The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 28, 2016

Filed:

Nov. 28, 2012
Applicant:

Porticor Ltd., Ramat Hasharon, IL;

Inventors:

Gilad Parann-Nissany, Ramat Hasharon, IL;

Yaron Sheffer, Tel Aviv, IL;

Assignee:

Porticor Ltd., Hod Hasharon, IL;

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/08 (2006.01); H04L 29/06 (2006.01); G06F 21/60 (2013.01); G06F 21/72 (2013.01); G06F 21/62 (2013.01); H04L 29/08 (2006.01); H04L 9/00 (2006.01);
U.S. Cl.
CPC ...
H04L 63/06 (2013.01); G06F 21/602 (2013.01); G06F 21/6218 (2013.01); G06F 21/72 (2013.01); H04L 9/008 (2013.01); H04L 9/085 (2013.01); H04L 9/0822 (2013.01); H04L 9/0894 (2013.01); H04L 67/10 (2013.01); G06F 2221/2111 (2013.01); G06F 2221/2149 (2013.01); H04L 2463/062 (2013.01);
Abstract

The present invention discloses methods and devices for securing keys for a non-secure computing-environment. Methods include the steps of: providing a security-key framework which is adapted, upon receiving an encryption request for protecting a secret item, for repetitively encrypting the secret item with each of a set of N location-specific secure-keys, wherein each location-specific secure-key corresponds to a respective encryption location, to create an encrypted item; wherein the locations are regions of memory located in computing resources operationally connected to the computing-environment; and concealing through encryption at least one location-specific secure-key such that the concealing is configured: to prevent at least one location-specific secure-key from ever being known in an unconcealed form on any computing resource in any computing-environment during the encrypting; and to allow mathematical operations, performed as part of the encrypting and concealing, to be performed while at least one location-specific secure-key is in its concealed form.


Find Patent Forward Citations

Loading…