18088295. DISTRIBUTED DATA CONTENT PROTECTION simplified abstract (Rovi Guides, Inc.)

From WikiPatents
Jump to navigation Jump to search

DISTRIBUTED DATA CONTENT PROTECTION

Organization Name

Rovi Guides, Inc.

Inventor(s)

Ville Ollikainen of Vihti (FI)

Markku Kylanpaa of Helsinki (FI)

Anni Karinsalo of Oulu (FI)

Pekka Koskela of Oulu (FI)

DISTRIBUTED DATA CONTENT PROTECTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18088295 titled 'DISTRIBUTED DATA CONTENT PROTECTION

Simplified Explanation: The patent application describes systems and methods for encrypting and decrypting data in a distributed storage environment. Data is divided into slices, encrypted using content encryption keys and initialization vectors, and stored securely.

Key Features and Innovation:

  • Data is divided into slices for encryption, enhancing security.
  • Content encryption keys and initialization vectors are used for encryption.
  • Subsequent slices are encrypted based on the content of the previous slice.
  • Encrypted data is stored in a distributed storage environment for added security.

Potential Applications: This technology can be applied in secure cloud storage, data backup services, and secure file sharing platforms.

Problems Solved: This technology addresses the need for secure data encryption and storage in distributed environments, protecting sensitive information from unauthorized access.

Benefits:

  • Enhanced data security through encryption and distributed storage.
  • Efficient and secure data sharing and storage.
  • Protection of sensitive information from unauthorized access.

Commercial Applications: The technology can be utilized in cloud storage services, data backup solutions, and secure file sharing platforms to ensure data security and privacy for businesses and individuals.

Prior Art: Readers can explore prior art related to data encryption, distributed storage systems, and secure data sharing technologies to understand the evolution of similar concepts.

Frequently Updated Research: Stay informed about advancements in data encryption, distributed storage technologies, and cybersecurity measures to enhance the understanding and implementation of this innovative technology.

Questions about Data Encryption: 1. How does this technology improve data security in distributed storage environments? 2. What are the key components used for encryption in this system?

Questions about Distributed Storage: 1. How does distributed storage differ from traditional centralized storage systems? 2. What are the advantages of using distributed storage for data encryption and security?


Original Abstract Submitted

Systems and methods are described for encrypting and decrypting data in a distributed storage environment. Such systems and methods for encryption may divide a data payload into slices, the slices including a first slice and a subsequent slice, employ a content encryption key and an initialization vector, encrypt the first slice using the content encryption key and the initialization vector, generate a subsequent initialization vector for the subsequent slice based upon the initialization vector and the unencrypted content of the first slice, and encrypt the subsequent slice using the subsequent initialization vector and the content encryption key. The systems and methods may then generate a list of the encrypted slices into which the data payload has been generated, and publish to a secure storage location, the slice list, the content encryption key and the initialization vector for the first slice in the slice list, with the slices outputted to the distributed storage environment. Systems and methods for decryption may receive, from a secure storage location, a slice list, a content encryption key, and an initialization vector, determine the encrypted slices to be received from the distributed storage environment. The systems and methods may receive, from the distributed storage environment, at least encrypted first slice and the encrypted subsequent slice, and decrypt the first slice using the content encryption key and the initialization vector, to generate a decrypted first slice, and generate a subsequent initialization vector for the subsequent slice based upon the initialization vector and the decrypted first slice, decrypt the subsequent slice using the subsequent initialization vector and the content encryption key, and combine the first slice and the subsequent slice into a data payload.