×

METHODS AND DEVICES FOR SECURING KEYS FOR A NONSECURED, DISTRIBUTED ENVIRONMENT WITH APPLICATIONS TO VIRTUALIZATION AND CLOUD-COMPUTING SECURITY AND MANAGEMENT

  • US 20150143111A1
  • Filed: 11/28/2012
  • Published: 05/21/2015
  • Est. Priority Date: 11/28/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method for securing keys for a non-secure computing-environment, the method comprising the steps of:

  • (a) providing a security-key framework which is adapted, upon receiving an encryption request for protecting a secret item in the computing-environment, for repetitively encrypting, either iteratively, in parallel, or in combination thereof, said secret item with each of a set of N location-specific secure-keys, wherein each said location-specific secure-key of said set corresponds to a respective encryption location, to create an encrypted item;

    wherein said locations are regions of memory located in computing resources operationally connected to the computing-environment; and

    (b) concealing through encryption at least one said location-specific secure-key such that said step of concealing is configured;

    (i) to prevent said at least one location-specific secure-key from ever being known in an unconcealed form on any computing resource in any computing-environment during said encrypting; and

    (ii) to allow useful mathematical operations, wherein said useful mathematical operations include at least one operation selected from the group consisting of;

    XOR, addition, subtraction, multiplication, division, modular addition, modular subtraction, modular multiplication, modular division, and combinations thereof, performed as part of said encrypting and said step of concealing, to be performed while said at least one location-specific secure-key is in its concealed form.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×