18088305. DISTRIBUTED DATA CONTENT PROTECTION simplified abstract (Rovi Guides, Inc.)

From WikiPatents
Jump to navigation Jump to search

DISTRIBUTED DATA CONTENT PROTECTION

Organization Name

Rovi Guides, Inc.

Inventor(s)

Ville Ollikainen of Vihti (FI)

Markku Kylanpaa of Helsinki (FI)

Anni Karinsalo of Oulu (FI)

Pekka Koskela of Oulu (FI)

DISTRIBUTED DATA CONTENT PROTECTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18088305 titled 'DISTRIBUTED DATA CONTENT PROTECTION

Simplified Explanation: The patent application describes systems and methods for encrypting and decrypting data in a distributed storage environment by dividing data into slices, encrypting them using encryption keys and initialization vectors, and storing them securely.

Key Features and Innovation:

  • Data payload is divided into slices for encryption.
  • Encryption keys and initialization vectors are used for secure encryption.
  • Subsequent slices are encrypted based on the content of the previous slice.
  • Encrypted slices are stored in a distributed storage environment.
  • Efficient and secure data encryption and decryption process.

Potential Applications: This technology can be applied in cloud storage services, secure file sharing platforms, and data backup solutions.

Problems Solved: This technology addresses the need for secure data encryption in distributed storage environments, ensuring data privacy and protection against unauthorized access.

Benefits:

  • Enhanced data security in distributed storage environments.
  • Efficient encryption and decryption processes.
  • Protection against data breaches and unauthorized access.

Commercial Applications: The technology can be utilized in cloud storage services, data backup solutions, secure file sharing platforms, and any application requiring secure data storage and transfer.

Prior Art: Researchers can explore prior art related to data encryption in distributed storage environments, encryption key management, and secure data storage technologies.

Frequently Updated Research: Stay updated on advancements in data encryption technologies, distributed storage security protocols, and encryption key management practices.

Questions about Data Encryption in Distributed Storage Environments: 1. How does this technology improve data security in cloud storage services? 2. What are the key benefits of using encryption keys and initialization vectors in data encryption processes?


Original Abstract Submitted

Systems and methods are described for encrypting and decrypting data in a distributed storage environment. Such systems and methods for encryption may divide a data payload into slices, the slices including a first slice and a subsequent slice, employ a content encryption key and an initialization vector, encrypt the first slice using the content encryption key and the initialization vector, generate a subsequent initialization vector for the subsequent slice based upon the initialization vector and the unencrypted content of the first slice, and encrypt the subsequent slice using the subsequent initialization vector and the content encryption key. The systems and methods may then generate a list of the encrypted slices into which the data payload has been generated, and publish to a secure storage location, the slice list, the content encryption key and the initialization vector for the first slice in the slice list, with the slices outputted to the distributed storage environment. Systems and methods for decryption may receive, from a secure storage location, a slice list, a content encryption key, and an initialization vector, determine the encrypted slices to be received from the distributed storage environment. The systems and methods may receive, from the distributed storage environment, at least encrypted first slice and the encrypted subsequent slice, and decrypt the first slice using the content encryption key and the initialization vector, to generate a decrypted first slice, and generate a subsequent initialization vector for the subsequent slice based upon the initialization vector and the decrypted first slice, decrypt the subsequent slice using the subsequent initialization vector and the content encryption key, and combine the first slice and the subsequent slice into a data payload.