Dell products l.p. (20240348426). SYSTEM AND METHOD FOR MANAGING THE SECURITY OF SENSITIVE DATA USING MULTIPLE ENCRYPTION simplified abstract

From WikiPatents
Revision as of 02:18, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

SYSTEM AND METHOD FOR MANAGING THE SECURITY OF SENSITIVE DATA USING MULTIPLE ENCRYPTION

Organization Name

dell products l.p.

Inventor(s)

BRADLEY K. Goodman of Nashua NH (US)

ERIC JOSEPH Bruno of Shirley NY (US)

SYSTEM AND METHOD FOR MANAGING THE SECURITY OF SENSITIVE DATA USING MULTIPLE ENCRYPTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240348426 titled 'SYSTEM AND METHOD FOR MANAGING THE SECURITY OF SENSITIVE DATA USING MULTIPLE ENCRYPTION

Simplified Explanation: The patent application discusses methods and systems for managing data securely, particularly sensitive data that may be encrypted using a volume master key (VMK) on an endpoint. The VMK is protected by security protocols to prevent unauthorized access in case of hardware failure or tampering. Secure backup and recovery processes are implemented to ensure access to the sensitive data even in the event of hardware failure.

Key Features and Innovation:

  • Encryption of sensitive data using a volume master key (VMK) on an endpoint.
  • Protection of the VMK through security protocols to prevent unauthorized access.
  • Secure backup and recovery processes involving multiple encryption layers and key pairs managed by different entities.
  • Decryption keys stored in multiple locations for secure recovery of the VMK.
  • Sequential decryption process with security checks by each entity involved in the recovery process.

Potential Applications: The technology can be applied in industries where secure management of sensitive data is crucial, such as healthcare, finance, and government sectors.

Problems Solved: The technology addresses the potential loss of access to sensitive data due to hardware failure or tampering on an endpoint.

Benefits:

  • Enhanced security for sensitive data on endpoints.
  • Secure backup and recovery processes to prevent data loss.
  • Multi-layer encryption and decryption for added protection.

Commercial Applications: Secure data management solutions for industries handling sensitive information, potentially leading to increased trust and compliance with data protection regulations.

Prior Art: Readers can explore prior patents related to data encryption, secure backup, and recovery processes in the field of data security.

Frequently Updated Research: Stay updated on advancements in data encryption, secure backup, and recovery technologies to enhance data security measures.

Questions about Data Security: 1. What are the key challenges in managing sensitive data securely on endpoints? 2. How does the technology ensure secure access to sensitive data in case of hardware failure?


Original Abstract Submitted

methods and systems for managing data are disclosed. an endpoint may rely on access to sensitive data in order to provide computer-implemented services. the sensitive data may be encrypted using a volume master key (vmk). the vmk may be protected by security protocols implemented on the endpoint that may prevent access to the vmk if hardware of the endpoint has failed and/or has been altered. thus, a hardware failure may result in an indefinite loss of access to the sensitive data. to prevent loss of data access, the vmk may be managed using secure backup and recovery processes. the processes may include multiply encrypting the vmk using key pairs managed by multiple entities, and the decryption keys may be secured in multiple locations. to sequentially decrypt the vmk during the recovery process, security checks may be performed by each entity, and the final decryption may be performed by the endpoint.