US 12,457,099 B2
Systems and methods of post-quantum security management
David Steven Krauthamer, Tiburon, CA (US); Samuel Joseph Sanzeri, San Mateo, CA (US); Konstantin Vilk, Indian Shores, FL (US); Rebecca Rose Krauthamer, Tiburon, CA (US); Austin Graham Bosarge, Petaluma, CA (US); and Barry Scott Van Hooser, Pleasanton, CA (US)
Assigned to QuSecure, Inc, Petaluma, CA (US)
Filed by Qusecure, Inc, Pleasanton, CA (US)
Filed on Jan. 19, 2024, as Appl. No. 18/417,419.
Application 18/417,419 is a continuation of application No. 17/218,100, filed on Mar. 30, 2021, granted, now 11,936,778.
Claims priority of provisional application 63/002,062, filed on Mar. 30, 2020.
Prior Publication US 2025/0047476 A1, Feb. 6, 2025
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/08 (2006.01); H04L 9/06 (2006.01); H04L 9/40 (2022.01); H04L 9/00 (2022.01)
CPC H04L 9/0852 (2013.01) [H04L 9/06 (2013.01); H04L 63/0428 (2013.01); H04L 63/20 (2013.01); H04L 9/50 (2022.05)] 27 Claims
OG exemplary drawing
 
1. A data security management system, comprising:
a communications interface operatively coupled to a network comprising a plurality of nodes, wherein a first node is configured to process at least one portion of data in the network; and
a computing device operatively coupled to the communications interface,
wherein the computing device is configured to:
(1) receive at least one portion of the data;
(2) apply to the data at least one cryptographic algorithm;
(3) generate the at least one portion of the data in encrypted forms produced by the at least one cryptographic algorithm; and
(4) transmit the at least one portion of data in encrypted forms to at least one second node of the network via the communications interface, wherein the cryptographic algorithm is a post-quantum cryptographic algorithm; further comprising a security policy manager operatively connected to the computing device wherein said security policy manager is configured to select the cryptographic algorithm used by the computing device, wherein the security policy manager is configured to perform at least one of:
enabling use of at least one post-quantum cryptographic algorithm;
initiating the creation of at least one key to be used in the post-quantum cryptographic algorithm;
enabling the use of the at least one key used by the processing device to encrypt said at least one portion of data; and
managing the at least one key;
wherein, using a post quantum digital signature, the security policy manager is further configured to validate a connection from an endpoint, the at least one second node, or the at least one third node.