-
公开(公告)号:US20220060314A1
公开(公告)日:2022-02-24
申请号:US16996270
申请日:2020-08-18
Applicant: Seagate Technology LLC
Inventor: Vipin Singh Sehrawat , Hamza Jeljeli
Abstract: A method of improving data security or privacy in a computing environment includes providing a group identifier value to at least a first user of one or more users and associating a first pseudonym with the first user. The method further includes encrypting a first data set according to a private key and marking the encrypted first data set according to the group identifier and the first pseudonym. The method also includes performing a first operation on the encrypted first data set and transforming the encrypted first data set into an encrypted second data set according to the first operation performed and the first pseudonym, decrypting the encrypted second data set using the private key, and analyzing the decrypted second data set.
-
公开(公告)号:US20250125955A1
公开(公告)日:2025-04-17
申请号:US18925554
申请日:2024-10-24
Applicant: Seagate Technology LLC
Inventor: Hamza Jeljeli , Kian Beng Lim , Saravanan Nagarajan
IPC: H04L9/08
Abstract: A method of rotating a set of keys, having a media encryption key (MEK) and a current media encryption key encryption key (MEKEK) encrypted and stored in a self-encrypting drive (SED) having data encrypted with the MEK (MEK (data)), includes decrypting the stored MEK and the current MEKEK. A new MEK (MEK′) and a new MEKEK (MEKEK′) are generated. The MEKEK′ is encrypted to replace the current encrypted MEKEK. A concatenation of the MEK and the MEK′ is encrypted with MEKEK′. The encrypted data MEK (data) is re-encrypted with MEK′.
-
公开(公告)号:US20220286282A1
公开(公告)日:2022-09-08
申请号:US17189927
申请日:2021-03-02
Applicant: Seagate Technology LLC
Inventor: Hamza Jeljeli , Kian Beng Lim , Saravanan Nagarajan
IPC: H04L9/08
Abstract: A method of rotating a set of keys, having a media encryption key (MEK) and a current media encryption key encryption key (MEKEK) encrypted and stored in a self-encrypting drive (SED) having data encrypted with the MEK (MEK(data)), includes decrypting the stored MEK and the current MEKEK. A new MEK (MEK′) and a new MEKEK (MEKEK′) are generated. The MEKEK′ is encrypted to replace the current encrypted MEKEK. A concatenation of the MEK and the MEK′ is encrypted with MEKEK′. The encrypted data MEK(data) is re-encrypted with MEK′.
-
公开(公告)号:US11496287B2
公开(公告)日:2022-11-08
申请号:US16996270
申请日:2020-08-18
Applicant: Seagate Technology LLC
Inventor: Vipin Singh Sehrawat , Hamza Jeljeli
Abstract: A method of improving data security or privacy in a computing environment includes providing a group identifier value to at least a first user of one or more users and associating a first pseudonym with the first user. The method further includes encrypting a first data set according to a private key and marking the encrypted first data set according to the group identifier and the first pseudonym. The method also includes performing a first operation on the encrypted first data set and transforming the encrypted first data set into an encrypted second data set according to the first operation performed and the first pseudonym, decrypting the encrypted second data set using the private key, and analyzing the decrypted second data set.
-
公开(公告)号:US20220029788A1
公开(公告)日:2022-01-27
申请号:US16936646
申请日:2020-07-23
Applicant: Seagate Technology LLC
Inventor: Hamza Jeljeli
Abstract: A method includes collecting a plurality of masked datasets. In certain embodiments, each masked dataset is associated with a one-time pad. The method can further include aggregating the plurality of masked datasets such that the one-time pads cancel each other to create an unmasked aggregated dataset.
-
公开(公告)号:US12166873B2
公开(公告)日:2024-12-10
申请号:US17189927
申请日:2021-03-02
Applicant: Seagate Technology LLC
Inventor: Hamza Jeljeli , Kian Beng Lim , Saravanan Nagarajan
IPC: H04L9/08
Abstract: A method of rotating a set of keys, having a media encryption key (MEK) and a current media encryption key encryption key (MEKEK) encrypted and stored in a self-encrypting drive (SED) having data encrypted with the MEK (MEK(data)), includes decrypting the stored MEK and the current MEKEK. A new MEK (MEK′) and a new MEKEK (MEKEK′) are generated. The MEKEK′ is encrypted to replace the current encrypted MEKEK. A concatenation of the MEK and the MEK′ is encrypted with MEKEK′. The encrypted data MEK(data) is re-encrypted with MEK′.
-
公开(公告)号:US11575501B2
公开(公告)日:2023-02-07
申请号:US17031035
申请日:2020-09-24
Applicant: Seagate Technology LLC
Inventor: Hamza Jeljeli , Saravanan Nagarajan
Abstract: A method includes providing a public encryption key and a seed to a party and receiving a first encrypted data set encrypted using the public encryption key and marked by the party with a first mark based on the seed. The method also includes aggregating the first encrypted data set into an aggregated data set at an aggregator and receiving an indication that a first operation associated with the party has been performed on the aggregated data set. In response to the receiving, updating the first encrypted data set of the aggregated data set by updating the first mark to a second mark according to the first operation, generating a verification encrypted data set according to at least the second mark and at least the corresponding first operation, verifying the aggregated data set by comparing the updated first encrypted data set and the verification encrypted data set.
-
公开(公告)号:US20220094519A1
公开(公告)日:2022-03-24
申请号:US17031035
申请日:2020-09-24
Applicant: Seagate Technology LLC
Inventor: Hamza Jeljeli , Saravanan Nagarajan
Abstract: A method includes providing a public encryption key and a seed to a party and receiving a first encrypted data set encrypted using the public encryption key and marked by the party with a first mark based on the seed. The method also includes aggregating the first encrypted data set into an aggregated data set at an aggregator and receiving an indication that a first operation associated with the party has been performed on the aggregated data set. In response to the receiving, updating the first encrypted data set of the aggregated data set by updating the first mark to a second mark according to the first operation, generating a verification encrypted data set according to at least the second mark and at least the corresponding first operation, verifying the aggregated data set by comparing the updated first encrypted data set and the verification encrypted data set.
-
-
-
-
-
-
-