The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Mar. 10, 2015
Filed:
May. 25, 2010
David Abzarian, Kirkland, WA (US);
Darren Glen Moss, Redmond, WA (US);
Grigory Borisovich Lyakhovitskiy, Bothell, WA (US);
Karan Mehra, Sammamish, WA (US);
Innokentiy Basmov, Redmond, WA (US);
Octavian T. Ureche, Renton, WA (US);
David Abzarian, Kirkland, WA (US);
Darren Glen Moss, Redmond, WA (US);
Grigory Borisovich Lyakhovitskiy, Bothell, WA (US);
Karan Mehra, Sammamish, WA (US);
Innokentiy Basmov, Redmond, WA (US);
Octavian T. Ureche, Renton, WA (US);
Microsoft Technology Licensing, LLC, Redmond, WA (US);
Abstract
The re-encryption of data can be performed with independent cryptographic agents that can automatically encrypt and decrypt data in accordance with cryptographic regions, such that data within a single cryptographic region is encrypted and decrypted with the same cryptographic key. An 'in-place' re-encryption can be performed by reading data from a chunk in an existing cryptographic region, shrinking the existing cryptographic region past the chunk, expanding a replacement cryptographic region over the chunk, and then writing the data back to the same location, which is now part of the replacement cryptographic region. An 'out-of-place' re-encryption can be performed by reading data from a chunk in an existing cryptographic region and then writing the data back to a location immediately adjacent that is part of a replacement cryptographic region. After the re-encrypted data is “shifted”, the cryptographic regions can be expanded and contracted appropriately, and another chunk can be selected.