×

Crypto-erasure resilient to network outage

  • US 10,205,594 B1
  • Filed: 03/30/2016
  • Issued: 02/12/2019
  • Est. Priority Date: 03/30/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method executed by one or more processors, the method comprising:

  • receiving, at the one or more processors over a network, a local copy of a set of keys from an external key server located remotely from a data storage;

    initiating utilization of the local copy of the set of keys for one or more of encrypting data and decrypting data, the local copy of the set of keys comprising at least one cryptographic key associated with encrypted data stored on the data storage;

    storing the local copy of the set of keys in a memory of the data storage;

    on occurrence of a polling time interval, sending, over the network by the one or more processors executing a server polling component, a status request to the external key server requesting a status of the set of keys stored on the external key server;

    on determining a key available response to the status request is received from the external key server at the one or more processors over the network, continuing the utilization of the local copy of the set of keys, the key available response indicating an enabled status of the set of keys stored on the external key server; and

    on determining a key unavailable response to the status request is received from the external key server at the one or more processors over the network, performing a key failure action to prevent the continued utilization of the local copy of the set of keys, the key unavailable response indicating at least one key in the set of keys stored on the external key server is disabled.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×