Transient Management of Data Encryption and Authentication

Embodiments relate to a system, program product, and method for use with a physical computing device to process a data access request. The associated data is encrypted with a key pair that includes both a persistent key and a transient key. Both keys require authentication to access the requested da...

Full description

Saved in:
Bibliographic Details
Format Patent
LanguageEnglish
Published 20.09.2018
Online AccessGet full text

Cover

More Information
Summary:Embodiments relate to a system, program product, and method for use with a physical computing device to process a data access request. The associated data is encrypted with a key pair that includes both a persistent key and a transient key. Both keys require authentication to access the requested data. The transient key is subject to real-time monitoring, with changes in situational data selectively affecting the validity of the transient key, and selectively changing the physical state of the physical computing device.