System and method for encrypting secondary copies of data
First Claim
Patent Images
1. A data storage system that encrypts secondary copies of data, the system comprising:
- at least one computer processor comprising computer hardware, the computer processor configured to perform a storage operation that creates at least one secondary copy of data;
the computer processor further configured to calculate a completion time to create and encrypt at least a portion of the secondary copy;
when the completion time exceeds a threshold time, the computer processor is configured to transfer the secondary copy to at least one storage device without encrypting at least a portion of the secondary copy, and after transfer, encrypt one or more unencrypted portions of the secondary copy; and
when the completion time is less than the threshold time, the computer processor is configured to encrypt at least a portion of the secondary copy in association with performing the storage operation.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for encrypting secondary copies of data is described. In some examples, the system encrypts a secondary copy of data after the secondary copy is created. In some examples, the system looks to information about a data storage system, and determines when and where to encrypt data based on the information.
244 Citations
20 Claims
-
1. A data storage system that encrypts secondary copies of data, the system comprising:
-
at least one computer processor comprising computer hardware, the computer processor configured to perform a storage operation that creates at least one secondary copy of data; the computer processor further configured to calculate a completion time to create and encrypt at least a portion of the secondary copy; when the completion time exceeds a threshold time, the computer processor is configured to transfer the secondary copy to at least one storage device without encrypting at least a portion of the secondary copy, and after transfer, encrypt one or more unencrypted portions of the secondary copy; and when the completion time is less than the threshold time, the computer processor is configured to encrypt at least a portion of the secondary copy in association with performing the storage operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A data storage system that that encrypts secondary copies of data, the system comprising:
-
at least one computer processor comprising computer hardware, the computer processor configured to perform a storage operation that creates at least one secondary copy of data; the computer processor further configured to calculate a completion time to create and encrypt at least a portion of the secondary copy; and when the completion time exceeds a threshold time, the computer processor is configured to transfer the secondary copy to at least one storage device without encrypting at least a portion of the secondary copy, and after transfer, encrypt one or more unencrypted portions of the secondary copy. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification