×

Maintaing encryption keys to provide encryption on top of data deduplication

  • US 9,652,634 B2
  • Filed: 05/19/2015
  • Issued: 05/16/2017
  • Est. Priority Date: 05/19/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • generating an encryption key based upon data content of a portion of data to be encrypted by the encryption key;

    storing the encryption key as one of a plurality of encryption keys within a subset of storage, each of the plurality of encryption keys generated based upon corresponding data content;

    calculating a checksum representing the plurality of encryption keys;

    calculating, in response to receiving an input/output (I/O) request for data encrypted by the encryption key, a verification checksum representing the plurality of encryption keys;

    modifying the checksum to a reserved value in response to determining the checksum and the verification checksum do not match due to a corruption of the plurality of encryption keys;

    repairing the plurality of encryption keys; and

    recalculating the checksum in response to the repairing of the plurality of encryption keys.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×