International Business Machines Corporation
Transient Management of Data Encryption and Authentication
Last updated:
Abstract:
Embodiments relate to a system, program product, and method for use with a physical computing device to process a data access request. The requested data is encrypted with two keys, including a physical device authentication key and a transient key. Access to the data requires authentication on both the device level and situational level. Device situational data is monitored, which includes selectively enabling access to the requested data and de-activation of the transient key in response to a change in the monitored situational data. The transient key de-activation removes access to the requested data.
Status:
Application
Type:
Utility
Filling date:
24 Mar 2021
Issue date:
8 Jul 2021