MULTI-TENANCY ARCHITECTURE
First Claim
Patent Images
1. A system, comprising:
- a security device, configured for cryptographic processing, coupled to receive incoming data from a plurality of data sources, wherein the incoming data includes first data from a first data source;
a controller configured to select a first set of keys from a plurality of key sets, each of the key sets corresponding to one of the plurality of data sources, wherein the first set of keys is used by the security device to encrypt the first data; and
a common encrypted data storage, coupled to receive the encrypted first data from the security device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system includes a security device, configured for cryptographic processing, coupled to receive incoming data from a plurality of data sources (e.g., data from different customers), wherein the incoming data includes first data from a first data source; a controller (e.g., an external key manager) configured to select a first set of keys from a plurality of key sets, each of the key sets corresponding to one of the plurality of data sources, wherein the first set of keys is used by the security device to encrypt the first data; and a common encrypted data storage, coupled to receive the encrypted first data from the security device.
32 Citations
20 Claims
-
1. A system, comprising:
-
a security device, configured for cryptographic processing, coupled to receive incoming data from a plurality of data sources, wherein the incoming data includes first data from a first data source; a controller configured to select a first set of keys from a plurality of key sets, each of the key sets corresponding to one of the plurality of data sources, wherein the first set of keys is used by the security device to encrypt the first data; and a common encrypted data storage, coupled to receive the encrypted first data from the security device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
a plurality of security devices, each configured for cryptographic processing, coupled to receive incoming data from at least one data source; and a plurality of key managers, each key manager associated with a user, each key manager coupled to a respective one of the security devices, and each key manager configured to provide a set of keys to the security device for encryption of incoming data associated with the respective user, wherein the incoming data is to be stored in a common encrypted data storage after the encryption. - View Dependent Claims (12, 13)
-
-
14. A security device, comprising:
-
a plurality of cryptographic cores including an input core configured to perform encryption for a first data packet; at least one key cache configured to store a plurality of key sets, wherein a first set of keys is to be selected from the plurality of key sets to encrypt the first data packet by the input core; and a packet input engine configured to detect a header of the first data packet and to address the first set of keys. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification