-
公开(公告)号:US20230336343A1
公开(公告)日:2023-10-19
申请号:US17957515
申请日:2022-09-30
Applicant: Dropbox, Inc.
Inventor: Jonathan Lee , Rajat Goel , Stas Ilinskiy , Wesley Rodriguez , April King , Joseph Eichenhofer
CPC classification number: H04L9/14 , H04L9/0877
Abstract: A system, method, and computer readable medium is disclosed for accessing an object that is encrypted within at least a tertiary-level encryption key scheme. This includes receiving a request to access blocks making up an object by content management system and using a top-level encryption key from a key management service, a namespace encryption key from a namespace encryption key database, and a respective block encryption keys protecting the blocks making up the object. Using these keys, the system can decrypt the block encryption keys using the namespace encryption key and decrypt the blocks using the block encryption keys, thereby providing access to the object.
-
公开(公告)号:US20220357861A1
公开(公告)日:2022-11-10
申请号:US17316565
申请日:2021-05-10
Applicant: Dropbox, Inc.
Inventor: Jonathan Lee , Rajat Goel
IPC: G06F3/06
Abstract: A service management system manages scaling and migration of a plurality of services in a content management system. The service management system may maintain a plurality of services that are distributed across a plurality of clusters, each service serving a functionality in the content management system. Responsive to receiving a request to scale a service, the service management system may access dependency data describing dependencies among the plurality of services. Based on the dependency data, the service management system may determine a set of services to scale and determine a scaling sequence in which the set of services are to be scaled. The service management system may further determine other parameters for the scaling process such as scaling ratios, allocation ratios and scaling factors associated with the services and the scaling is further based on the parameters.
-
公开(公告)号:US11747996B2
公开(公告)日:2023-09-05
申请号:US16985234
申请日:2020-08-05
Applicant: Dropbox, Inc.
Inventor: Oleksandr Senyuk , James Cowling , William Ehlhardt , Jonathan Lee , Gevorg Karapetyan , Olga Kechina , Stas Ilinskiy
CPC classification number: G06F3/0622 , G06F1/10 , G06F1/12 , G06F3/067 , G06F3/0613 , G06F3/0653 , G06F3/0659
Abstract: One variation of a system for implementing a key-value data store includes one or more processors, storage media and instructions stored in the storage media which, when executed by the system cause the system to: receive a request store a particular key-value item; request a first networked distributed data storage system to store the particular key-value item; based on a determination that a set of one or more offload criteria is satisfied: retrieve a first set of key-value items from the first networked distributed data storage system, and request a second networked distributed data storage system to store the first set of key-value items in a first set of one or more data objects. The first networked distributed data storage system can have a lower data write latency and a higher data storage cost than the second networked distributed data storage system.
-
公开(公告)号:US20240171389A1
公开(公告)日:2024-05-23
申请号:US17990218
申请日:2022-11-18
Applicant: Dropbox, Inc.
Inventor: Jonathan Lee , Stas Ilinskiy
IPC: H04L9/08
CPC classification number: H04L9/0894 , H04L9/083
Abstract: A system, method, and computer readable medium is disclosed for accessing an object that is encrypted within at least a tertiary-level encryption key scheme. This includes receiving a request to access blocks making up an object by content management system and using a top-level encryption key from a key management service, a namespace encryption key from a namespace encryption key database, and a respective block encryption keys protecting the blocks making up the object. Furthermore, the system can rely on ephemeral keys to encrypt the namespace encryption keys, so that namespace encryption keys can be stored at the content management system. Using these keys, the system can decrypt the namespace encryption key using the ephemeral key, decrypt the block encryption keys using the namespace encryption key and decrypt the blocks using the block encryption keys, thereby providing access to the object.
-
-
-