US 12,255,998 B2
Protecting sensitive information based on authentication factors
Douglas Max Grover, Rigby, ID (US); Alexander Hoole, Vancouver (CA); and Michael F. Angelo, Houston, TX (US)
Assigned to Micro Focus LLC, Santa Clara, CA (US)
Filed by MICRO FOCUS LLC, Santa Clara, CA (US)
Filed on Mar. 30, 2022, as Appl. No. 17/709,061.
Claims priority of provisional application 63/276,988, filed on Nov. 8, 2021.
Prior Publication US 2023/0143395 A1, May 11, 2023
Int. Cl. H04L 9/08 (2006.01); G06F 21/31 (2013.01); G06F 21/44 (2013.01); G06F 21/60 (2013.01)
CPC H04L 9/0897 (2013.01) [G06F 21/31 (2013.01); G06F 21/44 (2013.01); G06F 21/602 (2013.01); H04L 9/0822 (2013.01); H04L 9/0877 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A system comprising:
a microprocessor; and
a non-transitory computer readable medium, coupled with the microprocessor and comprising microprocessor readable and executable instructions that, when executed by the microprocessor, cause the microprocessor to:
receive a request to send sensitive information from a first domain to a second domain;
encrypt the sensitive information, wherein the encrypted sensitive information comprises an authentication field, wherein the authentication field identifies a combination of a plurality of types of authentication factors required to access the sensitive information, and wherein the combination of the plurality of types of authentication factors required are-is determined based on a context of the request;
wherein encrypting the sensitive information comprises encrypting the authentication field using a first level of encryption and encrypting the sensitive Information using a second level of encryption, and wherein the second level of encryption is higher than the first level of encryption; and
send the encrypted sensitive information to the second domain.