Management of the retention and/or discarding of stored data
First Claim
Patent Images
1. A method for making data stored in a computer data storage system unrecoverable, comprising:
- providing a data storage computer system for storing a data originating from a plurality of files stored by one or more client computers as the stored data, the stored data being stored in permanent storage devices by the data storage computer system;
providing a root key;
providing a first retention key;
providing a first file key;
encrypting a first data file using the first file key;
encrypting the first file key using the first retention key to make a first encrypted file key, and storing the first encrypted file key;
encrypting the first retention key using the root key to make a first encrypted retention key, and storing the encrypted retention key;
encrypting a plurality of additional first data files using a first selected file key for each additional data file;
encrypting each first selected file key by the first retention key to form an encrypted first selected file key, and storing each encrypted first selected file key;
discarding the first data file by destroying the first encrypted file key; and
discarding the plurality of additional first data files by destroying the first encrypted retention key;
using a delete function to mark one or more particular encrypted files of a selected group of files as deleted (hereinafter the deleted files), where each file of the selected group of files is encrypted by a respective file encryption key, each respective file encryption key being encrypted by an old retention key;
recovering one or more respective file encryption key(s) corresponding to one or more particular encrypted file(s) of the selected group of files not marked as deleted by un-encrypting the corresponding one or more respective file encryption key(s) using the old retention key;
re-encrypting the recovered file encryption key(s) using a new retention key; and
discarding the deleted files by destroying the old retention key, while retaining all files of the group of files which were not marked as deleted by retaining the re-encrypted file encryption key(s) and the new retention key.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of methods, devices and/or systems for a method of managing the retention and/or discarding of stored data are described.
61 Citations
23 Claims
-
1. A method for making data stored in a computer data storage system unrecoverable, comprising:
-
providing a data storage computer system for storing a data originating from a plurality of files stored by one or more client computers as the stored data, the stored data being stored in permanent storage devices by the data storage computer system; providing a root key; providing a first retention key; providing a first file key; encrypting a first data file using the first file key; encrypting the first file key using the first retention key to make a first encrypted file key, and storing the first encrypted file key; encrypting the first retention key using the root key to make a first encrypted retention key, and storing the encrypted retention key; encrypting a plurality of additional first data files using a first selected file key for each additional data file; encrypting each first selected file key by the first retention key to form an encrypted first selected file key, and storing each encrypted first selected file key; discarding the first data file by destroying the first encrypted file key; and discarding the plurality of additional first data files by destroying the first encrypted retention key; using a delete function to mark one or more particular encrypted files of a selected group of files as deleted (hereinafter the deleted files), where each file of the selected group of files is encrypted by a respective file encryption key, each respective file encryption key being encrypted by an old retention key; recovering one or more respective file encryption key(s) corresponding to one or more particular encrypted file(s) of the selected group of files not marked as deleted by un-encrypting the corresponding one or more respective file encryption key(s) using the old retention key; re-encrypting the recovered file encryption key(s) using a new retention key; and discarding the deleted files by destroying the old retention key, while retaining all files of the group of files which were not marked as deleted by retaining the re-encrypted file encryption key(s) and the new retention key. - View Dependent Claims (2, 3, 4)
-
-
5. A method for operating a computer data storage system, comprising:
-
providing a plurality of file keys, each file key of the plurality of file keys used to encrypt at least one data file, and storing the at least one data file on a data storage device; providing a plurality of retention keys, each retention key used to encrypt selected ones of the file keys; providing a root key, the root key used to encrypt each retention key of the plurality of retention keys to make an encrypted retention key of each of the plurality of retention keys, and storing each of the encrypted retention keys; using the encrypted file key to both encrypt the data file and decrypt the data file after the encrypted file key is decrypted by its retention key; decrypting the encrypted file key by its retention key after the retention key is decrypted by the root key; discarding one or more data files by discarding at least one encrypted key which must be decrypted in order to decrypt the data file; using a delete function to mark one or more particular encrypted files of a selected group of files as deleted (hereinafter the deleted files), where each file of the selected group of files is encrypted by a respective file encryption key, each respective file encryption key being encrypted by an old retention key; recovering one or more respective file encryption key(s) corresponding to one or more particular encrypted file(s) of the selected group of files not marked as deleted by un-encrypting the corresponding one or more respective file encryption key(s) using the old retention key; re-encrypting the recovered file encryption key(s) using a new retention key; and discarding the deleted files by destroying the old retention key, while retaining all files of the group of files which were not marked as deleted by retaining the re-encrypted file encryption key(s) and the new retention key. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer data storage system apparatus, comprising:
-
a data storage device; a processor configured to execute software to, provide a plurality of file keys, each file key of the plurality of file keys used to encrypt at least one data file, and storing the at least one data file on the data storage device; provide a plurality of retention keys, each retention key used to encrypt selected ones of the file keys; provide a root key, the root key used to encrypt each retention key of the plurality of retention keys to make an encrypted retention key of each of the plurality of retention keys, and storing each of the encrypted retention keys; use the encrypted file key to both encrypt the data file and decrypt the data file after the encrypted file key is decrypted by its retention key; decrypt the encrypted file key by its retention key after the retention key is decrypted by the root key; discard one or more data files by discarding at least one encrypted key which must be decrypted in order to decrypt the data file; use a delete function to mark one or more particular encrypted files of a selected group of files as deleted (hereinafter the deleted files), where each file of the selected group of files is encrypted by a respective file encryption key, each respective file encryption key being encrypted by an old retention key; recover one or more respective file encryption key(s) corresponding to one or more particular encrypted file(s) of the selected group of files not marked as deleted by un-encrypting the corresponding one or more respective file encryption key(s) using the old retention key; re-encrypt the recovered file encryption key(s) using a new retention key; and discard the deleted files by destroying the old retention key, while retaining all files of the group of files which were not marked as deleted by retaining the re-encrypted file encryption key(s) and the new retention key. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer readable storage media, comprising:
-
said computer readable storage media containing instructions for execution on a processor for a method of operating a computer data storage system, having, providing a plurality of file keys, each file key of the plurality of file keys used to encrypt at least one data file, and storing the at least one data file on a data storage device; providing a plurality of retention keys, each retention key used to encrypt selected ones of the file keys; providing a root key, the root key used to encrypt each retention key of the plurality of retention keys to make an encrypted retention key of each of the plurality of retention keys, and storing each of the encrypted retention keys; using the encrypted file key to both encrypt the data file and decrypt the data file after the encrypted file key is decrypted by its retention key; decrypting the encrypted file key by its retention key after the retention key is decrypted by the root key; and discarding one or more data files by discarding at least one encrypted key which must be decrypted in order to decrypt the data file; using a delete function to mark one or more particular encrypted files of a selected group of files as deleted (hereinafter the deleted files), where each file of the selected group of files is encrypted by a respective file encryption key, each respective file encryption key being encrypted by an old retention key; recovering one or more respective file encryption key(s) corresponding to one or more particular encrypted file(s) of the selected group of files not marked as deleted by un-encrypting the corresponding one or more respective file encryption key(s) using the old retention key; re-encrypting the recovered file encryption key(s) using a new retention key; and discarding the deleted files by destroying the old retention key, while retaining all files of the group of files which were not marked as deleted by retaining the re-encrypted file encryption key(s) and the new retention key.
-
Specification