SYSTEM AND METHOD FOR ENCRYPTING SECONDARY COPIES OF DATA
First Claim
Patent Images
1. A method of dynamically choosing a time to encrypt a copy of data created from data included in an original data set, the method comprising:
- receiving information related to a completion time of a data storage operation starting before a first time and required to be completed before the first time, wherein the data storage operation creates copies of at least a portion of the original data set;
estimating a modified completion time based on the completion time and based on a time required to encrypt the created copies of the at least portion of the data set; and
when the modified completion time occurs after the first time, encrypting data contained in the created copies after creation of the copies; and
when the modified completion time occurs before the first time, encrypting data contained in the created copies during creation of the copies.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for encrypting secondary copies of data is described. In some examples, the system encrypts a secondary copy of data after the secondary copy is created. In some examples, the system looks to information about a data storage system, and determines when and where to encrypt data based on the information.
-
Citations
8 Claims
-
1. A method of dynamically choosing a time to encrypt a copy of data created from data included in an original data set, the method comprising:
-
receiving information related to a completion time of a data storage operation starting before a first time and required to be completed before the first time, wherein the data storage operation creates copies of at least a portion of the original data set; estimating a modified completion time based on the completion time and based on a time required to encrypt the created copies of the at least portion of the data set; and when the modified completion time occurs after the first time, encrypting data contained in the created copies after creation of the copies; and when the modified completion time occurs before the first time, encrypting data contained in the created copies during creation of the copies. - View Dependent Claims (2, 3)
-
-
4. A method of dynamically choosing a resource to encrypt a copy of data created from data included in an original data set, the method comprising:
-
receiving information related to a completion time of a data storage operation starting before a first time and required to finish before the first time, wherein the data storage operation creates copies of at least a portion of the original data set; estimating a modified completion time based on the completion time and based on a time required to encrypt the created copies of the at least portion of the data set; and when the estimated completion time occurs after the first time, encrypting data contained in the created copies using resources not employed by the data storage operation.
-
-
5. A method of encrypting data to be stored as a secondary copy of a data set, the method comprising:
-
determining storage operations to be performed in creating the secondary copy of the data set, wherein determining storage operations includes identifying storage resources to be utilized by the storage operations; identifying from amongst the determined storage operations one or more storage operations to be used to encrypt the secondary copy; calculating a time to performing the determined storage operations including the identified storage operations to be used to encrypt the secondary copy; when the calculated time exceeds a threshold time for creating the secondary copy of the data set; identifying data within the data set to be stored without encryption, wherein identifying the data includes reviewing characteristics of the data to determine whether the data requires encryption under a pre-determined encryption criteria; storing the identified data within the data set to be stored without encryption, wherein storing the identified data includes utilizing the identified storage resources; and encrypting the non-identified data within the data set using storage resources not utilized by the storage operations. - View Dependent Claims (6, 7, 8)
-
Specification