System and method for securely deleting plaintext data
First Claim
1. A data deletion method comprising:
- detecting data deletion notification data representing a desire to delete data; and
providing a system invoked deletion process that modifies the desired data to be deleted in response to the detected data deletion notification data, wherein modifying includes;
encrypting the desired data to be deleted;
overwriting the desired data to be deleted; and
storing the encrypted data.
7 Assignments
0 Petitions
Accused Products
Abstract
A data deletion system and method detects data deletion notification data representing a desire to delete data, such as a data delete command from a storage management system such as an operating system or other software application. The system and method provides a system invoked deletion process that modifies the desired data to be deleted in response to the detected data deletion notification data. The system does not require continued user invocation to select data to be deleted. Modification of the desired data to be deleted includes actual deletion of the information by overwriting the desired data to be deleted with random data or other process such as overwriting original data multiple times, to ensure that there is no detectable electronic signature of the original data.
-
Citations
35 Claims
-
1. A data deletion method comprising:
-
detecting data deletion notification data representing a desire to delete data; and
providing a system invoked deletion process that modifies the desired data to be deleted in response to the detected data deletion notification data, wherein modifying includes;
encrypting the desired data to be deleted;
overwriting the desired data to be deleted; and
storing the encrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A data deletion method comprising:
-
detecting data deletion notification data representing a desire to delete data for a first deletion system; and
utilizing a system invoked pre-process deletion process, by a second deletion system, that modifies the desired data to be deleted in response to the detected data deletion notification data. - View Dependent Claims (10, 11, 12, 13, 14, 15)
encrypting the desired data to be deleted;
overwriting the desired data to be deleted; and
storing the encrypted data.
-
-
13. The data deletion method of claim 9 including providing storage media status data representing usable storage media that can allow overwriting of data to facilitate deletion of data.
-
14. The data deletion method of claim 9 wherein modifying includes overwriting the desired data a plurality of times.
-
15. The data deletion method of claim 9 including the step of selectively applying the system invoked deletion process to data based on deletion control data.
-
16. A data deletion system comprising:
-
a deletion detector operatively responsive to data deletion notification data representing a desire to delete data;
a system invoked secure data deletor, operatively coupled to the deletion detector, that modifies the desired data to be deleted in response to the detected data deletion notification data, wherein modifying includes;
encrypting the desired data to be deleted;
overwriting the desired data to be deleted; and
storing the encrypted data. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A data deletion system comprising:
-
a deletion detector operatively responsive to data deletion notification data representing a desire to delete data for a first deletion operation;
a centralized deletion control data provider that provides deletion control data;
a system invoked pre-process secure data deletor associated with a second deletion operation, operatively coupled to the deletion detector and to the centralized deletion control data provider, that modifies the desired data to be deleted in response to the detected data deletion notification data and the deletion control data. - View Dependent Claims (24, 25, 26, 27, 28, 29)
encrypting the desired data to be deleted;
overwriting the desired data to be deleted; and
storing the encrypted data.
-
-
28. The data deletion system of claim 23 wherein the system invoked pre-process secure data deletor selectively applies a system invoked pre-process deletion operation to data based on deletion control data.
-
29. The data deletion system of claim 23 wherein the centralized deletion control data provider provides a certificate containing the deletion control data.
-
30. A data deletion method comprising:
-
detecting data deletion notification data representing a desire to delete data; and
providing a system invoked deletion process that modifies the desired data to be deleted in response to the detected data deletion notification data, including the step of selectively applying the system invoked deletion process to data based on deletion control data. - View Dependent Claims (31, 32, 33)
-
-
34. A data deletion method comprising:
-
detecting data deletion notification data representing a desire to delete data; and
providing a system invoked deletion process that modifies the desired data to be deleted in response to the detected data deletion notification data, including evaluating storage media status data representing usable storage media that can allow overwriting of data to facilitate deletion of data.
-
-
35. A data deletion system comprising:
-
a deletion detector operatively responsive to data deletion notification data representing a desire to delete data;
a system invoked secure data deletor, operatively coupled to the deletion detector, that modifies the desired data to be deleted in response to the detected data deletion notification data, including a storage media status data generator wherein the storage media status data represents usable storage media that can allow overwriting of data to facilitate deletion of data.
-
Specification