×

Method and system for policy-based secure destruction of data

  • US 8,793,457 B2
  • Filed: 01/22/2007
  • Issued: 07/29/2014
  • Est. Priority Date: 01/22/2007
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for policy-based secure destruction of data, the method comprising:

  • storing a data destruction policy, wherein the data destruction policy defines at least one predetermined data destruction parameter, wherein the data destruction policy pertains to a particular storage device;

    referencing the data destruction policy to obtain the at least one predetermined data destruction parameter in response to a predetermined data operation;

    identifying an entire stored data object to be destroyed based on the data destruction policy in response to the predetermined data operation, the entire stored data object associated with a stored object header; and

    executing a data destruction process of the entire stored data object in accordance with the at least one data destruction parameter, wherein the data destruction process comprises overwriting the entire stored data object with a predetermined and random bit pattern, checking a value of the object header to ensure that physical data in a location of the entire stored data object corresponds to the overwritten entire stored data object, and overwriting the stored object header associated with the entire stored data object with a dummy header in response to validating the value of the object header, the dummy header comprising metadata indicating that the entire stored data object has been destroyed by the data destruction process, the dummy header further comprising metadata indicating the bit pattern used by the data destruction process to destroy the entire stored data object, wherein the entire stored data object is unusable; and

    auditing a selected storage volume to determine whether the data destruction policy has been accurately applied, the selected storage volume comprising the entire stored data object, wherein auditing includes determining whether the stored object header has been overwritten with the dummy header.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×