×

Separate cryptographic keys for protecting different operations on data

  • US 9,317,717 B2
  • Filed: 12/28/2012
  • Issued: 04/19/2016
  • Est. Priority Date: 12/28/2012
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method for processing data, comprising:

  • using a first key to protect a write operation on the data by encrypting, by computer, the data with a data key and generating a signature associated with the data with the first key;

    using a second key to protect a read operation on the data by decrypting the data with the data key and verifying the signature associated with the data with the second key;

    using a third key to protect a write operation on metadata for the data by encrypting the metadata with a metadata key and generating a signature associated with the metadata with the third key;

    using a fourth key to protect a read operation on the metadata by decrypting the metadata with the metadata key and verifying the signature associated with the metadata with the fourth key;

    determining an amount of padding by performing a modulo operation on a length of the data with a block size used to encrypt the data and subtracting a result of the modulo operation from the block size; and

    appending the determined amount of padding to the encrypted data;

    wherein the write operation is protected prior to performing the write operation with a remote storage mechanism; and

    wherein the read operation is protected after performing the read operation with the remote storage mechanism.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×