发明名称 Systems and methods for implementing transparent encryption
摘要 A method of providing transparent encryption for a web resource includes a key manager receiving an encryption key policy; receiving user identifiers and resource locators; defining an access control list based the user identifiers; generating an encryption key and a key identifier for a first resource locator; and establishing a secure communication channel between first and second watchdog modules. The method also includes the watchdog sending encryption information using the secure communication channel. The method also includes a transparent encryption module storing the encryption key and the access control list in protected memory; receiving an input comprising a request to access the first resource stored in the web resource; determining that the user identifier is included in the access control list; encrypting data using the encryption key; and decrypting data using the encryption key.
申请公布号 US8955042(B2) 申请公布日期 2015.02.10
申请号 US201414150593 申请日期 2014.01.08
申请人 CipherPoint Software, Inc. 发明人 Shea Woody;Fleck Michael
分类号 H04L29/06;G06F21/62 主分类号 H04L29/06
代理机构 Kilpatrick Townsend & Stockton LLP 代理人 Kilpatrick Townsend & Stockton LLP
主权项 1. A method of providing transparent encryption for a web resource, the method comprising: receiving, at a key manager operating on a first server, an encryption key policy; receiving, at the key manager, from the web resource, one or more user identifiers and one or more resource locators, wherein the web resource comprises a file store accessible to a plurality of users and is operated by a resource administrator; defining, at the key manager, an access control list based on a selection of user identifiers; associating, at the key manager, the access control list and the encryption key policy with a first resource locator from the one or more resource locators; generating, at the key manager, an encryption key and a key identifier for the first resource locator; establishing a secure communication channel between the first server and a second server; sending, from the first server, to the second server, encryption information using the secure communication channel, wherein the encryption information comprises: the encryption key, the key identifier, and the access control list; storing, at a transparent encryption module on the second server, the encryption key and the access control list in protected memory; receiving, at the transparent encryption module, from a client device, an input comprising a request to access a first resource stored in the web resource and a user identifier; determining, at the transparent encryption module, that the user identifier is included in the access control list for the first resource; encrypting, at the transparent encryption module, using the encryption key, data that is passed from the client device to the first resource; and decrypting, at the transparent encryption module, using the encryption key, data that is passed from the first resource to the client device.
地址 Round Rock TX US