18139264. UNIFIED KEY MANAGEMENT simplified abstract (Rubrik, Inc.)

From WikiPatents
Jump to navigation Jump to search

UNIFIED KEY MANAGEMENT

Organization Name

Rubrik, Inc.

Inventor(s)

Pragyan Chakraborty of Bengaluru (IN)

Sai Kiran Katuri of Santa Clara CA (US)

Prateek Pandey of Bengaluru (IN)

David Anthony Terei of New York City NY (US)

Hao Wu of Mountain View CA (US)

UNIFIED KEY MANAGEMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 18139264 titled 'UNIFIED KEY MANAGEMENT

The abstract describes methods, systems, and devices for data management, specifically focusing on the creation and management of encryption keys for different data management jobs.

  • A data management system (DMS) creates a first key family to encrypt and decrypt first data encryption keys for first data management jobs.
  • After encrypting the first data encryption keys using the first key, the DMS creates a second key family.
  • A first key of the second key family is used to encrypt and decrypt second data encryption keys for second data management jobs.
  • The DMS also creates a second key that can be used for both the first and second key families.
  • The second key of the first key family decrypts the first data encryption keys, while the second key of the second key family encrypts third data encryption keys and decrypts second and third data encryption keys.

Potential Applications: - Secure data management systems - Encryption key management for different data management jobs - Enhanced data security and privacy measures

Problems Solved: - Simplifying the encryption key management process - Ensuring secure encryption and decryption of data - Streamlining data management tasks

Benefits: - Improved data security - Efficient encryption key management - Enhanced privacy protection for sensitive data

Commercial Applications: Title: Enhanced Data Security Solutions for Businesses This technology can be applied in industries such as finance, healthcare, and government where data security is crucial. It can also be used by cloud service providers and data centers to enhance their security measures.

Questions about the technology: 1. How does this technology improve data security measures? 2. What are the potential challenges in implementing this data management system in large organizations?

Frequently Updated Research: Stay updated on the latest advancements in encryption key management systems and data security protocols to ensure the most effective implementation of this technology.


Original Abstract Submitted

Methods, systems, and devices for data management are described. A data management system (DMS) may create a first key family including a first key to encrypt and decrypt first data encryption keys associated with first data management jobs. The DMS may create a second key family after encrypting the first data encryption keys using the first key. A first key of the second key family may be used to encrypt and decrypt second data encryption keys that are associated with second data management jobs. The DMS may create a second key of both the first and second key families. The second key of the first key family may be used to decrypt the first data encryption keys. The second key of the second key family may be used to encrypt third data encryption keys and to decrypt the second data encryption keys and the third data encryption keys.