18582836. Object-Level Encryption simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

Object-Level Encryption

Organization Name

Capital One Services, LLC

Inventor(s)

Rocky Gray of Fairfax VA (US)

Jeremy Green of Alexandria VA (US)

Justin Bachorik of Silver Spring MD (US)

Irakli Nadareishvili of Wilmington DE (US)

Object-Level Encryption - A simplified explanation of the abstract

This abstract first appeared for US patent application 18582836 titled 'Object-Level Encryption

The abstract describes a method for object-level encryption and key rotations in a service platform storing data items organized into asset clusters. The encryption keys are rotated to enhance security.

  • Data items are organized into asset clusters in a service platform.
  • A first content encryption key is set as the active encryption key for an asset cluster.
  • The active encryption key is encrypted using the master encryption key.
  • A subset of data items is encrypted using the active encryption key.
  • Once a threshold number of data items are encrypted, the active encryption key is rotated.
  • A new encryption key is set as the active encryption key for the asset cluster.
  • Another subset of data items is encrypted using the new active encryption key.

Potential Applications: - Data security in cloud storage systems - Secure data transmission in IoT devices - Protection of sensitive information in databases

Problems Solved: - Ensuring data security through encryption - Rotating encryption keys to prevent unauthorized access - Safeguarding sensitive information from cyber threats

Benefits: - Enhanced data security - Improved protection of sensitive information - Mitigation of security risks associated with data breaches

Commercial Applications: - Cloud storage providers - IoT device manufacturers - Database management companies

Questions about Object-Level Encryption and Key Rotations: 1. How does object-level encryption enhance data security? 2. What are the key benefits of rotating encryption keys regularly?

Frequently Updated Research: - Stay updated on the latest encryption algorithms and protocols - Monitor advancements in data security technologies and practices.


Original Abstract Submitted

A method, apparatus, system, or computer-readable medium for performing object-level encryption and key rotations is disclosed. A service platform may store data items organized into one or more asset clusters. A first content encryption key may be set as the active encryption key for an asset cluster. The active encryption key may be encrypted using the master encryption key. A first subset of data items may be encrypted using the active encryption key (e.g., the first content encryption key). After the number of data items encrypted using the active encryption key satisfies a threshold value, the first content encryption key may be set as an inactive encryption key and a second content encryption key may be set as the new active encryption key for the asset cluster. A second subset of the plurality of data items may be encrypted using the active encryption key (e.g., the second content encryption key).