The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 23, 2020

Filed:

Mar. 17, 2017
Applicant:

International Business Machines Corporation, Armonk, NY (US);

Inventors:

Adam M. Gray, Chicago, IL (US);

Harsha Hegde, Hawthorn Woods, IL (US);

Wesley B. Leggette, Chicago, IL (US);

Manish Motwani, Chicago, IL (US);

Jason K. Resch, Chicago, IL (US);

Daniel J. Scholl, Chicago, IL (US);

Mark D. Seaborn, Algonquin, IL (US);

Rohan P. Shah, Chicago, IL (US);

Yogesh R. Vedpathak, Chicago, IL (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/08 (2006.01); H04L 29/06 (2006.01); H04L 29/08 (2006.01);
U.S. Cl.
CPC ...
H04L 9/0894 (2013.01); H04L 9/0861 (2013.01); H04L 63/06 (2013.01); H04L 67/1097 (2013.01); H04L 63/101 (2013.01); H04L 2463/061 (2013.01);
Abstract

Systems and Methods for encrypting and decrypting data in a dispersed storage network are disclosed. A data object may be encrypted using a data object specific encryption key, a container specific encryption key, a tenant account specific encryption key, or a time based encryption key. This specific, or more generally, secondary encryption key can be derived from a master or primary encryption key. Encryption key metadata pertaining to the master encryption key and the specific encryption key is also created and stored in the DSN. When reading an encrypted data object, the master encryption key can be retrieved and, along with the encryption key metadata, used to derive the specific encryption key. The specific encryption key can then be used to decrypt the encrypted data object to recover the data object.


Find Patent Forward Citations

Loading…