Automatic key rotation

Requests submitted to a computer system are evaluated for compliance with policy to ensure data security. Plaintext and associated data are used as inputs into a cipher to produce ciphertext. Whether a result of decrypting the ciphertext can be provided in response to a request is determined based a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Brandwine, Eric Jason, Roth, Gregory Branchek, Wren, Matthew James, Pratt, Brian Irl
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Brandwine, Eric Jason
Roth, Gregory Branchek
Wren, Matthew James
Pratt, Brian Irl
description Requests submitted to a computer system are evaluated for compliance with policy to ensure data security. Plaintext and associated data are used as inputs into a cipher to produce ciphertext. Whether a result of decrypting the ciphertext can be provided in response to a request is determined based at least in part on evaluation of a policy that itself is based at least in part on the associated data. Other policies include automatic rotation of keys to prevent keys from being used in enough operations to enable cryptographic attacks intended to determine the keys.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US11372993B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US11372993B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US11372993B23</originalsourceid><addsrcrecordid>eNrjZBBzLC3Jz00syUxWyE6tVCjKLwGy8_N4GFjTEnOKU3mhNDeDoptriLOHbmpBfnxqcUFicmpeakl8aLChobG5kaWlsZORMTFqALC3Idc</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Automatic key rotation</title><source>esp@cenet</source><creator>Brandwine, Eric Jason ; Roth, Gregory Branchek ; Wren, Matthew James ; Pratt, Brian Irl</creator><creatorcontrib>Brandwine, Eric Jason ; Roth, Gregory Branchek ; Wren, Matthew James ; Pratt, Brian Irl</creatorcontrib><description>Requests submitted to a computer system are evaluated for compliance with policy to ensure data security. Plaintext and associated data are used as inputs into a cipher to produce ciphertext. Whether a result of decrypting the ciphertext can be provided in response to a request is determined based at least in part on evaluation of a policy that itself is based at least in part on the associated data. Other policies include automatic rotation of keys to prevent keys from being used in enough operations to enable cryptographic attacks intended to determine the keys.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220628&amp;DB=EPODOC&amp;CC=US&amp;NR=11372993B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220628&amp;DB=EPODOC&amp;CC=US&amp;NR=11372993B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Brandwine, Eric Jason</creatorcontrib><creatorcontrib>Roth, Gregory Branchek</creatorcontrib><creatorcontrib>Wren, Matthew James</creatorcontrib><creatorcontrib>Pratt, Brian Irl</creatorcontrib><title>Automatic key rotation</title><description>Requests submitted to a computer system are evaluated for compliance with policy to ensure data security. Plaintext and associated data are used as inputs into a cipher to produce ciphertext. Whether a result of decrypting the ciphertext can be provided in response to a request is determined based at least in part on evaluation of a policy that itself is based at least in part on the associated data. Other policies include automatic rotation of keys to prevent keys from being used in enough operations to enable cryptographic attacks intended to determine the keys.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZBBzLC3Jz00syUxWyE6tVCjKLwGy8_N4GFjTEnOKU3mhNDeDoptriLOHbmpBfnxqcUFicmpeakl8aLChobG5kaWlsZORMTFqALC3Idc</recordid><startdate>20220628</startdate><enddate>20220628</enddate><creator>Brandwine, Eric Jason</creator><creator>Roth, Gregory Branchek</creator><creator>Wren, Matthew James</creator><creator>Pratt, Brian Irl</creator><scope>EVB</scope></search><sort><creationdate>20220628</creationdate><title>Automatic key rotation</title><author>Brandwine, Eric Jason ; Roth, Gregory Branchek ; Wren, Matthew James ; Pratt, Brian Irl</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US11372993B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Brandwine, Eric Jason</creatorcontrib><creatorcontrib>Roth, Gregory Branchek</creatorcontrib><creatorcontrib>Wren, Matthew James</creatorcontrib><creatorcontrib>Pratt, Brian Irl</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Brandwine, Eric Jason</au><au>Roth, Gregory Branchek</au><au>Wren, Matthew James</au><au>Pratt, Brian Irl</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Automatic key rotation</title><date>2022-06-28</date><risdate>2022</risdate><abstract>Requests submitted to a computer system are evaluated for compliance with policy to ensure data security. Plaintext and associated data are used as inputs into a cipher to produce ciphertext. Whether a result of decrypting the ciphertext can be provided in response to a request is determined based at least in part on evaluation of a policy that itself is based at least in part on the associated data. Other policies include automatic rotation of keys to prevent keys from being used in enough operations to enable cryptographic attacks intended to determine the keys.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US11372993B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Automatic key rotation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T05%3A11%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Brandwine,%20Eric%20Jason&rft.date=2022-06-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS11372993B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true