US 12,081,662 B2
Automated key and encryption system
Zhongping Wang, Shanghai (CN); Shamna Mattammel, San Jose, CA (US); Ashwin Ambekar, San Jose, CA (US); Weiji Shi, San Jose, CA (US); and Sriram Govindasamy, San Jose, CA (US)
Assigned to eBay Inc., San Jose, CA (US)
Appl. No. 16/065,415
Filed by eBay Inc., San Jose, CA (US)
PCT Filed Jun. 5, 2018, PCT No. PCT/CN2018/089928
§ 371(c)(1), (2) Date Jun. 22, 2018,
PCT Pub. No. WO2019/232692, PCT Pub. Date Dec. 12, 2019.
Prior Publication US 2021/0211283 A1, Jul. 8, 2021
Int. Cl. H04L 9/08 (2006.01)
CPC H04L 9/0891 (2013.01) [H04L 9/0819 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
storing, by an encryption system, a first key policy in association with a first key and a second key policy in association with a second key;
determining a remote machine stores a first application affected by the first key policy and a second application affected by the second key policy, the first application utilizing the first key to encrypt first data, and the second application utilizing the second key to encrypt second data;
determining the first key of the first application is non-compliant with the first key policy;
in response to the determining that the first key of the first application is non-compliant with the first key policy, sending a request to deploy a third key;
determining that the second key of the second application is non-compliant with the second key policy;
identifying an exception corresponding to the second key policy associated with an owner identifier of the second key and digital signature for verified contents of the second key;
in response to the second application being non-compliant, suppressing a second request to update the second key based on the exception associated with the owner identifier and the digital signature;
receiving a first response at the encryption system, the first response including a result of the request to deploy the third key and a suppression of the second request.