REKEYING INFORMATION ON STORAGE DEVICES USING A PROACTIVE COPY SERVICE

    公开(公告)号:US20210124504A1

    公开(公告)日:2021-04-29

    申请号:US16665334

    申请日:2019-10-28

    IPC分类号: G06F3/06 H04L9/08

    摘要: A technique rekeys information to maintain data security. The technique involves identifying a first storage drive as a source device available to a proactive copy service. The technique further involves identifying a set of second storage drives as a set of spare devices available to the proactive copy service. The technique further involves invoking the proactive copy service which, in response to being invoked, transfers information from the first storage drive to the set of second storage drives. The information is encrypted by a first key when residing on the first storage drive and is encrypted by a set of second keys when residing on the set of second storage drives, the first key being different from each second key.

    Computer system employing challenge/response protocol with detection of non-unique incorrect responses

    公开(公告)号:US10764068B2

    公开(公告)日:2020-09-01

    申请号:US15883565

    申请日:2018-01-30

    摘要: A challenge/response authentication procedure determines whether a response is a correct response, a unique incorrect response, or a non-unique incorrect response, the unique incorrect response and non-unique incorrect response being differentiated by comparing the response value with a store of unique incorrect response values. For the correct response, client access to protected computer system resources is allowed, and the challenge value is discarded so as not to be used again. For the unique incorrect response, (1) when a predetermined limit of unique incorrect responses has not been reached, then the response value is added to the store of unique incorrect response values and the process is repeated with reuse of the challenge value, and (2) when the predetermined limit has been reached, then the client is locked out. For the non-unique incorrect response, the process is repeated with reuse of the challenge value.

    Privacy-preserving policy enforcement for messaging

    公开(公告)号:US10298551B1

    公开(公告)日:2019-05-21

    申请号:US15378781

    申请日:2016-12-14

    摘要: An apparatus in one embodiment comprises at least one processing device having a processor coupled to a memory. The processing device implements a messaging policy enforcement server that receives from a first client device metadata of an encrypted message to be sent from the first client device to a second client device. The received metadata comprises a first key utilized by the first client device to encrypt the message with the first key being encrypted utilizing a second key associated with the second client device. The messaging policy enforcement server processes the received metadata to determine one or more policies applicable to the encrypted message and to generate a further encrypted version of the encrypted first key utilizing one or more additional keys corresponding to the one or more policies. The further encrypted version of the encrypted first key is sent to the second client device in modified metadata of the encrypted message.

    COMPUTER SYSTEM EMPLOYING CHALLENGE/RESPONSE PROTOCOL WITH DETECTION OF NON-UNIQUE INCORRECT RESPONSES

    公开(公告)号:US20190238346A1

    公开(公告)日:2019-08-01

    申请号:US15883565

    申请日:2018-01-30

    摘要: A challenge/response authentication procedure determines whether a response is a correct response, a unique incorrect response, or a non-unique incorrect response, the unique incorrect response and non-unique incorrect response being differentiated by comparing the response value with a store of unique incorrect response values. For the correct response, client access to protected computer system resources is allowed, and the challenge value is discarded so as not to be used again. For the unique incorrect response, (1) when a predetermined limit of unique incorrect responses has not been reached, then the response value is added to the store of unique incorrect response values and the process is repeated with reuse of the challenge value, and (2) when the predetermined limit has been reached, then the client is locked out. For the non-unique incorrect response, the process is repeated with reuse of the challenge value.

    Clustering data management entities distributed across a plurality of processing nodes

    公开(公告)号:US11416450B1

    公开(公告)日:2022-08-16

    申请号:US17202531

    申请日:2021-03-16

    IPC分类号: G06F16/16 G06F9/50 G06F9/455

    摘要: An apparatus comprises a processing device configured to receive, at a given data management entity running on a given processing node, a request to create a given cluster of data management entities for a given client. The processing device is also configured to determine membership requirements for the given cluster, to discover additional data management entities running on additional processing nodes, and to select at least one of the additional data management entities for membership in the given cluster based at least in part on the membership requirements. The processing device is further configured to establish a replication relationship for automating sharing of metadata in the given cluster, the metadata comprising access information and location information for data stores where portions of data items of the given client are stored. The processing device is further configured to perform data management functions for the given client utilizing the metadata.

    Client-side encryption supporting deduplication across single or multiple tenants in a storage system

    公开(公告)号:US11128460B2

    公开(公告)日:2021-09-21

    申请号:US16208790

    申请日:2018-12-04

    摘要: An apparatus in an illustrative embodiment comprises a client device configured for communication with a storage system, with the client device comprising a processor coupled to a memory. The client device is further configured to identify a data item to be stored in the storage system, and to generate a data encryption key for the data item as a function of a first secret key and the data item. For example, the function may comprise hashing at least the data item. The client device is further configured to encrypt the data item using the data encryption key for the data item, and to send the encrypted data item to the storage system for storage therein. The client device in some embodiments is further configured to encrypt the data encryption key using a second secret key, and to send the encrypted data encryption key to the storage system for storage therein as metadata of the data item.

    CLIENT-SIDE ENCRYPTION SUPPORTING DEDUPLICATION ACROSS SINGLE OR MULTIPLE TENANTS IN A STORAGE SYSTEM

    公开(公告)号:US20200177382A1

    公开(公告)日:2020-06-04

    申请号:US16208790

    申请日:2018-12-04

    IPC分类号: H04L9/08 H04L9/32 H04L9/14

    摘要: An apparatus in an illustrative embodiment comprises a client device configured for communication with a storage system, with the client device comprising a processor coupled to a memory. The client device is further configured to identify a data item to be stored in the storage system, and to generate a data encryption key for the data item as a function of a first secret key and the data item. For example, the function may comprise hashing at least the data item. The client device is further configured to encrypt the data item using the data encryption key for the data item, and to send the encrypted data item to the storage system for storage therein. The client device in some embodiments is further configured to encrypt the data encryption key using a second secret key, and to send the encrypted data encryption key to the storage system for storage therein as metadata of the data item.

    Adaptive re-keying in a storage system

    公开(公告)号:US11595204B2

    公开(公告)日:2023-02-28

    申请号:US16431132

    申请日:2019-06-04

    摘要: Techniques for adaptive re-keying of encrypted data are provided. For example, a method comprises the following steps. Utilization information associated with a storage system is obtained, wherein the storage system comprises a set of storage devices. The method dynamically selects a re-keying process from a plurality of different re-keying processes based on at least a portion of the obtained utilization information. At least a portion of the set of storage devices are re-keyed in accordance with the selected re-keying process.