OBFUSCATING IN MEMORY ENCRYPTION KEYS
First Claim
Patent Images
1. A method for obfuscating keys, comprising:
- identifying that a memory is subject to one of a core dump or an hibernation; and
overwriting a key in unencrypted form in the memory, responsive to the identifying, wherein at least one method operation is performed by a processor.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for obfuscating keys is provided. The method includes identifying that a memory is subject to one of a core dump or an hibernation and overwriting a key in unencrypted form in the memory, responsive to the identifying, wherein at least one method operation is performed by a processor. A system and a computer readable media are also provided.
19 Citations
20 Claims
-
1. A method for obfuscating keys, comprising:
-
identifying that a memory is subject to one of a core dump or an hibernation; and overwriting a key in unencrypted form in the memory, responsive to the identifying, wherein at least one method operation is performed by a processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An encryption processing system, comprising:
-
a memory; and at least one agent, operable through a processor coupled to the memory, the at least one agent configured to; encrypt and decrypt files or portions thereof; hold an unencrypted key in the memory; overwrite the unencrypted key in the memory, responsive to at least one of;
a core dump, or an hibernation; andoverwrite the unencrypted key in the memory, responsive to a completion of a usage of the unencrypted key. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A tangible, non-transient, computer-readable media having instructions thereupon which, when executed by a processor, cause the processor to perform a method comprising:
-
decrypting an encrypted key to produce a decrypted key; applying the decrypted key to encryption processing; writing a pattern over the decrypted key, in response to one of a core dump or an hibernation; and deleting the decrypted key, in response to a completion of the encryption processing. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification