Systems and methods for secure data backup
First Claim
Patent Images
1. A secure backup method comprising:
- locating, on a first computing system, identification unique to the first computing system;
creating a first encryption key using the located first computing system unique identification;
storing the first encryption key on a backup device;
encrypting, using the first encryption key, a data file from the first computing system; and
storing the encrypted data file from the first computing system on the backup device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are provided for securely backing up data files of a computing system onto a backup device. An encryption key is generated using some identification found on and unique to the computing system. The encryption key is used to encrypt the data which is then stored on the backup device as encrypted backed up data. The encrypted backed up data stored on the backup device can later be accessed, e.g., for data recovery purposes, by once again using the computing system unique identification to generate the encryption key which can then be used to decrypt the encrypted backed up data. In this way, the backed up data remains secure even if the backup device is lost or stolen.
107 Citations
25 Claims
-
1. A secure backup method comprising:
-
locating, on a first computing system, identification unique to the first computing system; creating a first encryption key using the located first computing system unique identification; storing the first encryption key on a backup device; encrypting, using the first encryption key, a data file from the first computing system; and storing the encrypted data file from the first computing system on the backup device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer readable medium having stored thereupon computing instructions comprising:
-
a code segment to locate, on a first computing system, identification unique to the first computing system; a code segment to create a first encryption key using the located first computing system unique identification; a code segment to store the first encryption key on a backup device; a code segment to encrypt, using the first encryption key, a data file from the first computing system; and a code segment to store the encrypted data file from the first computing system on the backup device.
-
-
18. A backup device comprising:
a computer readable medium having stored thereupon computing instructions including; a code segment to locate, on a first computing system, identification unique to the first computing system; a code segment to create a first encryption key using the located first computing system unique identification; a code segment to store the first encryption key on a backup device; a code segment to encrypt, using the first encryption key, a data file from the first computing system; and a code segment to store the encrypted data file from the first computing system on the backup device. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
Specification