US 12,267,425 B2
Synchronization of secret keys between multiple server instances
Christoph Hohner, Schwetzingen (DE); Martin Schindewolf, Walldorf (DE); Sascha Zorn, Neulussheim (DE); and Meinolf Block, Heidelberg (DE)
Assigned to SAP SE, Walldorf (DE)
Filed by SAP SE, Walldorf (DE)
Filed on Aug. 10, 2022, as Appl. No. 17/818,750.
Claims priority of provisional application 63/352,364, filed on Jun. 15, 2022.
Prior Publication US 2023/0412374 A1, Dec. 21, 2023
Int. Cl. G06F 15/16 (2006.01); G06F 16/23 (2019.01); G06F 16/27 (2019.01); H04L 9/08 (2006.01)
CPC H04L 9/0894 (2013.01) [G06F 16/2379 (2019.01); G06F 16/27 (2019.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
persisting, in a log file on a first database hosted on a primary server, keys for encrypting and decrypting data persisted at the first database, wherein the keys are managed at a first key store hosted on the primary server, and wherein the log file comprises data for executed database transactions at the first database and key management operations at the first key store; and
in response to triggering a synchronization between the primary server and a secondary server, replaying, at the secondary server, a set of sequential entries of the log file from the first database hosted on the primary server to replicate executions of (i) a transaction of the executed database transactions at a secondary database at the secondary server based on data for an entry at the log file and (ii) a key management operation from the key management operations associated with a key from the keys at the first key store that is persisted in another entry of the one or more entries of the log file on the first database hosted on the primary server.