×

Secure data re-encryption

  • US 10,027,640 B2
  • Filed: 09/22/2015
  • Issued: 07/17/2018
  • Est. Priority Date: 09/22/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • decrypting, using a hardware decryption engine of a cryptographic processor in a device, a first subset of encrypted data using a cryptographic device key associated with the device to produce first plain text, wherein a set of encrypted data comprises the first subset of encrypted data and a second subset of encrypted data, and wherein the first subset of encrypted data and the second subset of encrypted data each contain less encrypted data than the set of encrypted data and are different from each other, the cryptographic device key and the first plain text being stored, without requiring user input, in memory of the cryptographic processor inaccessible from outside of the cryptographic processor;

    decrypting, using the decryption engine, the second subset of encrypted data using the cryptographic device key associated with the device to produce second plain text, the second plain text being stored, without requiring user input, in the memory of the cryptographic processor inaccessible from outside of the cryptographic processor, wherein decrypting the first and second subsets of the encrypted data is responsive to receiving the encrypted data from a data source;

    encrypting, using a hardware encryption engine of a cryptographic processor in the device, the first plain text using a first ephemeral key to produce first re-encrypted data, the first ephemeral key being stored, without requiring user input, in the memory of the cryptographic processor inaccessible from outside of the cryptographic processor;

    encrypting, using the encryption engine, the second plain text using a second ephemeral key to produce second re-encrypted data, the second ephemeral key being different from the first ephemeral key, the second ephemeral key being stored, without requiring user input, in the memory of the cryptographic processor inaccessible from outside of the cryptographic processor;

    randomizing, using the encryption engine, the first re-encrypted data by applying a first nonce to the first re-encrypted data to produce first randomized data;

    storing, without requiring user input, the first randomized data in a memory of the device outside of the cryptographic processor;

    reversing, using the decryption engine, the randomization of and decrypting the first randomized data to produce third plaintext data responsive to a request to access the first randomized data, the third plain text being stored, without requiring user input, in the memory of the cryptographic processor inaccessible from outside the cryptographic processor;

    generating second randomized data by re-encrypting the third plaintext data by encrypting the third plaintext content using a different cryptographic key than was used for the first randomized data and randomizing the encrypted third plaintext content using a second nonce different than the first nonce, the key used to encrypt the third plaintext being stored, without requiring user input, in the memory of the cryptographic processor inaccessible from outside the cryptographic processor; and

    storing, without requiring user input, the second randomized data in the memory of the device outside of the cryptographic processor after processing the request to access the first randomized data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×