摘要 |
A system that incorporates teachings of the subject disclosure may include, for example, determining examination results based on sensory information obtained from sensors operating in a deployed environment, wherein the sensory information includes a combination of more than one of temperature, position, motion, and mission status. Software agents conduct reviews of examination results based on sensory ranges. Encryption key fragments are generated in response to the reviews of the examination results. The encryption key fragments are combined, to obtain a cryptographic session key. A clear-text version of encrypted sensitive information is obtained via the cryptographic session key responsive to the examination results falling within the sensory ranges. Decryption of the encrypted sensitive information is prevented responsive at least one of the examination results falling outside the sensory ranges. Other embodiments are disclosed. |
主权项 |
1. A method, comprising:
determining, by a processing system comprising a processor, a plurality of examination results based on sensory information obtained from a plurality of sensors operating within a deployed environment, wherein the sensory information comprises a combination of more than one of temperature, position, motion, and mission status, and wherein each software agent of a plurality of software agents conducts a review of a respective examination result of the plurality of examination results of the deployed environment based on a plurality of sensory ranges, to obtain reviews of the plurality of examination results of the deployed environment; generating, by the processing system, a plurality of encryption key fragments in response to the reviews of the plurality of examination results of the deployed environment, wherein each encryption key fragment of the plurality of encryption key fragments is determined by a respective software agent of the plurality of software agents, based on the review of the respective examination result of the plurality of examination results of the deployed environment; and combining, by the processing system, key fragments of the plurality of encryption key fragments, to obtain a cryptographic session key, wherein a clear text version of encrypted sensitive information is obtained via the cryptographic session key, responsive to the plurality of examination results of the deployed environment falling within the plurality of sensory ranges, and wherein decryption of the encrypted information is prevented via the cryptographic session key, responsive to an examination result of the plurality of examination results of the deployed environment falling outside of the plurality of sensory ranges. |