发明名称 SYSTEM AND METHOD FOR POLICY DRIVEN PROTECTION OF REMOTE COMPUTING ENVIRONMENTS
摘要 A system that incorporates teachings of the subject disclosure may include, for example, determining examination results based on sensory information obtained from sensors operating in a deployed environment, wherein the sensory information includes a combination of more than one of temperature, position, motion, and mission status. Software agents conduct reviews of examination results based on sensory ranges. Encryption key fragments are generated in response to the reviews of the examination results. The encryption key fragments are combined, to obtain a cryptographic session key. A clear-text version of encrypted sensitive information is obtained via the cryptographic session key responsive to the examination results falling within the sensory ranges. Decryption of the encrypted sensitive information is prevented responsive at least one of the examination results falling outside the sensory ranges. Other embodiments are disclosed.
申请公布号 US2016255058(A1) 申请公布日期 2016.09.01
申请号 US201615150000 申请日期 2016.05.09
申请人 ANGEL SECURE NETWORKS, INC. 发明人 Smith Fred Hewitt;Smith Cynthia;Smith Benjamin;Sabin Daniel
分类号 H04L29/06;G06F9/445;H04W12/04;H04L9/08;H04W12/02 主分类号 H04L29/06
代理机构 代理人
主权项 1. A method, comprising: determining, by a processing system comprising a processor, a plurality of examination results based on sensory information obtained from a plurality of sensors operating within a deployed environment, wherein the sensory information comprises a combination of more than one of temperature, position, motion, and mission status, and wherein each software agent of a plurality of software agents conducts a review of a respective examination result of the plurality of examination results of the deployed environment based on a plurality of sensory ranges, to obtain reviews of the plurality of examination results of the deployed environment; generating, by the processing system, a plurality of encryption key fragments in response to the reviews of the plurality of examination results of the deployed environment, wherein each encryption key fragment of the plurality of encryption key fragments is determined by a respective software agent of the plurality of software agents, based on the review of the respective examination result of the plurality of examination results of the deployed environment; and combining, by the processing system, key fragments of the plurality of encryption key fragments, to obtain a cryptographic session key, wherein a clear text version of encrypted sensitive information is obtained via the cryptographic session key, responsive to the plurality of examination results of the deployed environment falling within the plurality of sensory ranges, and wherein decryption of the encrypted information is prevented via the cryptographic session key, responsive to an examination result of the plurality of examination results of the deployed environment falling outside of the plurality of sensory ranges.
地址 Old Town ME US