×

REDUNDANT KEY MANAGEMENT

  • US 20160154963A1
  • Filed: 01/22/2016
  • Published: 06/02/2016
  • Est. Priority Date: 08/08/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • under the control of one or more computer systems configured with executable instructions,for each set of data objects of at least a plurality of sets of data objects;

    for each data object in the set of data objects;

    storing the data object in a first data store; and

    while the data object is stored in the first data store, providing an identifier for the data object that is usable to retrieve the data object after removal of the data object from the first data store;

    generating a first cryptographic key for the set of data objects;

    encrypting one or more data objects in the set using the first cryptographic key to generate one or more encrypted data objects;

    causing the first cryptographic key to be encrypted using a second cryptographic key, thereby resulting in an encrypted first cryptographic key; and

    redundantly storing the one or more encrypted data objects and the encrypted first cryptographic key, to achieve a first durability for the data object and a second durability for the encrypted first cryptographic key, using a plurality of data storage devices used by a second data storage system to persistently store the data objects, the second durability being greater than the first durability.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×