18065048. HANDLING OF DATABASE ENCRYPTION KEY REVOCATION simplified abstract (SAP SE)

From WikiPatents
Jump to navigation Jump to search

HANDLING OF DATABASE ENCRYPTION KEY REVOCATION

Organization Name

SAP SE

Inventor(s)

Beomsoo Kim of Seoul (KR)

Yong Sik Kwon of Seoul (KR)

Ji Hoon Jang of Seoul (KR)

Hyeong Seog Kim of Seoul (KR)

HANDLING OF DATABASE ENCRYPTION KEY REVOCATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18065048 titled 'HANDLING OF DATABASE ENCRYPTION KEY REVOCATION

The patent application describes a system and method for managing encrypted data pages in a row store database table.

  • Storage of encrypted data pages in a persistent storage system
  • Determination of encryption keys based on headers of data pages
  • Checking if encryption keys have been revoked
  • Adding memory to a free list if encryption keys are revoked

Potential Applications: - Data security in database management systems - Secure storage and retrieval of sensitive information

Problems Solved: - Ensuring data security and access control in a database environment - Efficient management of encryption keys for data protection

Benefits: - Enhanced data security and privacy protection - Improved performance and reliability of database operations

Commercial Applications: Title: Secure Data Management System for Enterprises Description: This technology can be utilized by companies to safeguard their sensitive data and comply with data protection regulations, enhancing trust with customers and stakeholders.

Prior Art: Researchers can explore prior patents related to data encryption, database security, and memory management in database systems.

Frequently Updated Research: Stay informed about advancements in encryption technologies, data protection methods, and database security protocols to enhance the system's capabilities.

Questions about the Technology: 1. How does this system ensure secure access to encrypted data? 2. What measures are in place to prevent unauthorized access to encryption keys?


Original Abstract Submitted

Systems and methods include storage of a plurality of encrypted data pages of a row store database table in a persistent storage system, determination of a first encryption key associated with one of the plurality of encrypted data pages based on a header of the one of the plurality of encrypted data pages, determination of whether the first encryption key has been revoked, and, if it is determined that the first encryption key has been revoked, adding of a portion of volatile memory allocated to the one of the plurality of data pages to a free list.