Secure transport of encrypted virtual machines with continuous owner access

Managing encrypted datasets is illustrated. A method includes obtaining a first decryption key. The first decryption key is configured to be used to decrypt an encrypted dataset that has been encrypted using a first encryption mechanism. The first encryption mechanism is associated with the first de...

Full description

Saved in:
Bibliographic Details
Main Authors Ferguson Niels T, Ben-Zvi Nir, Novak Mark Fishel
Format Patent
LanguageEnglish
Published 16.05.2017
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Managing encrypted datasets is illustrated. A method includes obtaining a first decryption key. The first decryption key is configured to be used to decrypt an encrypted dataset that has been encrypted using a first encryption mechanism. The first encryption mechanism is associated with the first decryption key that can be used to decrypt the dataset. The method further includes encrypting the first decryption key with a second encryption mechanism. The method further includes encrypting the first decryption key with a third encryption mechanism. The method further includes creating a package including at least the first decryption key encrypted with the second encryption method and the first decryption key encrypted with the third encryption method. The method further includes signing the package with a guardian signature and signing the package with a signature created from the first decryption key.
Bibliography:Application Number: US201414481399