Patents by Inventor Ittay Dror
Ittay Dror has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240121085Abstract: This document describes techniques for rotating keys used to tokenize data stored in a streaming data store where data is stored for a maximum time [W]. In some embodiments, a data layer of such a data store can encrypt arriving original data values twice. The original data value is first encrypted with a first key, producing a first token. The original data value is encrypted with a second key, producing a second token. Each encrypted token can be stored separately in the data store. A field may be associated with two database columns, one holding the value encrypted with the first key and the second holding the value encrypted with the second key. Keys are rotated after time [K], which is at least equal to and preferably longer than [W]. Rotation can involve discarding the older key and generating a new key so that two keys are still used.Type: ApplicationFiled: October 20, 2023Publication date: April 11, 2024Applicant: Akamai Technologies, Inc.Inventors: Eugene (John) Neystadt, Jonathan Herzog, Ittay Dror, Elisha Ben-Zvi
-
Patent number: 11849036Abstract: This document describes techniques for rotating keys used to tokenize data stored in a streaming data store where data is stored for a maximum time [W]. In some embodiments, a data layer of such a data store can encrypt arriving original data values twice. The original data value is first encrypted with a first key, producing a first token. The original data value is encrypted with a second key, producing a second token. Each encrypted token can be stored separately in the data store. A field may be associated with two database columns, one holding the value encrypted with the first key and the second holding the value encrypted with the second key. Keys are rotated after time [K], which is at least equal to and preferably longer than [W]. Rotation can involve discarding the older key and generating a new key so that two keys are still used.Type: GrantFiled: June 23, 2022Date of Patent: December 19, 2023Assignee: Akamai Technologies, Inc.Inventors: Eugene (John) Neystadt, Jonathan Herzog, Ittay Dror, Elisha Ben-Zvi
-
Patent number: 11799645Abstract: This document describes techniques for rotating keys used to tokenize data stored in a streaming data store where data is stored for a maximum time [W]. In some embodiments, a data layer of such a data store can encrypt arriving original data values twice. The original data value is first encrypted with a first key, producing a first token. The original data value is encrypted with a second key, producing a second token. Each encrypted token can be stored separately in the data store. A field may be associated with two database columns, one holding the value encrypted with the first key and the second holding the value encrypted with the second key. Keys are rotated after time [K], which is at least equal to and preferably longer than [W]. Rotation can involve discarding the older key and generating a new key so that two keys are still used.Type: GrantFiled: June 23, 2022Date of Patent: October 24, 2023Assignee: Akamai Technologies, Inc.Inventors: Eugene (John) Neystadt, Jonathan Herzog, Ittay Dror, Elisha Ben-Zvi
-
Publication number: 20230108907Abstract: This document describes techniques for rotating keys used to tokenize data stored in a streaming data store where data is stored for a maximum time [W]. In some embodiments, a data layer of such a data store can encrypt arriving original data values twice. The original data value is first encrypted with a first key, producing a first token. The original data value is encrypted with a second key, producing a second token. Each encrypted token can be stored separately in the data store. A field may be associated with two database columns, one holding the value encrypted with the first key and the second holding the value encrypted with the second key. Keys are rotated after time [K], which is at least equal to and preferably longer than [W]. Rotation can involve discarding the older key and generating a new key so that two keys are still used.Type: ApplicationFiled: June 23, 2022Publication date: April 6, 2023Applicant: Akamai Technologies Inc.Inventors: Eugene (John) Neystadt, Jonathan Herzog, Ittay Dror, Elisha Ben-Zvi
-
Patent number: 11381393Abstract: This document describes techniques for rotating keys used to tokenize data stored in a streaming data store where data is stored for a maximum time [W]. In some embodiments, a data layer of such a data store can encrypt arriving original data values twice. The original data value is first encrypted with a first key, producing a first token. The original data value is encrypted with a second key, producing a second token. Each encrypted token can be stored separately in the data store. A field may be associated with two database columns, one holding the value encrypted with the first key and the second holding the value encrypted with the second key. Keys are rotated after time [K], which is at least equal to and preferably longer than [W]. Rotation can involve discarding the older key and generating a new key so that two keys are still used.Type: GrantFiled: September 24, 2019Date of Patent: July 5, 2022Assignee: Akamai Technologies Inc.Inventors: Eugene (John) Neystadt, Jonathan Herzog, Ittay Dror, Elisha Ben-Zvi
-
Publication number: 20210091940Abstract: This document describes techniques for rotating keys used to tokenize data stored in a streaming data store where data is stored for a maximum time [W]. In some embodiments, a data layer of such a data store can encrypt arriving original data values twice. The original data value is first encrypted with a first key, producing a first token. The original data value is encrypted with a second key, producing a second token. Each encrypted token can be stored separately in the data store. A field may be associated with two database columns, one holding the value encrypted with the first key and the second holding the value encrypted with the second key. Keys are rotated after time [K], which is at least equal to and preferably longer than [W]. Rotation can involve discarding the older key and generating a new key so that two keys are still used.Type: ApplicationFiled: September 24, 2019Publication date: March 25, 2021Applicant: Akamai Technologies Inc.Inventors: Eugene (John) Neystadt, Jonathan Herzog, Ittay Dror, Elisha Ben-Zvi
-
Patent number: 9342341Abstract: Information indicating a location of a disk image of a virtual machine hosted on a server is received. The virtual machine is deactivated. The server is instructed to mount the disk image. A static route pointing to a selected network is added to a static routing table on a file system associated with the virtual machine. The server is instructed to dismount the disk image. The virtual machine is activated.Type: GrantFiled: March 14, 2013Date of Patent: May 17, 2016Assignee: Alcatel LucentInventors: Shlomi Tsadok, Ittay Dror
-
Patent number: 9268550Abstract: Various exemplary embodiments relate to a method of managing the distribution of images in a distributed cloud network by a network management system, including: receiving, by the network management system, a request for an image for a network node; identifying, by the network management system, an image from a plurality of images compatible with the network node; and initiating, by the network management system, installation of the image on the network node.Type: GrantFiled: March 28, 2013Date of Patent: February 23, 2016Assignee: Alcatel LucentInventors: Inbar Stolberg, Ittay Dror, Avi Ben-Harush, Assaf Sinvani, Elhay Efrat, Limor Bortman
-
Publication number: 20140298323Abstract: Various exemplary embodiments relate to a method of managing the distribution of images in a distributed cloud network by a network management system, including: receiving, by the network management system, a request for an image for a network node; identifying, by the network management system, an image from a plurality of images compatible with the network node; and initiating, by the network management system, installation of the image on the network node.Type: ApplicationFiled: March 28, 2013Publication date: October 2, 2014Applicant: ALCATEL-LUCENT ISRAEL LTD.Inventors: Inbar STOLBERG, Ittay DROR, Avi BEN-HARUSH, Assaf SINVANI, Elhay EFRAT, Limor BORTMAN
-
Publication number: 20140282505Abstract: Information indicating a location of a disk image of a virtual machine hosted on a server is received. The virtual machine is deactivated. The server is instructed to mount the disk image. A static route pointing to a selected network is added to a static routing table on a file system associated with the virtual machine. The server is instructed to dismount the disk image. The virtual machine is activated.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: Alcatel-LucentInventors: Shlomi Tsadok, Ittay Dror