×

Highly available encryption framework for multiple different computing environments

  • US 10,956,600 B2
  • Filed: 10/31/2018
  • Issued: 03/23/2021
  • Est. Priority Date: 10/31/2018
  • Status: Active Grant
First Claim
Patent Images

1. A system for data object encryption, the system comprising:

  • an encryption framework available across a plurality of runtime environments;

    one or more hardware processors; and

    a non-transitory memory storing computer-executable instructions, that in response to execution by the one or more hardware processors, causes the system to;

    receive a data object in one of the plurality of runtime environments, wherein the data object is capable of being encrypted using a content encryption key;

    determine an encryption module implemented in the encryption framework that is compatible with the one of the plurality of runtime environments, wherein the encryption module comprises a key service provider that provides a master key and a key wrapping algorithm for the content encryption key in the runtime environment, and wherein the encryption module is a first one of a plurality of encryption modules;

    encrypt the data object using the content encryption key;

    encrypt the content encryption key using the master key and key wrapping algorithm;

    write the encrypted data object to networked database storage;

    determine encryption metadata for the data object based on the content encryption key and the master key, wherein the encryption metadata comprises a key identifier for the master key, the content encryption key encrypted by the master key, and modification data for a last time of modification of the master key;

    determine that a second one of the plurality of encryption modules is registered with the encryption framework after encrypting the data object and the content encryption key;

    scan the encryption metadata for the data object;

    determine that the encryption metadata is required to be updated based on the second one of the plurality of encryption modules being registered with the encryption framework after encrypting the data object and the content encryption key; and

    update the encryption metadata based on the second one of the plurality of encryption modules being registered after encrypting the data object and the content encryption key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×