×

Efficient key updates in encrypted database systems

  • US 7,729,496 B2
  • Filed: 02/28/2006
  • Issued: 06/01/2010
  • Est. Priority Date: 02/28/2006
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • a server computer in communication with at least one client computer through a communication network;

    the server computer comprising;

    lock management for allowing data stored in encrypted data storage on the server computer to be updated by an application program at a client computer while an encryption key protecting the data is concurrently being changed by placing a key update lock on a data record after receiving a key update request for the record and by placing a data update lock on the same record after receiving a data update request from a client computer for data update access to the same record and by sending conflict information to a client computer changing the encryption key, the requested record being made available to the data update requesting client computer after receiving an acknowledgement from the key update requesting client computer;

    the computer changing the encryption key comprising;

    key management for generating and storing data encryption keys used by a client computer to encrypt data stored on the server computer;

    a log recording a conflict of the existence of a key update lock and a data update lock on the same record when the server allows data update access to a record of the encrypted data selected by a query while a key update lock is in place against the record;

    log management for sending the acknowledgement to the server computer and to the data update requesting client computer when the conflict has been logged;

    the data update requesting client computer comprising;

    a cryptographic and data processor for decrypting and updating the accessed data;

    the cryptographic and data processor encrypting the updated data with an old key and storing the updated data at the server computer when a conflict indicator acknowledgement has not been received with the data to be updated;

    the cryptographic and data processor encrypting the updated data with a new key when a conflict indicator acknowledgement has been received with the data to be updated and storing the updated data at the server computer after a conflict indicator at the server has been removed.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×