×

Methodology for vaulting data encryption keys with encrypted storage

  • US 8,190,921 B1
  • Filed: 12/27/2007
  • Issued: 05/29/2012
  • Est. Priority Date: 12/27/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • in response to a failure event;

    copying an encrypted portion of data from system memory to a vault location of persistent storage, the encrypted portion of data including a set of cryptographic keys, each cryptographic key being encrypted with a key encryption key, each cryptographic key for encrypting a specific portion of persistent storage;

    encrypting an unencrypted portion of data from system memory to create an encrypted version of the unencrypted portion of data, wherein encrypting the unencrypted portion of data includes encrypting the unencrypted portion of data with a plurality of cryptographic keys of the set of cryptographic keys, each of the plurality of cryptographic keys corresponding to a different portion of the vault location of persistent storage;

    writing the encrypted version of the unencrypted portion of data to the vault location of persistent storage; and

    performing a system restart;

    wherein the unencrypted portion of data includes cached data and instructions for writing the cached data to persistent storage; and

    in response to the system restart;

    copying the encrypted portion of data from persistent storage to system memory; and

    in response to copying the encrypted portion of data from persistent storage to system memory, decrypting the encrypted version of the unencrypted portion of data to recreate the unencrypted portion of data, and writing the recreated unencrypted portion of data to system memory, wherein decrypting the encrypted version of the unencrypted portion of data includes;

    decrypting the plurality of cryptographic keys with the key encryption key; and

    for each portion of the vault location, decrypting the encrypted version of the unencrypted portion of data with the cryptographic key of the plurality of cryptographic keys corresponding to the portion of the vault location.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×