SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER Russian patent published in 2019 - IPC G06F21/62 H04L29/06 H04L9/08 

Abstract RU 2693313 C2

FIELD: computer equipment.

SUBSTANCE: invention relates to the computer equipment. Method of managing encrypted data sets comprises steps of encrypting a data set with a transport key encrypted by a first encryption mechanism; multiple copies of the transport key are encrypted by performing the following: encrypting the first copy of the transport key by the second encryption mechanism so that the given data set owner can decrypt the first copy of the transport key using the second encryption mechanism, and encrypt, for at least one subject different from said owner, a second copy of the transport key by a third encryption mechanism such that at least one subject can decrypt the second copy of the transport key using the third encryption mechanism; creating a packet containing first and second encrypted copies of transport key; generating a security signature and generating a transport key signature.

EFFECT: technical result is providing confidentiality and integrity of content of virtual machine.

23 cl, 6 dwg

Similar patents RU2693313C2

Title Year Author Number
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT 2015
  • Fergyuson Nils T.
  • Samsonov Evgenij Anatolevich
  • Kinskhumann
  • Chandrashekar Samartkha
  • Messek Dzhon Entoni
  • Novak Mark Fishel
  • Makkarron Kristofer
  • Temkhejn Amitabkh Prakash
  • Van Tsyan
  • Krus Devid Mettyu
  • Ben-Zvi Nir
  • Vinberg Anders Bertil
RU2679721C2
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY 2017
  • Novak, Mark, F.
RU2756048C2
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY 2017
  • Novak, Mark, F.
RU2756040C2
SECURE DATA HANDLING BY VIRTUAL MACHINE 2013
  • Koster Robert Paul
  • Petkovich Milan
  • Deng Mina
RU2648941C2
IDENTIFICATION OF NETWORK NODE TO WHICH DATA WILL BE REPLICATED 2017
  • Pletea, Daniel
  • Van Liesdonk, Peter, Petrus
RU2756304C2
DEVICE SAFETY AUTOMATIC CERTIFICATION WITH THE USE OF THE BLOCKS CHAIN 2016
  • Sprague, Michael
  • Sprague, Steven
RU2673842C1
COPY PROTECTION SYSTEM AND METHOD 1999
  • Zene Peter
  • Shepers Jorg
  • Tsaig Ditmar
  • Smola Mikhel'
RU2213991C2
ADMINISTRATION OF SECURE DEVICES 2010
  • Smit Ned M.
  • Mur Viktorija K.
  • Grobmehn Stiven L.
RU2557756C2
SECURE KEY MANAGEMENT 2017
  • Lange, Jonathan E.
RU2750095C2
MULTIFUNCTIONAL IDENTIFICATION OF A VIRTUAL COMPUTING NODE 2015
  • Cignetti, Todd Lawrence
  • Bowen, Peter Zachary
  • Doane, Andrew Jeffrey
  • Schoof, Alexander Edward
RU2679188C2

RU 2 693 313 C2

Authors

Novak, Mark Fishel

Ben-Zvi, Nir

Ferguson, Niels T.

Dates

2019-07-02Published

2015-05-04Filed