Data storage and/or retrieval
First Claim
Patent Images
1. A method, comprising:
- receiving a write request from a clientto store data of the write request at first and second locations that are non-sequential on a storage medium, wherein an area between the first and the second locations corresponds to content of the storage medium that has not been written to or overwritten;
recognizing that the data of the write request is not a predefined data pattern of one or more predefined data patterns;
applying a first encryption method to the data of the write request prior to storing the data at the first and the second locations that are non-sequential on the storage medium;
recognizing the content of the area between the first and the second locations as the predefined data pattern of the one or more predefined data patterns; and
applying a second encryption method associated with the predefined data pattern to the content of the area between the first and the second locations, wherein the second encryption method is different than the first encryption method.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method comprises receiving a write request from a client to store data at first and second non-sequential locations of a storage medium. The data of the write request is recognized as not being a predefined data pattern, and a first encryption method is applied to the data of the write request before it is stored at the first and second non-sequential locations of the storage medium. Further, a second different encryption method is applied to content of an area between the first and second non-sequential locations, where the content of the area is recognized as being the predefined pattern.
-
Citations
37 Claims
-
1. A method, comprising:
-
receiving a write request from a client to store data of the write request at first and second locations that are non-sequential on a storage medium, wherein an area between the first and the second locations corresponds to content of the storage medium that has not been written to or overwritten; recognizing that the data of the write request is not a predefined data pattern of one or more predefined data patterns; applying a first encryption method to the data of the write request prior to storing the data at the first and the second locations that are non-sequential on the storage medium; recognizing the content of the area between the first and the second locations as the predefined data pattern of the one or more predefined data patterns; and applying a second encryption method associated with the predefined data pattern to the content of the area between the first and the second locations, wherein the second encryption method is different than the first encryption method. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer-readable medium containing executable program instructions executed by a processor, comprising:
-
program instructions that receive a write request from a client to store data of the write request at first and second location that are non-sequential on a storage media, wherein an area between the first and the second locations corresponds to content of the storage media that has not been written to or overwritten; program instructions that recognize that the data of the write request is not a predefined data pattern of one or more predefined data patterns; program instructions that apply a first encryption method to the data of the write request prior to storing the data at the first and the second locations that are non-sequential on the storage media; program instructions that recognize the content of the area between the first and the second locations as the predefined data pattern of the one or more predefined data patterns; and program instructions that apply a second encryption method associated with the predefined data pattern to the content of the area between the first and the second locations, wherein the second encryption method is different than the first encryption method. - View Dependent Claims (22, 23, 24)
-
-
25. A system, comprising:
-
a computer system configured to receiving a write request from a client to write data of the write request at first and second locations that are non-sequential on a storage medium, wherein an area between the first and the second locations corresponds to content of the storage medium that has not been written to or overwritten; a processor of the computer system configured to recognize that the data of the write request is not a predefined data pattern of one or more predefined data patterns, the processor further configured to apply a first encryption method to the data of the write request prior to storing the data at the first and the second locations that are non-sequential on the storage medium, the processor further configured to recognize the content of the area between the first and the second locations as the predefined data pattern of the one or more predefined data patterns, and the processor further configured to apply a second encryption method associated with the predefined data pattern to the content of the area between the first and the second locations, wherein the second encryption method is different than the first encryption method. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification