Transient Management of Data Encryption and Authentication
Embodiments relate to a system, program product, and method for use with a physical computing device to process a data access request. The associated data is encrypted with a key pair that includes both a persistent key and a transient key. Both keys require authentication to access the requested da...
Saved in:
Format | Patent |
---|---|
Language | English |
Published |
20.09.2018
|
Online Access | Get full text |
Cover
Summary: | Embodiments relate to a system, program product, and method for use with a physical computing device to process a data access request. The associated data is encrypted with a key pair that includes both a persistent key and a transient key. Both keys require authentication to access the requested data. The transient key is subject to real-time monitoring, with changes in situational data selectively affecting the validity of the transient key, and selectively changing the physical state of the physical computing device. |
---|