×

Host based rekeying

  • US 9,774,445 B1
  • Filed: 09/04/2007
  • Issued: 09/26/2017
  • Est. Priority Date: 09/04/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a computing device, a re-key command issued by a host computer for one or more stored ciphertexts each associated with one of a plurality of designated data blocks stored on one or more disk storage devices, wherein the issuing of the re-key command is initiated based on one or more re-writing policies that tracks thresholds associated with one or more old encryption key attributes stored on the host computer; and

    generating, by the computing device, a plurality of new encryption keys, upon receipt of the re-key command issued from the host computer, wherein the plurality of new encryption keys are adapted to apply to the one or more stored ciphertexts;

    reading, by the computing device, the one or more stored ciphertexts;

    decrypting, by the computing device, the one or more stored ciphertexts using one or more old encryption keys to produce a decrypted data file comprising content;

    re-encrypting, by the computing device, a portion of the decrypted data file using a first one of new encryption keys and re-encrypting another portion of the data file using a second one of new encryption keys to produce re-encrypted ciphertext; and

    writing, by the computing device, the re-encrypted ciphertext, into the one or more disk storage devices.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×