KEY ENCRYPTION KEY (KEK) ROTATION FOR MULTI-TENANT (MT) SYSTEM

    公开(公告)号:US20210014056A1

    公开(公告)日:2021-01-14

    申请号:US17031720

    申请日:2020-09-24

    Abstract: An example method facilitates enabling Key Encryption Key (KEK) rotation for a running multi-tenant system without requiring system downtime or interruption. The example method facilitates decrypting a set of one or more DEKs using a preexisting KEK; using a new KEK to re-encode the DEKs using the new KEK, all while simultaneously enabling servicing of tenant requests. This is enabled in part, by strategic caching of tenant DEKs in a secure local memory, wherein the cached tenant DEKs are maintained in the clear and are readily accessible to running processes that are using the DEKs to decrypt and access tenant data, irrespective of the state of a background process used to implement the KEK rotation to the new KEK.

    KEY ENCRYPTION KEY (KEK) ROTATION FOR MULTI-TENANT (MT) SYSTEM

    公开(公告)号:US20190173674A1

    公开(公告)日:2019-06-06

    申请号:US15948405

    申请日:2018-04-09

    CPC classification number: H04L9/0891 H04L9/0822 H04L9/0894

    Abstract: An example method facilitates enabling Key Encryption Key (KEK) rotation for a running multi-tenant system without requiring system downtime or interruption. The example method facilitates decrypting a set of one or more DEKs using a preexisting KEK; using a new KEK to re-encode the DEKs using the new KEK, all while simultaneously enabling servicing of tenant requests. This is enabled in part, by strategic caching of tenant DEKs in a secure local memory, wherein the cached tenant DEKs are maintained in the clear and are readily accessible to running processes that are using the DEKs to decrypt and access tenant data, irrespective of the state of a background process used to implement the KEK rotation to the new KEK.

    Techniques for filtering selective users in distribution lists

    公开(公告)号:US10986056B2

    公开(公告)日:2021-04-20

    申请号:US15465973

    申请日:2017-03-22

    Abstract: Techniques, including systems and methods for distributing electronic messages, are disclosed. In an embodiment, information relating to a message thread is maintained. The information includes information identifying one or more members of a distribution list to be excluded from receiving messages in the message thread. When it has been determined to prevent distribution of the electronic message to one or more members of the distribution list, the electronic message is distributed to members of the distribution list excluding the one or more members to whom distribution is to be prevented. The distributed electronic message may identify the distribution list as an intended recipient.

    Key encryption key (KEK) rotation for multi-tenant (MT) system

    公开(公告)号:US10819513B2

    公开(公告)日:2020-10-27

    申请号:US15948405

    申请日:2018-04-09

    Abstract: An example method facilitates enabling Key Encryption Key (KEK) rotation for a running multi-tenant system without requiring system downtime or interruption. The example method facilitates decrypting a set of one or more DEKs using a preexisting KEK; using a new KEK to re-encode the DEKs using the new KEK, all while simultaneously enabling servicing of tenant requests. This is enabled in part, by strategic caching of tenant DEKs in a secure local memory, wherein the cached tenant DEKs are maintained in the clear and are readily accessible to running processes that are using the DEKs to decrypt and access tenant data, irrespective of the state of a background process used to implement the KEK rotation to the new KEK.

    TECHNIQUES FOR FILTERING SELECTIVE USERS IN DISTRIBUTION LISTS

    公开(公告)号:US20170195270A1

    公开(公告)日:2017-07-06

    申请号:US15465973

    申请日:2017-03-22

    Abstract: Techniques, including systems and methods for distributing electronic messages, are disclosed. In an embodiment, information relating to a message thread is maintained. The information includes information identifying one or more members of a distribution list to be excluded from receiving messages in the message thread. When it has been determined to prevent distribution of the electronic message to one or more members of the distribution list, the electronic message is distributed to members of the distribution list excluding the one or more members to whom distribution is to be prevented. The distributed electronic message may identify the distribution list as an intended recipient.

    Key encryption key (KEK) rotation for multi-tenant (MT) system

    公开(公告)号:US11374749B2

    公开(公告)日:2022-06-28

    申请号:US17031720

    申请日:2020-09-24

    Abstract: An example method facilitates enabling Key Encryption Key (KEK) rotation for a running multi-tenant system without requiring system downtime or interruption. The example method facilitates decrypting a set of one or more DEKs using a preexisting KEK; using a new KEK to re-encode the DEKs using the new KEK, all while simultaneously enabling servicing of tenant requests. This is enabled in part, by strategic caching of tenant DEKs in a secure local memory, wherein the cached tenant DEKs are maintained in the clear and are readily accessible to running processes that are using the DEKs to decrypt and access tenant data, irrespective of the state of a background process used to implement the KEK rotation to the new KEK.

    System and method for providing security services using a configuration template in a multi-tenant environment

    公开(公告)号:US10805350B2

    公开(公告)日:2020-10-13

    申请号:US15897651

    申请日:2018-02-15

    Abstract: In accordance with an embodiment, described herein is a system and method for providing security services using a security configuration template in a multi-tenant environment. The system can load a security configuration template in memory when the multi-tenant environment starts, and can use the security configuration template to create a multi-headed tree to represent tenant-specific security configurations. Each head of the multi-headed tree can represent a root node of either the security configuration template or a tenant-specific security configuration. Each tenant-specific security configuration can reuse one or more nodes in the security configuration template by referencing those nodes, and can include one or more new nodes created from the security configuration template by replacing each placeholder therein with tenant-specific values. By creating tenant-specific security configurations on the fly in memory, the system can simplify the tenant onboarding process and save precious computing and storage resources, e.g., in a cloud environment.

Patent Agency Ranking