18188768. ENCRYPT SHARED DATA WITH AN AGGREGATE KEY DERIVED FROM MULTIPLE CRYPTO KEYCHAINS simplified abstract (SAP SE)

From WikiPatents
Revision as of 06:31, 1 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

ENCRYPT SHARED DATA WITH AN AGGREGATE KEY DERIVED FROM MULTIPLE CRYPTO KEYCHAINS

Organization Name

SAP SE

Inventor(s)

Sunil Jain of Portland OR (US)

ENCRYPT SHARED DATA WITH AN AGGREGATE KEY DERIVED FROM MULTIPLE CRYPTO KEYCHAINS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18188768 titled 'ENCRYPT SHARED DATA WITH AN AGGREGATE KEY DERIVED FROM MULTIPLE CRYPTO KEYCHAINS

Simplified Explanation

In this patent application, individual data owner key encryption keys are combined to create a single longer key using a key derivative function. This aggregated key is then verified using policy-as-code to determine access rights to the data.

  • Individual data owner key encryption keys are concatenated to form a longer key.
  • A key derivative function is applied to derive an aggregate key.
  • Policy-as-code is used to verify access rights to the data.

Key Features and Innovation

  • Concatenation of individual data owner keys for enhanced security.
  • Key derivative function for deriving an aggregate key.
  • Policy-as-code verification for access control.

Potential Applications

This technology can be applied in secure data storage, access control systems, and encryption protocols.

Problems Solved

  • Enhanced security by combining individual keys.
  • Simplified access control through policy-as-code verification.

Benefits

  • Improved data security.
  • Streamlined access control processes.
  • Enhanced encryption protocols.

Commercial Applications

Secure data storage solutions, access control systems for sensitive information, encryption software development.

Prior Art

Readers can explore prior research on key aggregation, access control mechanisms, and encryption technologies for related information.

Frequently Updated Research

Stay informed about advancements in key aggregation techniques, access control policies, and encryption protocols for the latest developments in data security.

Questions about Key Aggregation

How does key aggregation enhance data security?

Key aggregation combines individual keys to create a stronger, more secure encryption key, reducing the risk of unauthorized access to sensitive information.

What role does policy-as-code play in access control with aggregated keys?

Policy-as-code is used to verify the validity and authority of the aggregate key for data access, ensuring only authorized users can interact with the data.


Original Abstract Submitted

In an implementation, all individual data owner key encryption keys (KEKs) are concatenated, as a concatenated key, to form a single longer key. A key derivative function (KDF) is applied to the concatenated key to derive an aggregateKey of a certain target property. Policy-as-code is applied to verify a current validity/authority of the aggregateKey on data of an individual data owner to allow any operations on the data of an individual data owner.