CONTAINER-BASED CRYPTOGRAPHY HARDWARE SECURITY MODULE MANAGEMENT

    公开(公告)号:US20220180000A1

    公开(公告)日:2022-06-09

    申请号:US17110722

    申请日:2020-12-03

    IPC分类号: G06F21/72

    摘要: Techniques for container-based cryptography hardware security module (HSM) management in a computer system are described herein. An aspect includes providing a cryptography work daemon container in a computer system, wherein the cryptography work daemon container in the computer system has privileged access to a cryptography HSM of the computer system. Another aspect includes receiving, by the cryptography work daemon container, a request for a cryptography function of the cryptography HSM from an application container in the computer system. Another aspect includes causing, by the cryptography work daemon container, the cryptography HSM to perform the cryptography function based on receiving the request

    Consistent ciphertext creation
    23.
    发明授权

    公开(公告)号:US11265144B2

    公开(公告)日:2022-03-01

    申请号:US16812494

    申请日:2020-03-09

    摘要: Aspects of the invention include receiving, by a processor, an unencrypted object that includes plaintext and metadata that describes the plaintext. A data encryption key (DEK) and a nonce key for the unencrypted object are obtained by the processor. The nonce key is different than the DEK. The unencrypted object is encrypted by the processor. The encrypting includes generating a nonce based at least in part of the plaintext and the nonce key. The encrypting also includes generating ciphertext and a metadata authentication tag that includes a signature of the metadata. The generating is based at least in part on the plaintext, the metadata, the DEK, and the nonce. An encrypted object that includes the ciphertext, the metadata, and the metadata authentication tag is created.

    DISTRIBUTING ENCRYPTED DATA OBJECTS WITH ENCRYPTION INFORMATION AS METADATA

    公开(公告)号:US20220014365A1

    公开(公告)日:2022-01-13

    申请号:US16925403

    申请日:2020-07-10

    IPC分类号: H04L9/08 H04L9/14 H04L29/06

    摘要: Aspects include encrypting data based at least in part on a session key to generate encrypted data. The session key is encrypted based at least in part on a sender key to generate an encrypted session key. A request for an encrypted sender key index is transmitted to the KMS, the request includes an index of the sender key and an index of each of one or more additional keys. The encrypted sender key index is received from the KMS. An object that includes the encrypted data, the encrypted session key, the index of each of the one or more additional keys, and the encrypted sender key index is generated. Access to the data via the object is controlled based at least in part on whether a receiver has access to the sender key and to the one or more additional keys.

    Compression measurement for computer servers

    公开(公告)号:US11093133B2

    公开(公告)日:2021-08-17

    申请号:US16286749

    申请日:2019-02-27

    IPC分类号: G06F3/06

    摘要: According to one or more embodiments of the present invention, computer implemented method includes obtaining by an input/output (I/O) subsystem a request block that includes a command code indicating a STORE IOP-UTILIZATION DATA command for tracking resource utilization during an asynchronous execution of an instance of a CPU DEFLATE command. The method further includes, based on the command code, initiating a command response block. The command response block includes multiple entries for input/output processor (IOP) utilization, each entry corresponding to resource utilization measurements of each IOP in the I/O subsystem. The method further includes, storing, in a command response code field of the command response block, a response code indicating that the resource utilization measurements have been recorded in the entries for IOP utilization. The response block includes a length code indicating a length of the response block and the response code field.

    Counter overflow management for asynchronous data mover facility

    公开(公告)号:US10740213B1

    公开(公告)日:2020-08-11

    申请号:US16407355

    申请日:2019-05-09

    摘要: Techniques for counter overflow management for an asynchronous data mover facility are described herein. An aspect includes tracking operations of an asynchronous data mover facility of a computer system using a plurality of internal counters. Another aspect includes, based on receiving a measurement query, determining a plurality of display counters, each of the plurality of display counters corresponding to a respective internal counter of the plurality of internal counters. Another aspect includes generating a measurement block based on the plurality of display counters. Another aspect includes setting a counter overflow flag corresponding to a display counter of the plurality of display counters in a counter overflow flags field of the measurement block. Yet another aspect includes sending the measurement block in response to the measurement query.

    Distributing encrypted data objects with encryption information as metadata

    公开(公告)号:US11646878B2

    公开(公告)日:2023-05-09

    申请号:US16925403

    申请日:2020-07-10

    IPC分类号: H04L9/08 H04L9/14 H04L9/40

    摘要: Aspects include encrypting data based at least in part on a session key to generate encrypted data. The session key is encrypted based at least in part on a sender key to generate an encrypted session key. A request for an encrypted sender key index is transmitted to the key management system (KMS), the request includes an index of the sender key and an index of each of one or more additional keys. The encrypted sender key index is received from the KMS. An object that includes the encrypted data, the encrypted session key, the index of each of the one or more additional keys, and the encrypted sender key index is generated. Access to the data via the object is controlled based at least in part on whether a receiver has access to the sender key and to the one or more additional keys.

    Multi-phase protection for data-centric objects

    公开(公告)号:US11522683B2

    公开(公告)日:2022-12-06

    申请号:US17111560

    申请日:2020-12-04

    IPC分类号: H04L9/08 H04L9/14 H04L9/32

    摘要: Aspects of the invention include protecting data objects in a computing environment based on physical location. Aspects include receiving, by a computing system, a request to access an encrypted data from an authenticated user, wherein the encrypted data includes information about a data encryption key used to encrypt the encrypted data. Aspects also include providing, by the computing system, the encrypted data to the computer system where the user was authenticated, the computer system including a set of decryption keys protected by a master key stored within a hardware security module associated with the location of the hardware security module. Aspects further include decrypting, by the hardware security module, the encrypted data based on a determination that the data encryption key corresponds to one of the set of decryption keys, wherein the set of decryption keys are determined based on the location of the hardware security module.

    Identification of a creator of an encrypted object

    公开(公告)号:US11368287B2

    公开(公告)日:2022-06-21

    申请号:US16877523

    申请日:2020-05-19

    IPC分类号: H04L9/06 H04L9/14 H04L9/08

    摘要: Embodiments include encrypting an object such that the creator of the encrypted object can be identified. Aspects include receiving, by a processor, an unencrypted object that includes plaintext and metadata that describes the plaintext and obtaining, by the processor in response to a request from a user, a data encryption key (DEK) and a nonce key for the unencrypted object, the nonce key being unique to the user. Aspects also include encrypting, by the processor, the unencrypted object. The encrypting includes generating a nonce based at least in part of the plaintext and the nonce key and generating ciphertext and a metadata authentication tag comprising a signature of the metadata, the generating based at least in part on the plaintext, the metadata, the DEK, and the nonce. Aspects further include creating an encrypted object that includes the ciphertext, the metadata, and the metadata authentication tag.