20240045811. METHOD AND SYSTEM FOR SECURE BACKUP MANAGEMENT OF REMOTE COMPUTING MACHINES USING QUANTUM KEY DISTRIBUTION AND ENCRYPTED RAM simplified abstract (Unknown Organization)

From WikiPatents
Jump to navigation Jump to search

METHOD AND SYSTEM FOR SECURE BACKUP MANAGEMENT OF REMOTE COMPUTING MACHINES USING QUANTUM KEY DISTRIBUTION AND ENCRYPTED RAM

Organization Name

Unknown Organization

Inventor(s)

Oleg Dmitrievich Gurin of Suzdal (RU)

METHOD AND SYSTEM FOR SECURE BACKUP MANAGEMENT OF REMOTE COMPUTING MACHINES USING QUANTUM KEY DISTRIBUTION AND ENCRYPTED RAM - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240045811 titled 'METHOD AND SYSTEM FOR SECURE BACKUP MANAGEMENT OF REMOTE COMPUTING MACHINES USING QUANTUM KEY DISTRIBUTION AND ENCRYPTED RAM

Simplified Explanation

The patent application describes a computer-implemented method for secure management of backup copies of computer devices using quantum key distribution (QKD). The method involves creating a quantum channel between the computer device, user devices, and a QKD device. The QKD device generates symmetric cryptographic keys, with one key transmitted to the user device for storing registry keys and the other key transferred to the computer device.

To perform a backup, the computer device encrypts the state of the processor memory and transfers it to a persistent data storage. The backup can be restored by sending a command from the user device containing a cryptographic key, which is used to form the required backup copy. The backup is then transmitted to the computer device's RAM, and the QKD device transmits a new symmetric key to the CPU to decrypt the primary key. The computer device uses the relevant cryptographic key to restore the backup and store it in RAM.

Potential applications of this technology:

  • Secure backup management for computer devices
  • Protection of sensitive data during backup processes

Problems solved by this technology:

  • Increased security of backups through the use of symmetric cryptographic keys transmitted over a quantum channel
  • Protection of sensitive data during backup and restoration processes

Benefits of this technology:

  • Enhanced security of backup copies due to the use of quantum key distribution
  • Protection of sensitive data from unauthorized access during backup and restoration processes


Original Abstract Submitted

this technical solution relates to the field of digital data processing, in particular to the methods of managing backups of computer devices. the technical result is an increase in the security of backups due to using symmetric cryptographic keys transmitted over a quantum channel, each of which corresponds to a specific backup. the technical result is achieved due to a computer-implemented method of secure management of backup copies of rcm, with the function of ram encryption on the cpu, using quantum key distribution (qkd), under which: a connection is formed between the rcm, at least one user device and a qkd device, while the qkd device creates a quantum channel, which connects the rcm with user devices, and the rcm and the user devices are connected via a data network; qkd device creates symmetric cryptographic keys, one of one of which is transmitted to the user device for storing registry keys, and the second is transferred to rcm, after receiving the key to the rcm, a backup copy (bc) is created with the help of the central processor, state of the processor memory in a given time is encrypted and transferred to a persistent data storage; and the rcm backup is performed through the following stages: a command from user device to restore the bc is sent, and said command contains a cryptographic key, which was used to form the required bc, encrypted using a new symmetric key derived from the qkd device; in response to a received command, the transmission of the bc to the ram of rcm is performed; the qkd device is used to transmit said new symmetric key to the cpu and decrypt the primary key; the central processor with the relevant cryptographic key for the bc is used to restore the rcm, and said rcm is stored in ram and contains the relevant state of the encrypted ram of the rcm.