LABEL-BASED DOUBLE KEY ENCRYPTION
Double key encryption encrypts sensitive data using a content key, obtains a user public key from a key management service, encrypts the content key using the user public key, and encrypts the result using a cloud service provider key. Data confidentiality is protected efficiently through multilevel...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | BRENDON, Kurt Matthew KARANAM, Ajay Kumar BEST, Ryan Jay LITWACK, Laurie Lee DORESWAMY, Kiran LEVIN, Benjamin Sean KANAKASABESAN, Kartik Tirunelveli |
description | Double key encryption encrypts sensitive data using a content key, obtains a user public key from a key management service, encrypts the content key using the user public key, and encrypts the result using a cloud service provider key. Data confidentiality is protected efficiently through multilevel encryption and also by utilizing keys that are managed by different entities. Sensitivity labeling allows analytics to track sensitive data without compromising confidentiality. Compliance mechanisms may use attribute-based access control to support storage of sensitive data in a cloud, but only inside a permitted region, and without giving the cloud service provider access to the sensitive data. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2021344485A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2021344485A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2021344485A13</originalsourceid><addsrcrecordid>eNrjZFD0cXRy9dF1cgx2dVFw8Q918nFV8HaNVHD1cw6KDAjx9PfjYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBkaGxiYmJhamjobGxKkCAIvKIvk</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>LABEL-BASED DOUBLE KEY ENCRYPTION</title><source>esp@cenet</source><creator>BRENDON, Kurt Matthew ; KARANAM, Ajay Kumar ; BEST, Ryan Jay ; LITWACK, Laurie Lee ; DORESWAMY, Kiran ; LEVIN, Benjamin Sean ; KANAKASABESAN, Kartik Tirunelveli</creator><creatorcontrib>BRENDON, Kurt Matthew ; KARANAM, Ajay Kumar ; BEST, Ryan Jay ; LITWACK, Laurie Lee ; DORESWAMY, Kiran ; LEVIN, Benjamin Sean ; KANAKASABESAN, Kartik Tirunelveli</creatorcontrib><description>Double key encryption encrypts sensitive data using a content key, obtains a user public key from a key management service, encrypts the content key using the user public key, and encrypts the result using a cloud service provider key. Data confidentiality is protected efficiently through multilevel encryption and also by utilizing keys that are managed by different entities. Sensitivity labeling allows analytics to track sensitive data without compromising confidentiality. Compliance mechanisms may use attribute-based access control to support storage of sensitive data in a cloud, but only inside a permitted region, and without giving the cloud service provider access to the sensitive data.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2021</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20211104&DB=EPODOC&CC=US&NR=2021344485A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,777,882,25545,76296</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20211104&DB=EPODOC&CC=US&NR=2021344485A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>BRENDON, Kurt Matthew</creatorcontrib><creatorcontrib>KARANAM, Ajay Kumar</creatorcontrib><creatorcontrib>BEST, Ryan Jay</creatorcontrib><creatorcontrib>LITWACK, Laurie Lee</creatorcontrib><creatorcontrib>DORESWAMY, Kiran</creatorcontrib><creatorcontrib>LEVIN, Benjamin Sean</creatorcontrib><creatorcontrib>KANAKASABESAN, Kartik Tirunelveli</creatorcontrib><title>LABEL-BASED DOUBLE KEY ENCRYPTION</title><description>Double key encryption encrypts sensitive data using a content key, obtains a user public key from a key management service, encrypts the content key using the user public key, and encrypts the result using a cloud service provider key. Data confidentiality is protected efficiently through multilevel encryption and also by utilizing keys that are managed by different entities. Sensitivity labeling allows analytics to track sensitive data without compromising confidentiality. Compliance mechanisms may use attribute-based access control to support storage of sensitive data in a cloud, but only inside a permitted region, and without giving the cloud service provider access to the sensitive data.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2021</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFD0cXRy9dF1cgx2dVFw8Q918nFV8HaNVHD1cw6KDAjx9PfjYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBkaGxiYmJhamjobGxKkCAIvKIvk</recordid><startdate>20211104</startdate><enddate>20211104</enddate><creator>BRENDON, Kurt Matthew</creator><creator>KARANAM, Ajay Kumar</creator><creator>BEST, Ryan Jay</creator><creator>LITWACK, Laurie Lee</creator><creator>DORESWAMY, Kiran</creator><creator>LEVIN, Benjamin Sean</creator><creator>KANAKASABESAN, Kartik Tirunelveli</creator><scope>EVB</scope></search><sort><creationdate>20211104</creationdate><title>LABEL-BASED DOUBLE KEY ENCRYPTION</title><author>BRENDON, Kurt Matthew ; KARANAM, Ajay Kumar ; BEST, Ryan Jay ; LITWACK, Laurie Lee ; DORESWAMY, Kiran ; LEVIN, Benjamin Sean ; KANAKASABESAN, Kartik Tirunelveli</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2021344485A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2021</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>BRENDON, Kurt Matthew</creatorcontrib><creatorcontrib>KARANAM, Ajay Kumar</creatorcontrib><creatorcontrib>BEST, Ryan Jay</creatorcontrib><creatorcontrib>LITWACK, Laurie Lee</creatorcontrib><creatorcontrib>DORESWAMY, Kiran</creatorcontrib><creatorcontrib>LEVIN, Benjamin Sean</creatorcontrib><creatorcontrib>KANAKASABESAN, Kartik Tirunelveli</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>BRENDON, Kurt Matthew</au><au>KARANAM, Ajay Kumar</au><au>BEST, Ryan Jay</au><au>LITWACK, Laurie Lee</au><au>DORESWAMY, Kiran</au><au>LEVIN, Benjamin Sean</au><au>KANAKASABESAN, Kartik Tirunelveli</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>LABEL-BASED DOUBLE KEY ENCRYPTION</title><date>2021-11-04</date><risdate>2021</risdate><abstract>Double key encryption encrypts sensitive data using a content key, obtains a user public key from a key management service, encrypts the content key using the user public key, and encrypts the result using a cloud service provider key. Data confidentiality is protected efficiently through multilevel encryption and also by utilizing keys that are managed by different entities. Sensitivity labeling allows analytics to track sensitive data without compromising confidentiality. Compliance mechanisms may use attribute-based access control to support storage of sensitive data in a cloud, but only inside a permitted region, and without giving the cloud service provider access to the sensitive data.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2021344485A1 |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | LABEL-BASED DOUBLE KEY ENCRYPTION |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T14%3A31%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=BRENDON,%20Kurt%20Matthew&rft.date=2021-11-04&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2021344485A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |