18188768. ENCRYPT SHARED DATA WITH AN AGGREGATE KEY DERIVED FROM MULTIPLE CRYPTO KEYCHAINS simplified abstract (SAP SE)
Contents
- 1 ENCRYPT SHARED DATA WITH AN AGGREGATE KEY DERIVED FROM MULTIPLE CRYPTO KEYCHAINS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 ENCRYPT SHARED DATA WITH AN AGGREGATE KEY DERIVED FROM MULTIPLE CRYPTO KEYCHAINS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Key Features and Innovation
- 1.6 Potential Applications
- 1.7 Problems Solved
- 1.8 Benefits
- 1.9 Commercial Applications
- 1.10 Prior Art
- 1.11 Frequently Updated Research
- 1.12 Questions about Key Aggregation
- 1.13 Original Abstract Submitted
ENCRYPT SHARED DATA WITH AN AGGREGATE KEY DERIVED FROM MULTIPLE CRYPTO KEYCHAINS
Organization Name
Inventor(s)
Sunil Jain of Portland OR (US)
ENCRYPT SHARED DATA WITH AN AGGREGATE KEY DERIVED FROM MULTIPLE CRYPTO KEYCHAINS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18188768 titled 'ENCRYPT SHARED DATA WITH AN AGGREGATE KEY DERIVED FROM MULTIPLE CRYPTO KEYCHAINS
Simplified Explanation
In this patent application, individual data owner key encryption keys are combined to create a single longer key using a key derivative function. This aggregated key is then verified using policy-as-code to determine access rights to the data.
- Individual data owner key encryption keys are concatenated to form a longer key.
- A key derivative function is applied to derive an aggregate key.
- Policy-as-code is used to verify access rights to the data.
Key Features and Innovation
- Concatenation of individual data owner keys for enhanced security.
- Key derivative function for deriving an aggregate key.
- Policy-as-code verification for access control.
Potential Applications
This technology can be applied in secure data storage, access control systems, and encryption protocols.
Problems Solved
- Enhanced security by combining individual keys.
- Simplified access control through policy-as-code verification.
Benefits
- Improved data security.
- Streamlined access control processes.
- Enhanced encryption protocols.
Commercial Applications
Secure data storage solutions, access control systems for sensitive information, encryption software development.
Prior Art
Readers can explore prior research on key aggregation, access control mechanisms, and encryption technologies for related information.
Frequently Updated Research
Stay informed about advancements in key aggregation techniques, access control policies, and encryption protocols for the latest developments in data security.
Questions about Key Aggregation
How does key aggregation enhance data security?
Key aggregation combines individual keys to create a stronger, more secure encryption key, reducing the risk of unauthorized access to sensitive information.
What role does policy-as-code play in access control with aggregated keys?
Policy-as-code is used to verify the validity and authority of the aggregate key for data access, ensuring only authorized users can interact with the data.
Original Abstract Submitted
In an implementation, all individual data owner key encryption keys (KEKs) are concatenated, as a concatenated key, to form a single longer key. A key derivative function (KDF) is applied to the concatenated key to derive an aggregateKey of a certain target property. Policy-as-code is applied to verify a current validity/authority of the aggregateKey on data of an individual data owner to allow any operations on the data of an individual data owner.