METHOD AND SYSTEM FOR DELETING DATA
First Claim
1. A method for deleting data in a computing environment comprising:
- providing a computer system having at least a first document, a second document, a plurality of decryption keys, and a plurality of data segments stored therein, each of the plurality of data segments being decryptable by a selected one of the plurality of decryption keys, wherein the plurality of decryption keys comprisesa first set of decryption keys, each being associated with the first document and not associated with the second document,a second set of decryption keys, each being associated with the second document and not associated with the first document; and
a third set of decryption keys, each being associated with the first document and the second document;
deleting the first document; and
in response to the deleting of the first document, rendering the first set of decryption keys unusable and not rendering the second set of decryption keys and the third set of decryption keys unusable.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, computer systems, and computer program products for deleting data in a computing environment are provided. A computer system having at least first and second documents, a plurality of decryption keys, and a plurality of data segments stored therein is provided. Each of the plurality of data segments is decryptable by a selected one of the decryption keys. The decryption keys include a first set of decryption keys associated with the first document and not associated with the second document, a second set of decryption keys associated with the second document and not associated with the first document, and a third set of decryption keys associated with the first document and the second document. The first document is deleted, and in response, the first set of decryption keys is rendered unusable, and the second set of decryption keys and the third set of decryption keys are not rendered unusable.
15 Citations
25 Claims
-
1. A method for deleting data in a computing environment comprising:
-
providing a computer system having at least a first document, a second document, a plurality of decryption keys, and a plurality of data segments stored therein, each of the plurality of data segments being decryptable by a selected one of the plurality of decryption keys, wherein the plurality of decryption keys comprises a first set of decryption keys, each being associated with the first document and not associated with the second document, a second set of decryption keys, each being associated with the second document and not associated with the first document; and a third set of decryption keys, each being associated with the first document and the second document; deleting the first document; and in response to the deleting of the first document, rendering the first set of decryption keys unusable and not rendering the second set of decryption keys and the third set of decryption keys unusable. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer system comprising:
-
at least one computer-readable medium having at least a first document, a second document, a plurality of decryption keys, and a plurality of data segments stored thereon, each of the plurality data segments being decryptable by a selected one of the plurality of decryption keys, wherein the plurality of decryption keys comprises a first set of decryption keys, each being associated with the first document and not associated with the second document, and a second set of decryption keys, each being associated with the second document and not associated with the first document; and a third set of decryption keys, each being associated with the first document and the second document; and at least one processor in operable communication with the at least one computer-readable medium, the at least one processor being adapted to; delete the first document; and in response to the deleting of the first document, render the first set of decryption keys unusable and not render the second set of decryption keys and the third set of decryption keys unusable.
-
-
11. The computer system of claim 11, wherein the at least one computer-readable medium further has a plurality of data segments stored thereon, the plurality of data segments comprising
a first set of data segments associated with the first document and the first set of decryption keys and not associated with the second document and the second set of decryption keys; -
a second set of data segments associated with the second document and the second set of decryption keys and not associated with the first document and the first set of decryption keys; and a third set of data segments associated with the first document, the first set of decryption keys, the second document, and the second set of decryption keys. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A computer program product for deleting data in a computing environment, the computing environment comprising at least one computer-readable medium having a first document, a second document, a plurality of decryption keys, and a plurality of data segments stored thereon, each of the plurality data segments being decryptable by a selected one of the plurality of decryption keys, the plurality of decryption keys comprising a first set of decryption keys, each being associated with the first document and not associated with the second document, a second set of decryption keys, each being associated with the second document and not associated with the first document, and a third set of decryption keys, each being associated with the first document and the second document, the computer-readable storage medium further having computer-readable program code portions stored thereon, the computer-readable program code portions comprising:
-
a first executable portion for deleting the first document; and a second executable portion for, in response to the deleting of the first document, rendering the first set of decryption keys unusable and not rendering the second set of decryption keys and the third set of decryption keys unusable. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
Specification