Distribution of encrypted information in multiple locations
First Claim
1. A method for storing information in a distributed data-processing environment, the method comprising:
- encrypting, by one or more processors, a piece of information;
splitting, by one or more processors, the encrypted piece of information into at least one first encrypted block and at least one second encrypted block, at least part of said at least one first encrypted block being required for decrypting said at least one second encrypted block;
distributing, by one or more processors, said at least one first encrypted block for storing in at least one first location;
distributing, by one or more processors, said at least one second encrypted block for storing in at least one second location;
retrieving, by one or more processors, said at least one first encrypted block and said least one second encrypted block from said at least one first location and from said at least one second location, respectively;
reconstructing, by one or more processors, the encrypted piece of information from said at least one first encrypted block and said at least one second encrypted block;
decrypting, by one or more processors, the encrypted piece of information to restore the piece of information; and
intercepting, by one or more processors, a retrieve command for retrieving the piece of information, wherein said retrieving, reconstructing and decrypting are performed in response to the interception of the retrieve command.
7 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and/or computer program product stores information in a distributed data-processing environment. The method comprises: encrypting, by one or more processors, a piece of information; splitting, by one or more processors, the encrypted piece of information into at least one first encrypted block and at least one second encrypted block, at least part of said at least one first encrypted block being required for decrypting said at least one second encrypted block; distributing, by one or more processors, said at least one first encrypted block for storing in at least one first location; and distributing, by one or more processors, said at least one second encrypted block for storing in at least one second location.
-
Citations
18 Claims
-
1. A method for storing information in a distributed data-processing environment, the method comprising:
-
encrypting, by one or more processors, a piece of information; splitting, by one or more processors, the encrypted piece of information into at least one first encrypted block and at least one second encrypted block, at least part of said at least one first encrypted block being required for decrypting said at least one second encrypted block; distributing, by one or more processors, said at least one first encrypted block for storing in at least one first location; distributing, by one or more processors, said at least one second encrypted block for storing in at least one second location; retrieving, by one or more processors, said at least one first encrypted block and said least one second encrypted block from said at least one first location and from said at least one second location, respectively; reconstructing, by one or more processors, the encrypted piece of information from said at least one first encrypted block and said at least one second encrypted block; decrypting, by one or more processors, the encrypted piece of information to restore the piece of information; and intercepting, by one or more processors, a retrieve command for retrieving the piece of information, wherein said retrieving, reconstructing and decrypting are performed in response to the interception of the retrieve command. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer program product for storing information in a distributed data-processing environment, the computer program product comprising a computer readable storage device having program code embodied therewith, the program code readable and executable by a processor to perform a method comprising:
-
encrypting a piece of information; splitting the encrypted piece of information into at least one first encrypted block and at least one second encrypted block, at least part of said at least one first encrypted block being required for decrypting said at least one second encrypted block; distributing said at least one first encrypted block for storing in at least one first location; and distributing said at least one second encrypted block for storing in at least one second location; retrieving said at least one first encrypted block and said least one second encrypted block from said at least one first location and from said at least one second location, respectively; reconstructing the encrypted piece of information from said at least one first encrypted block and said at least one second encrypted block; decrypting the encrypted piece of information to restore the piece of information; and intercepting a retrieve command for retrieving the piece of information, wherein said retrieving, reconstructing and decrypting are performed in response to the interception of the retrieve command. - View Dependent Claims (14, 15, 16)
-
-
17. A computer system comprising:
-
a processor, a computer readable memory, and a computer readable storage medium; first program instructions to encrypt a piece of information; second program instructions to split the encrypted piece of information into at least one first encrypted block and at least one second encrypted block, at least part of said at least one first encrypted block being required for decrypting said at least one second encrypted block; third program instructions to distribute said at least one first encrypted block for storing in at least one first location; and fourth program instructions to distribute said at least one second encrypted block for storing in at least one second location; fifth program instructions to retrieve said at least one first encrypted block and said least one second encrypted block from said at least one first location and from said at least one second location, respectively; sixth program instructions to reconstruct the encrypted piece of information from said at least one first encrypted block and said at least one second encrypted block; seventh program instructions to decrypt the encrypted piece of information to restore the piece of information; and eighth program instructions to intercept a retrieve command for retrieving the piece of information, wherein said retrieving, reconstructing and decrypting are performed in response to the interception of the retrieve command; and
whereinthe first, second, third, fourth, fifth, sixth, seventh and eighth program instructions are stored on the computer readable storage medium and executed by the processor via the computer readable memory. - View Dependent Claims (18)
-
Specification