×

Volatile encryption keys

  • US 10,164,955 B1
  • Filed: 05/25/2016
  • Issued: 12/25/2018
  • Est. Priority Date: 05/25/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, at data processing hardware of a distributed system, a client request from a customer device for access to a requested encrypted resource of the distributed system, the client request including a customer-supplied encryption key associated with wrapped persistent encryption keys for encrypted resources of the distributed system, the wrapped persistent encryption keys stored on one or more non-volatile memory hosts of the distributed system;

    storing, by the data processing hardware, the customer-supplied encryption key of the received client request on one or more volatile memory hosts of the distributed system;

    unwrapping, by the data processing hardware, a wrapped persistent encryption key corresponding to the requested encrypted resource using the customer-supplied encryption key, the unwrapped persistent encryption key configured to decrypt the requested encrypted resource;

    decrypting, by the data processing hardware, the requested encrypted resource using the corresponding unwrapped persistent encryption key;

    sending the decrypted resource from the data processing hardware to the customer device; and

    after ceasing access of the decrypted resource, destroying, by the data processing hardware, the customer-supplied encryption key from the one or more volatile memory hosts of the distributed system.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×