Salesforce, inc. (20240259188). CRYPTOGRAPHIC KEY MIGRATION simplified abstract

From WikiPatents
Jump to navigation Jump to search

CRYPTOGRAPHIC KEY MIGRATION

Organization Name

salesforce, inc.

Inventor(s)

Sudhir Srinivasan of San Francisco CA (US)

Jing Jin of Bellevue WA (US)

CRYPTOGRAPHIC KEY MIGRATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240259188 titled 'CRYPTOGRAPHIC KEY MIGRATION

The abstract of the patent application describes a system for cryptographic key migration, where a tenant host can transfer cryptographic keys between key management services.

  • The tenant host identifies a first key management service storing a cryptographic key, but if it does not find the key there, it looks for it in a second key management service.
  • The tenant host requests the cryptographic key from the first key management service, and if it is not found, it retrieves it from the second key management service.
  • The tenant host can then replicate the cryptographic key from the second key management service to the first key management service.

Potential Applications: - Secure data storage and transfer in cloud computing environments - Enhancing data security and privacy for businesses and organizations

Problems Solved: - Simplifying the process of transferring cryptographic keys between key management services - Ensuring secure and efficient key migration for data protection

Benefits: - Improved data security and encryption key management - Streamlined cryptographic key migration process for enhanced efficiency

Commercial Applications: Title: Secure Data Management System for Businesses This technology can be utilized by cloud service providers, data centers, and organizations handling sensitive information to securely manage and transfer cryptographic keys, ensuring data security and compliance with regulations.

Questions about Cryptographic Key Migration: 1. How does this system ensure the secure transfer of cryptographic keys between key management services? 2. What are the potential challenges faced during the replication of cryptographic keys between different key management services?

Frequently Updated Research: Stay updated on the latest advancements in cryptographic key management systems and data encryption technologies to enhance data security and privacy measures.


Original Abstract Submitted

systems, devices, and techniques are disclosed for cryptographic key migration. a tenant host may determine a first key management service (kms) indicated as storing a cryptographic key associated with the tenant host from a new kms mapping. the tenant host may send a request for the cryptographic key associated with the tenant host to the first kms. the tenant host may receive an indication from the first kms that the first kms does not store the cryptographic key. the tenant host may determine a second kms indicated as storing the cryptographic key associated with the tenant host from an original kms mapping. the tenant host may receive the cryptographic key associated with the tenant host from the second kms. the tenant host may send a request to the second kms that the cryptographic key associated with the tenant host be replicated from the second kms to the first kms.