Method and system for managing information retention
First Claim
1. A method for managing information retention in a system, comprising:
- receiving a set of information into a system;
associating one or more keys with said set of information;
encrypting said set of information using said one or more keys;
storing said set of information in encrypted form into one or more repositories, wherein only the encrypted form of the set of information is persistently stored within the information system and no unencrypted form of the set of information is persistently stored within the information system;
purging said set of information from the system so that said set of information is not available to a user from the system by deleting said one or more keys, thereby making said set of information unrenderable;
prior to deletion of said one or more keys, receiving a request from an information sink to render said set of information to a user accessing the encrypted form of said set of information from the one or more repositories;
accessing said one or more keys;
providing the encrypted form of said set of information and said one or more keys to the information sink to enable the information sink to decrypt the encrypted form of said set of information; and
using said one or more keys to render said set of information to the user, wherein the information sink comprises sufficient logic to prevent it from persistently storing said one or more keys received from an information manager.
2 Assignments
0 Petitions
Accused Products
Abstract
An improved information retention management mechanism is disclosed wherein an information set may be purged from an information system without having to delete the information set from the system. Whenever an information set enters an information system, a key is associated with the information set. The information set is encrypted using the associated key, and the encrypted form of the information set is stored in the information system. The unencrypted form of the information set is not stored. To render the information set to a user, the encrypted form of the information set is accessed along with the associated key, and then decrypted using the associated key to derive the original information set. Once derived, the information set is rendered to the user. So long as the associated key remains in the system, this process may be carried out to render the information set to a user. At some point, in accordance with an information retention policy, the information set is selected for purging. To purge the information set, all that needs to be done is to delete the associated key. By deleting the associated key, all copies of the encrypted information set stored within the information system are made unrenderable; as a result, the information set is effectively “purged” from the system. This purging is achieved without having to delete the encrypted information set from the system.
200 Citations
30 Claims
-
1. A method for managing information retention in a system, comprising:
-
receiving a set of information into a system;
associating one or more keys with said set of information;
encrypting said set of information using said one or more keys;
storing said set of information in encrypted form into one or more repositories, wherein only the encrypted form of the set of information is persistently stored within the information system and no unencrypted form of the set of information is persistently stored within the information system;
purging said set of information from the system so that said set of information is not available to a user from the system by deleting said one or more keys, thereby making said set of information unrenderable;
prior to deletion of said one or more keys, receiving a request from an information sink to render said set of information to a user accessing the encrypted form of said set of information from the one or more repositories;
accessing said one or more keys;
providing the encrypted form of said set of information and said one or more keys to the information sink to enable the information sink to decrypt the encrypted form of said set of information; and
using said one or more keys to render said set of information to the user, wherein the information sink comprises sufficient logic to prevent it from persistently storing said one or more keys received from an information manager. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus for managing information retention in a system, comprising:
-
a mechanism for receiving a set of information into a system;
a mechanism for associating one or more keys with said set of information;
a mechanism for encrypting said set of information using said one or more keys;
a mechanism for storing said set of information in encrypted form into one or more repositories, wherein only the encrypted form of the set of information is persistently stored within the information system and no unencrypted form of the set of information is persistently stored within the information system;
a mechanism for purging said set of information from the system so that said set of information is not available to a user from the system by deleting said one or more keys, thereby making said set of information unrenderable;
a mechanism for receiving prior to deletion of said one or more keys, a request from an information sink to render said set of information to a user;
a mechanism for accessing the encrypted form of said set of information from the one or more repositories;
a mechanism for accessing said one or more keys;
a mechanism for providing the encrypted form of said set of information and said one or more keys to the information sink to enable the information sink to decrypt the encrypted form of said set of information; and
using said one or more keys to render said set of information to the user, wherein the information sink comprises sufficient logic to prevent it from persistently storing said one or more keys received from an information manager. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer readable medium having stored thereon instructions which, when executed by one or more processors, cause the one or more processors to manage information retention in a system, comprising:
-
instructions for causing one or more processors to receive a set of information into a system;
instructions for causing one or more processors to associate one or more keys with said set of information;
instructions for causing one or more processors to encrypt said set of information using said one or more keys;
instructions for causing one or more processors to store said set of information in encrypted form into one or more repositories;
wherein only the encrypted form of the set of information is persistently stored within the information system and no unencrypted form of the set of information is persistently stored within the information system, instructions for causing one or more processors to purge said set of information from the system so that said set of information is not available to a user from the system by deleting said one or more keys, thereby making said set of information unrenderable;
instructions for causing one or more processors to receive, prior to deletion of said one or more keys, a request from an information sink to render said set of information to a user;
instructions for causing one or more processors to access the encrypted form of said set of information from the one or more repositories;
instructions for causing one or more processors to access said one or more keys;
instructions for causing one or more processors to provide the encrypted form of said set of information and said one or more keys to the information sink to enable the information sink to decrypt the encrypted form of said set of information; and
instructions for using said one or more keys to render said set of information to the user, wherein the information sink comprises sufficient logic to prevent it from persistently storing said one or more keys received from an information manager. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification