PROTECTION FOR RESTRICTED ACTIONS ON CRITICAL RESOURCES

Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a system of the service provider receives a request to generate a data encryption policy (DEP) for dat...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: CAO, Qi, PANDEY, Ganesh, BAPAT, Amit A, MANEK, Parul, JAYARAMAN, Kameshwar, DHAWAN, Anuj, LIEBERMAN, Steven Jay, DESAI, Brijesh Bhupendra, KOL, Ayla
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator CAO, Qi
PANDEY, Ganesh
BAPAT, Amit A
MANEK, Parul
JAYARAMAN, Kameshwar
DHAWAN, Anuj
LIEBERMAN, Steven Jay
DESAI, Brijesh Bhupendra
KOL, Ayla
description Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a system of the service provider receives a request to generate a data encryption policy (DEP) for data stored by the system of the service provider for a customer, the request including a reference to a customer key and an availability key. The customer key and the availability key are root keys for encrypting a data encryption key. The data encryption key is used to encrypt the data stored by the service provider for the customer. Further, destructive changes to the availability key require receiving an approval from an account of the service provider. The system of the service provider validates the DEP. The system of the service provider stores the DEP based on the validation.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP4288885A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP4288885A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP4288885A13</originalsourceid><addsrcrecordid>eNrjZDAPCPIPcXUO8fT3U3DzD1IIcg0OCfJ0DnF1UXAEiwYrAGWcgzxDPJ0dfUDS_qFBzq7BPAysaYk5xam8UJqbQcHNNcTZQze1ID8-tbggMTk1L7Uk3jXAxMgCCEwdDY2JUAIAFS8oNw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>PROTECTION FOR RESTRICTED ACTIONS ON CRITICAL RESOURCES</title><source>esp@cenet</source><creator>CAO, Qi ; PANDEY, Ganesh ; BAPAT, Amit A ; MANEK, Parul ; JAYARAMAN, Kameshwar ; DHAWAN, Anuj ; LIEBERMAN, Steven Jay ; DESAI, Brijesh Bhupendra ; KOL, Ayla</creator><creatorcontrib>CAO, Qi ; PANDEY, Ganesh ; BAPAT, Amit A ; MANEK, Parul ; JAYARAMAN, Kameshwar ; DHAWAN, Anuj ; LIEBERMAN, Steven Jay ; DESAI, Brijesh Bhupendra ; KOL, Ayla</creatorcontrib><description>Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a system of the service provider receives a request to generate a data encryption policy (DEP) for data stored by the system of the service provider for a customer, the request including a reference to a customer key and an availability key. The customer key and the availability key are root keys for encrypting a data encryption key. The data encryption key is used to encrypt the data stored by the service provider for the customer. Further, destructive changes to the availability key require receiving an approval from an account of the service provider. The system of the service provider validates the DEP. The system of the service provider stores the DEP based on the validation.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20231213&amp;DB=EPODOC&amp;CC=EP&amp;NR=4288885A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20231213&amp;DB=EPODOC&amp;CC=EP&amp;NR=4288885A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>CAO, Qi</creatorcontrib><creatorcontrib>PANDEY, Ganesh</creatorcontrib><creatorcontrib>BAPAT, Amit A</creatorcontrib><creatorcontrib>MANEK, Parul</creatorcontrib><creatorcontrib>JAYARAMAN, Kameshwar</creatorcontrib><creatorcontrib>DHAWAN, Anuj</creatorcontrib><creatorcontrib>LIEBERMAN, Steven Jay</creatorcontrib><creatorcontrib>DESAI, Brijesh Bhupendra</creatorcontrib><creatorcontrib>KOL, Ayla</creatorcontrib><title>PROTECTION FOR RESTRICTED ACTIONS ON CRITICAL RESOURCES</title><description>Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a system of the service provider receives a request to generate a data encryption policy (DEP) for data stored by the system of the service provider for a customer, the request including a reference to a customer key and an availability key. The customer key and the availability key are root keys for encrypting a data encryption key. The data encryption key is used to encrypt the data stored by the service provider for the customer. Further, destructive changes to the availability key require receiving an approval from an account of the service provider. The system of the service provider validates the DEP. The system of the service provider stores the DEP based on the validation.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDAPCPIPcXUO8fT3U3DzD1IIcg0OCfJ0DnF1UXAEiwYrAGWcgzxDPJ0dfUDS_qFBzq7BPAysaYk5xam8UJqbQcHNNcTZQze1ID8-tbggMTk1L7Uk3jXAxMgCCEwdDY2JUAIAFS8oNw</recordid><startdate>20231213</startdate><enddate>20231213</enddate><creator>CAO, Qi</creator><creator>PANDEY, Ganesh</creator><creator>BAPAT, Amit A</creator><creator>MANEK, Parul</creator><creator>JAYARAMAN, Kameshwar</creator><creator>DHAWAN, Anuj</creator><creator>LIEBERMAN, Steven Jay</creator><creator>DESAI, Brijesh Bhupendra</creator><creator>KOL, Ayla</creator><scope>EVB</scope></search><sort><creationdate>20231213</creationdate><title>PROTECTION FOR RESTRICTED ACTIONS ON CRITICAL RESOURCES</title><author>CAO, Qi ; PANDEY, Ganesh ; BAPAT, Amit A ; MANEK, Parul ; JAYARAMAN, Kameshwar ; DHAWAN, Anuj ; LIEBERMAN, Steven Jay ; DESAI, Brijesh Bhupendra ; KOL, Ayla</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP4288885A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2023</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>CAO, Qi</creatorcontrib><creatorcontrib>PANDEY, Ganesh</creatorcontrib><creatorcontrib>BAPAT, Amit A</creatorcontrib><creatorcontrib>MANEK, Parul</creatorcontrib><creatorcontrib>JAYARAMAN, Kameshwar</creatorcontrib><creatorcontrib>DHAWAN, Anuj</creatorcontrib><creatorcontrib>LIEBERMAN, Steven Jay</creatorcontrib><creatorcontrib>DESAI, Brijesh Bhupendra</creatorcontrib><creatorcontrib>KOL, Ayla</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>CAO, Qi</au><au>PANDEY, Ganesh</au><au>BAPAT, Amit A</au><au>MANEK, Parul</au><au>JAYARAMAN, Kameshwar</au><au>DHAWAN, Anuj</au><au>LIEBERMAN, Steven Jay</au><au>DESAI, Brijesh Bhupendra</au><au>KOL, Ayla</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>PROTECTION FOR RESTRICTED ACTIONS ON CRITICAL RESOURCES</title><date>2023-12-13</date><risdate>2023</risdate><abstract>Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a system of the service provider receives a request to generate a data encryption policy (DEP) for data stored by the system of the service provider for a customer, the request including a reference to a customer key and an availability key. The customer key and the availability key are root keys for encrypting a data encryption key. The data encryption key is used to encrypt the data stored by the service provider for the customer. Further, destructive changes to the availability key require receiving an approval from an account of the service provider. The system of the service provider validates the DEP. The system of the service provider stores the DEP based on the validation.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP4288885A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title PROTECTION FOR RESTRICTED ACTIONS ON CRITICAL RESOURCES
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T02%3A40%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=CAO,%20Qi&rft.date=2023-12-13&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP4288885A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true