Patents by Inventor Christoph Hohner

Christoph Hohner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240146526
    Abstract: Systems and methods include assignment of first data artifacts stored in a volatile memory to a first database tenant object instance stored in the volatile memory, storage, in a persistent storage system, of a first payload database comprising a first encryption key for encrypting and decrypting the first data artifacts, storage, in the persistent storage system, a second payload database comprising a second encryption key for encrypting and decrypting second data artifacts not assigned to a database tenant object instance, and storage, in the persistent storage system, of a configuration database comprising a first portion including information usable for decrypting the first encryption key and a second portion including information usable for decrypting the second encryption key.
    Type: Application
    Filed: November 2, 2022
    Publication date: May 2, 2024
    Inventors: Martin SCHINDEWOLF, Meinolf BLOCK, Sascha ZORN, Christoph HOHNER
  • Publication number: 20230409731
    Abstract: A database system includes a persistent storage system, a memory storing metadata defining a tenant object and a plurality of database artifacts, a first instance of the tenant object, the first instance associated with a first plurality of the database artifacts including first data associated with the first instance of the tenant object, and a second instance of the tenant object, the second instance associated with a second plurality of the database artifacts including second data associated with the second instance of the tenant object. A processing unit is to execute program code of a database instance to cause the database system to encrypt the first data associated with the first instance of the tenant object using a first public encryption key and store the encrypted first data in the persistent storage system, and encrypt the second data associated with the second instance of the tenant object using a second public encryption key and store the encrypted second data in the persistent storage system.
    Type: Application
    Filed: October 18, 2022
    Publication date: December 21, 2023
    Inventors: Patrick VOELKER, Holger MACK, Meinolf BLOCK, Thorsten GLEBE, Mihnea ANDREI, Yong Sik KWON, Dirk THOMSEN, Martin SCHINDEWOLF, Martin KITTEL, Myung Sun PARK, Beomsoo KIM, Martin HEIDEL, Christian BENSBERG, Fabian GARAGNON, Michael MUEHLE, Sergej HARDOCK, Johannes BEIGEL, Sascha ZORN, Christoph HOHNER, Andreas HARTEL
  • Publication number: 20230412374
    Abstract: The present disclosure relates to computer-implemented methods, software, and systems for the replication of secret keys between server nodes. Keys for encryption and decryption are persisted in a log file on a first database hosted on a primary server. The log file comprises data for executed database transactions at the first database and key management operations at a first key store. In response to triggering a synchronization between the primary server and a secondary server, a set of sequential entries of the log file are replayed at the secondary server from the first database. An execution of a transaction is replicated at a secondary database at the secondary server based on data for an entry at the log file and a key management operation associated with a key at the first key store that is persisted in another entry of the log file is replicated.
    Type: Application
    Filed: August 10, 2022
    Publication date: December 21, 2023
    Inventors: Christoph Hohner, Martin Schindewolf, Sascha Zorn, Meinolf Block
  • Patent number: 11849026
    Abstract: The present disclosure involves systems, software, and computer implemented methods for database integration with an external key management system. One example method includes receiving, by a database system, a key encryption key from an external key management system external to the database system that is used to encrypt a data encryption key used to encrypt database data. The data encryption key is obtained, by the database system, using the key encryption key. Encrypted database data is decrypted, by the database system and using the data encryption key, to obtain decrypted database data before performing an operation on the decrypted database data. The database system determines that the external key management system has performed an operation on the key encryption key. In response to determining that the external key management system has performed the operation on the key encryption key, the database system modifies operation of the database system.
    Type: Grant
    Filed: April 13, 2021
    Date of Patent: December 19, 2023
    Assignee: SAP SE
    Inventors: Martin Schindewolf, Meinolf Block, Christoph Hohner, Sascha Zorn
  • Patent number: 11533168
    Abstract: The system described herein provides for storing the databases and encryption keys for decrypting the data in the databases into two separate partitions. In an embodiment, the first partition includes the databases while the second partition includes a configuration database and a payload database. The payload database stores a data encryption key for decrypting the data stored in the databases. The payload database is encrypted and may be decrypted using a body encryption key. The body encryption key itself is encrypted twice. In the first instance a key encryption key is generated and in the second instance a second access key is generated. The key encryption key or the second access key may be used to decrypt the body encryption key. The second access key is stored in a secure location, to be retrieved in situations when the key encryption key is inaccessible.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: December 20, 2022
    Assignee: SAP SE
    Inventors: Martin Schindewolf, Meinolf Block, Christoph Höhner, Sascha Zorn
  • Publication number: 20220329413
    Abstract: The present disclosure involves systems, software, and computer implemented methods for database integration with an external key management system. One example method includes receiving, by a database system, a key encryption key from an external key management system external to the database system that is used to encrypt a data encryption key used to encrypt database data. The data encryption key is obtained, by the database system, using the key encryption key. Encrypted database data is decrypted, by the database system and using the data encryption key, to obtain decrypted database data before performing an operation on the decrypted database data. The database system determines that the external key management system has performed an operation on the key encryption key. In response to determining that the external key management system has performed the operation on the key encryption key, the database system modifies operation of the database system.
    Type: Application
    Filed: April 13, 2021
    Publication date: October 13, 2022
    Inventors: Martin Schindewolf, Meinolf Block, Christoph Hohner, Sascha Zorn
  • Patent number: 11296870
    Abstract: A method, a system, and a computer program product for performing key management configurations. One or more encryption keys for encrypting one or more data payloads for accessing one or more databases are received. The received encryption keys are compared to a plurality of encryption keys associated with the databases. Based on the comparison, a configuration of at least one database is changed using the received encryption keys. The changed configuration is stored.
    Type: Grant
    Filed: October 1, 2019
    Date of Patent: April 5, 2022
    Assignee: SAP SE
    Inventors: Christoph Hohner, Sascha Zorn, Meinolf Block, Martin Schindewolf
  • Publication number: 20210194678
    Abstract: The system described herein provides for storing the databases and encryption keys for decrypting the data in the databases into two separate partitions. In an embodiment, the first partition includes the databases while the second partition includes a configuration database and a payload database. The payload database stores a data encryption key for decrypting the data stored in the databases. The payload database is encrypted and may be decrypted using a body encryption key. The body encryption key itself is encrypted twice. In the first instance a key encryption key is generated and in the second instance a second access key is generated. The key encryption key or the second access key may be used to decrypt the body encryption key. The second access key is stored in a secure location, to be retrieved in situations when the key encryption key is inaccessible.
    Type: Application
    Filed: December 20, 2019
    Publication date: June 24, 2021
    Inventors: Martin SCHINDEWOLF, Meinolf BLOCK, Christoph HOHNER, Sascha ZORN
  • Publication number: 20210099289
    Abstract: A method, a system, and a computer program product for performing key management configurations. One or more encryption keys for encrypting one or more data payloads for accessing one or more databases are received. The received encryption keys are compared to a plurality of encryption keys associated with the databases. Based on the comparison, a configuration of at least one database is changed using the received encryption keys. The changed configuration is stored.
    Type: Application
    Filed: October 1, 2019
    Publication date: April 1, 2021
    Inventors: Christoph Hohner, Sascha Zorn, Meinolf Block, Martin Schindewolf
  • Patent number: 10505729
    Abstract: Embodiments manage access to cryptography keys for database data, within a secure key store of a local key server owned by a new (security) operating system (OS) user separate from an original default OS user. Existing principles governing distinct OS user access privileges engrained within the OS itself, are leveraged to preclude the default OS user from accessing files of the new security OS user. Embodiments thus segregate the right to read secure cryptography keys of a secure key store, from the right to administer database installation on the OS level. While the original default OS user retains access to the encrypted data, the new security OS user now owns the cryptography key necessary to decrypt that database data. Thus, the default OS user is denied enough information to unlock the database data, enhancing its security. Embodiments are particularly useful for promoting data security in cloud setups and multi-tenant databases.
    Type: Grant
    Filed: November 9, 2016
    Date of Patent: December 10, 2019
    Assignee: SAP SE
    Inventors: Meinolf Block, Christoph Hohner, Martin Schindewolf, Sascha Zorn
  • Patent number: 10235531
    Abstract: Methods, systems, and apparatus, including computer program products, are provided for configuring access controls to a database. In one aspect there is provided a method. The method may include receiving, from a first user, a table declaration for creating a database table in a database; generating, based on the table declaration, the database table; receiving, from the first user, a specification of one or more access mechanisms that have a privilege to access the database table; receiving a designation of at least one column in the database table as a protected column and one or more users who have a privilege to access the content of the protected column; and providing control over access to the content of the protected column based at least in part on the specification of the one or more access mechanisms and the designation of the at least one column and the second user.
    Type: Grant
    Filed: July 5, 2016
    Date of Patent: March 19, 2019
    Assignee: SAP SE
    Inventors: Meinolf Block, Christoph Hohner, Martin Schindewolf, Sascha Zorn
  • Patent number: 10142100
    Abstract: A system for managing user-controlled security keys in cloud-based scenarios is provided. In some implementations, the system performs operations comprising receiving an information request from a user device via a network, and generating a database query based at least in part upon the information request. The operations can comprise generating a request for a secret key for decrypting encrypted data when the database query requests the encrypted data and/or generating a request for a secret key for encrypting data when the database query requests to encrypt data. The operations can also comprise providing the request to a security key management entity via a network, receiving secret key information from the security key management entity via the network, and using the secret key information to form decrypted data or encrypted data. Related systems, methods, and articles of manufacture are also described.
    Type: Grant
    Filed: July 6, 2016
    Date of Patent: November 27, 2018
    Assignee: SAP SE
    Inventors: Meinolf Block, Christoph Hohner, Martin Schindewolf, Sascha Zorn
  • Publication number: 20180131517
    Abstract: Embodiments manage access to cryptography keys for database data, within a secure key store of a local key server owned by a new (security) operating system (OS) user separate from an original default OS user. Existing principles governing distinct OS user access privileges engrained within the OS itself, are leveraged to preclude the default OS user from accessing files of the new security OS user. Embodiments thus segregate the right to read secure cryptography keys of a secure key store, from the right to administer database installation on the OS level. While the original default OS user retains access to the encrypted data, the new security OS user now owns the cryptography key necessary to decrypt that database data. Thus, the default OS user is denied enough information to unlock the database data, enhancing its security. Embodiments are particularly useful for promoting data security in cloud setups and multi-tenant databases.
    Type: Application
    Filed: November 9, 2016
    Publication date: May 10, 2018
    Inventors: Meinolf Block, Christoph Hohner, Martin Schindewolf, Sascha Zorn
  • Publication number: 20180013549
    Abstract: A system for managing user-controlled security keys in cloud-based scenarios is provided. In some implementations, the system performs operations comprising receiving an information request from a user device via a network, and generating a database query based at least in part upon the information request. The operations can comprise generating a request for a secret key for decrypting encrypted data when the database query requests the encrypted data and/or generating a request for a secret key for encrypting data when the database query requests to encrypt data. The operations can also comprise providing the request to a security key management entity via a network, receiving secret key information from the security key management entity via the network, and using the secret key information to form decrypted data or encrypted data. Related systems, methods, and articles of manufacture are also described.
    Type: Application
    Filed: July 6, 2016
    Publication date: January 11, 2018
    Inventors: Meinolf Block, Christoph Hohner, Martin Schindewolf, Sascha Zom
  • Publication number: 20180012031
    Abstract: Methods, systems, and apparatus, including computer program products, are provided for configuring access controls to a database. In one aspect there is provided a method. The method may include receiving, from a first user, a table declaration for creating a database table in a database; generating, based on the table declaration, the database table; receiving, from the first user, a specification of one or more access mechanisms that have a privilege to access the database table; receiving a designation of at least one column in the database table as a protected column and one or more users who have a privilege to access the content of the protected column; and providing control over access to the content of the protected column based at least in part on the specification of the one or more access mechanisms and the designation of the at least one column and the second user.
    Type: Application
    Filed: July 5, 2016
    Publication date: January 11, 2018
    Inventors: Meinolf Block, Christoph Hohner, Martin Schindewolf, Sascha Zorn