Sector map-based rapid data encryption policy compliance
First Claim
1. A method comprising:
- receiving, by a computing device, a request to activate a policy for the computing device, the policy indicating that data written by the computing device to a storage volume after activation of the policy be encrypted;
activating, in response to the request, the policy for the computing device, including;
encrypting data written to the storage volume after returning an indication of compliance with the policy,using a sector map to identify one or more sectors of the storage volume that are not encrypted, the sector map identifying one or more sectors of the storage volume written to prior to the sector map being locked to prohibit changes to the sector map and the sector map including signatures of sectors that were written to the storage volume prior to the sector map being locked, the sector map being locked as part of a process of installing an operating system on the computing device, data written to the storage volume after the sector map is locked being encrypted but at least some data written to the storage volume before the sector map is locked not being encrypted, andusing the sector map to determine whether to decrypt content of a sector of the storage volume in response to a request to read the content of the sector; and
returning, in response to the request, the indication of compliance with the policy despite one or more sectors of the storage volume being unencrypted.
2 Assignments
0 Petitions
Accused Products
Abstract
To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, a sector map is accessed. The sector map identifies one or more sectors of a storage volume and also identifies, for each of the one or more sectors of the storage volume, a signature of the content of the sector. In response to a request to read the content of a sector, the content of the sector is returned without decrypting the content if the sector is one of the one or more sectors and the signature of the content of the sector matches the signature of the sector identified in the sector map. Otherwise, the content of the sector is decrypted and the decrypted content is returned.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by a computing device, a request to activate a policy for the computing device, the policy indicating that data written by the computing device to a storage volume after activation of the policy be encrypted; activating, in response to the request, the policy for the computing device, including; encrypting data written to the storage volume after returning an indication of compliance with the policy, using a sector map to identify one or more sectors of the storage volume that are not encrypted, the sector map identifying one or more sectors of the storage volume written to prior to the sector map being locked to prohibit changes to the sector map and the sector map including signatures of sectors that were written to the storage volume prior to the sector map being locked, the sector map being locked as part of a process of installing an operating system on the computing device, data written to the storage volume after the sector map is locked being encrypted but at least some data written to the storage volume before the sector map is locked not being encrypted, and using the sector map to determine whether to decrypt content of a sector of the storage volume in response to a request to read the content of the sector; and returning, in response to the request, the indication of compliance with the policy despite one or more sectors of the storage volume being unencrypted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computing device comprising:
-
one or more hardware processors; and one or more computer storage media devices having stored thereon multiple instructions that, when executed by the one or more processors to comply with a policy for the computing device, cause the one or more processors to; access a sector map identifying one or more sectors of a storage volume written to prior to changes to the sector map being locked to prohibit changes to the sector map, the sector map being locked as part of a process of installing an operating system on the computing device, the sector map further identifying, for each of the one or more sectors, a signature of the content of the sector, the policy indicating that data written by the computing device to the storage volume after activation of the policy be encrypted; in response to a request to read the content of a sector of the storage volume; read the content of the sector from the storage volume and return the content of the sector of the storage volume without decrypting the content in response to both the sector not having been written to after the sector map was locked to prohibit changes to the sector map and the signature of the content of the sector matching the signature of the sector identified in the sector map; and read the content of the sector from the storage volume, decrypt the content of the sector of the storage volume, and return the decrypted content in response to the sector having been written to after the sector map was locked to prohibit changes to the sector map. - View Dependent Claims (10, 11, 12, 14, 15, 16)
-
-
13. One or more computer storage media devices having stored thereon multiple instructions that, when executed by one or more processors of a computing device, cause the one or more processors to perform acts comprising:
-
accessing, in the computing device complying with a policy indicating that data written by the computing device to a storage volume after activation of the policy be encrypted, a sector map identifying one or more sectors of the storage volume written to prior to the sector map being locked to prohibit changes to the sector map, the sector map further identifying, for each of the one or more sectors, a signature of the content of the sector, the sector map being locked as part of a process of installing an operating system on the computing device; receiving a request to read the content of a sector of the storage volume; checking whether the sector is identified in the sector map; decrypting the content of the sector and returning the decrypted content of the sector in response to the sector not being identified in the sector map; in response to both the sector being identified in the sector map and the sector not having been written to after the sector map was locked to prohibit changes to the sector map; checking whether the signature of the content of the sector matches the signature identified for the sector in the sector map, reading the content of the sector from the storage volume, decrypting the content of the sector, and returning the decrypted content of the sector in response to the signature of the content of the sector not matching the signature identified in the sector map of the sector, and reading the content of the sector from the storage volume and returning the content of the sector without decrypting the content of the sector in response to the signature of the content of the sector matching the signature identified in the sector map of the sector. - View Dependent Claims (17, 18, 19, 20)
-
Specification