity

    公开(公告)号:US10819696B2

    公开(公告)日:2020-10-27

    申请号:US15649085

    申请日:2017-07-13

    Abstract: A computing device sends a request for an attestation certificate to an attestation service along with information regarding the hardware and/or software of the device. The attestation service processes the request and verifies the information received from the device. After verifying the information, the attestation service selects a public/private key pair from a collection of reusable public/private key pairs and generates an attestation certificate for the device and public key of the public/private key pair. This attestation certificate is digitally signed by the attestation service and returned to the device. The private key of the selected public/private key pair is also encrypted to a trusted secure component of the device, ensuring that the key cannot be stolen by malware and re-used on another device, and is returned to the device. The device uses this attestation certificate to access relying parties, and optionally generates additional public/private key pairs and attestation certificates.

Patent Agency Ranking