18065048. HANDLING OF DATABASE ENCRYPTION KEY REVOCATION simplified abstract (SAP SE)
HANDLING OF DATABASE ENCRYPTION KEY REVOCATION
Organization Name
Inventor(s)
HANDLING OF DATABASE ENCRYPTION KEY REVOCATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 18065048 titled 'HANDLING OF DATABASE ENCRYPTION KEY REVOCATION
The patent application describes a system and method for managing encrypted data pages in a row store database table.
- Storage of encrypted data pages in a persistent storage system
- Determination of encryption keys based on headers of data pages
- Checking if encryption keys have been revoked
- Adding memory to a free list if encryption keys are revoked
Potential Applications: - Data security in database management systems - Secure storage and retrieval of sensitive information
Problems Solved: - Ensuring data security and access control in a database environment - Efficient management of encryption keys for data protection
Benefits: - Enhanced data security and privacy protection - Improved performance and reliability of database operations
Commercial Applications: Title: Secure Data Management System for Enterprises Description: This technology can be utilized by companies to safeguard their sensitive data and comply with data protection regulations, enhancing trust with customers and stakeholders.
Prior Art: Researchers can explore prior patents related to data encryption, database security, and memory management in database systems.
Frequently Updated Research: Stay informed about advancements in encryption technologies, data protection methods, and database security protocols to enhance the system's capabilities.
Questions about the Technology: 1. How does this system ensure secure access to encrypted data? 2. What measures are in place to prevent unauthorized access to encryption keys?
Original Abstract Submitted
Systems and methods include storage of a plurality of encrypted data pages of a row store database table in a persistent storage system, determination of a first encryption key associated with one of the plurality of encrypted data pages based on a header of the one of the plurality of encrypted data pages, determination of whether the first encryption key has been revoked, and, if it is determined that the first encryption key has been revoked, adding of a portion of volatile memory allocated to the one of the plurality of data pages to a free list.
(Ad) Transform your business with AI in minutes, not months
Trusted by 1,000+ companies worldwide