The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 10, 2015

Filed:

May. 25, 2010
Applicants:

David Abzarian, Kirkland, WA (US);

Darren Glen Moss, Redmond, WA (US);

Grigory Borisovich Lyakhovitskiy, Bothell, WA (US);

Karan Mehra, Sammamish, WA (US);

Innokentiy Basmov, Redmond, WA (US);

Octavian T. Ureche, Renton, WA (US);

Inventors:

David Abzarian, Kirkland, WA (US);

Darren Glen Moss, Redmond, WA (US);

Grigory Borisovich Lyakhovitskiy, Bothell, WA (US);

Karan Mehra, Sammamish, WA (US);

Innokentiy Basmov, Redmond, WA (US);

Octavian T. Ureche, Renton, WA (US);

Assignee:
Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 21/00 (2013.01); G06F 21/78 (2013.01); G06F 21/72 (2013.01); G06F 21/85 (2013.01); H04L 9/08 (2006.01);
U.S. Cl.
CPC ...
G06F 21/78 (2013.01); G06F 21/72 (2013.01); G06F 21/85 (2013.01); H04L 9/0891 (2013.01); H04L 9/0894 (2013.01); H04L 2209/12 (2013.01); G06F 2221/2107 (2013.01);
Abstract

The re-encryption of data can be performed with independent cryptographic agents that can automatically encrypt and decrypt data in accordance with cryptographic regions, such that data within a single cryptographic region is encrypted and decrypted with the same cryptographic key. An 'in-place' re-encryption can be performed by reading data from a chunk in an existing cryptographic region, shrinking the existing cryptographic region past the chunk, expanding a replacement cryptographic region over the chunk, and then writing the data back to the same location, which is now part of the replacement cryptographic region. An 'out-of-place' re-encryption can be performed by reading data from a chunk in an existing cryptographic region and then writing the data back to a location immediately adjacent that is part of a replacement cryptographic region. After the re-encrypted data is “shifted”, the cryptographic regions can be expanded and contracted appropriately, and another chunk can be selected.


Find Patent Forward Citations

Loading…