System and method for performing a trust-preserving migration of data objects from a source to a target
First Claim
1. A processor-implemented method for migrating data objects from a source system to a target system, comprising:
- maintaining a secure summary information of the data objects at the source system;
receiving a request to migrate the data objects to the target system;
sending the data objects from the source system to the target system;
sending the maintained secure summary information from the source system to the target system;
calculating a summary information of the data objects received at the target system; and
comparing the calculated summary information with the secure summary information received at the target system, to verify the integrity and completeness of the data objects received at the target system.
1 Assignment
0 Petitions
Accused Products
Abstract
A data migration system performs a tamper-resistant data migration for regulatory compliance systems. The system generates a secure hash for the data object, adds a timestamp to the hash, produces a signature for the data object using a private key, and includes the signature in a signature summary of data objects. Immediately prior to data migration, the system signs the signature summary of the set of data objects to be migrated. The signature of the data object maintains integrity of the data object by preventing undetectable modification to a data object during migration. The signed signature summary maintains completeness by preventing undetectable removal of a data object from or insertion of a data object into the set of data objects during migration.
-
Citations
24 Claims
-
1. A processor-implemented method for migrating data objects from a source system to a target system, comprising:
-
maintaining a secure summary information of the data objects at the source system;
receiving a request to migrate the data objects to the target system;
sending the data objects from the source system to the target system;
sending the maintained secure summary information from the source system to the target system;
calculating a summary information of the data objects received at the target system; and
comparing the calculated summary information with the secure summary information received at the target system, to verify the integrity and completeness of the data objects received at the target system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer program product having a plurality of executable instruction codes stored on a processor-useable medium, for migrating data objects from a source system to a target system, comprising:
-
a program code for maintaining secure summary information of the data objects at the source system;
a program code for receiving a request to migrate the data objects to a target system;
a program code for sending the data objects from the source system to the target system;
a program code for sending the maintained secure summary information from the source system to the target system;
a program code for calculating summary information of the data objects received at the target system; and
a program code for comparing the calculated summary information with the secure summary information received at the target system to verify the integrity and completeness of the data objects received at the target system. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A processor-implemented system for migrating data objects from a source system to a target system, comprising:
-
the source system maintaining a secure summary information of the data objects;
the source system receiving a request to migrate the data objects to the target system;
the source system sending the data objects to the target system;
sending the maintained secure summary information from the source system to the target system;
the target system calculating a summary information of the data objects received at the target system; and
the target system comparing the calculated summary information with the secure summary information received at the target system, to verify the integrity and completeness of the data objects received at the target system. - View Dependent Claims (21, 22, 23, 24)
-
Specification