18515782. SCALABLE KEY STATE FOR NETWORK ENCRYPTION simplified abstract (Hewlett Packard Enterprise Development LP)

From WikiPatents
Revision as of 04:46, 26 July 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

SCALABLE KEY STATE FOR NETWORK ENCRYPTION

Organization Name

Hewlett Packard Enterprise Development LP

Inventor(s)

KEITH D. Underwood of Spring TX (US)

Duncan Roweth of Bristol (GB)

Michael R. Strom of Chippewa Falls WI (US)

Eric Edward Eilertson of Bloomington MN (US)

SCALABLE KEY STATE FOR NETWORK ENCRYPTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18515782 titled 'SCALABLE KEY STATE FOR NETWORK ENCRYPTION

Simplified Explanation: The patent application describes a system for encrypting data using a key server and a secure enclave in a Network Interface Card (NIC) to enhance data security in a distributed system.

  • The NIC acts as a bridge between the client device and the supercomputer system's infrastructure.
  • During enrollment, a decrypted key is stored in the NIC's secure enclave.
  • When a data packet is received from a client device, the NIC requests an encrypted key from a key server.
  • The key server authenticates the NIC using a private/public key pair and provides the pair to the NIC for encrypting data-in-motion.

Key Features and Innovation:

  • Encryption of data using a key server and a secure enclave in a NIC.
  • NIC acts as a passthrough between client devices and the supercomputer system.
  • Secure storage of decrypted keys in the NIC's enclave.
  • Authentication of the NIC by the key server using a private/public key pair.

Potential Applications:

  • Data security in massively scaled and distributed systems.
  • Secure transmission of sensitive information.
  • Protection of data during storage and transfer.

Problems Solved:

  • Ensuring data security in a distributed system.
  • Secure storage and transmission of encryption keys.
  • Authentication of devices in the network.

Benefits:

  • Enhanced data security.
  • Efficient encryption of data.
  • Simplified key management.

Commercial Applications: The technology can be used in cloud computing, IoT devices, and large-scale network systems to ensure data security and privacy.

Prior Art: Readers can explore prior patents related to encryption technologies, key management systems, and secure enclaves in network devices.

Frequently Updated Research: Stay updated on advancements in encryption technologies, network security, and key management systems to enhance data protection in distributed systems.

Questions about Encryption Technology: 1. How does the use of a secure enclave in a NIC enhance data security in distributed systems? 2. What are the potential challenges in implementing encryption using a key server and a NIC in a large-scale network environment?


Original Abstract Submitted

Systems and methods are provided for implementing encryption of data-in-motion and/or otherwise stored data using a key server and a secure enclave of a Network Interface Card (NIC). The NIC acts as a passthrough between the client device and the shared infrastructure of the supercomputer system to help ensure data security in a massively scaled and distributed system. For example, in response to an enrollment process that stores a decrypted key in the secure enclave of a NIC, the NIC can receive a data packet from a client device. The NIC can transmit a key request to a key server that includes an encrypted key corresponding to the decrypted key. The key server can look up the previously stored private/public key pair to authenticate the NIC. The key server can provide private/public key pair to the NIC to allow the NIC to later encrypt data-in-motion.