Secure data protection during disasters
First Claim
1. One or more computer-readable media comprising computer-executable instructions representing a disaster preparation script, the computer-executable instructions directed to steps comprising:
- verifying that at least one key, used to access algorithmically protected data on a computing device expected to be affected by a disaster, is stored in an off-site location; and
removing the at least one key from the computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
In situations, such as disasters, where the physical protection of data may be compromised, algorithmic protection of such data can be increased in anticipation of the disaster. An off-site mechanism can send a disaster preparation script to computing devices expected to be affected, resulting in the deletion of decryption keys from those computing devices. Once the disaster passes, the off-site mechanism, upon receiving confirmation of the physical integrity of the computing devices, can return one or more decryption keys to the computing devices, enabling access algorithmically protected data. The off-site mechanism can also optionally provide access information that can be used to obtain access to the algorithmically protected data via at least one returned decryption key.
-
Citations
20 Claims
-
1. One or more computer-readable media comprising computer-executable instructions representing a disaster preparation script, the computer-executable instructions directed to steps comprising:
-
verifying that at least one key, used to access algorithmically protected data on a computing device expected to be affected by a disaster, is stored in an off-site location; and removing the at least one key from the computing device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. One or more computer-readable media comprising computer-executable instructions for releasing a computing device from a heightened level of algorithmic security following a disaster affecting the computing device, the computer-executable instructions directed to steps comprising:
-
receiving verification that the computing device is physically secure; transmitting at least one key, used to access algorithmically protected data on a computing device, to the computing device; and transmitting instructions to the computing device for storing the at least one key in a predetermined area of the computing device where such keys would be automatically identified by the computing device upon startup. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A method for protecting data on a computing device when a disaster is expected to affect the computing device, the method comprising:
-
verifying that at least one key, used to access algorithmically protected data on a computing device expected to be affected by a disaster, is stored in an off-site location; and removing the at least one key from the computing device. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification