Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for altering the access characteristics of encrypted data

A technology for user data area and data, which is applied in the field of access characteristics and systems for changing encrypted data, and can solve problems such as encryption key management that cannot be solved.

Inactive Publication Date: 2010-04-21
IBM CORP
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional solutions have not addressed the problem of encryption key management among multiple users who require shared access to the same data storage box

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for altering the access characteristics of encrypted data
  • Method for altering the access characteristics of encrypted data
  • Method for altering the access characteristics of encrypted data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] A method, system and program are disclosed by storing one or more Encrypted Encapsulated Data Keys (or Externally Encrypted Data Keys) (EEDKs) in a user data area on a magnetic tape cartridge to effectively control or alter access to removable media such as magnetic Access to encrypted data in storage media. For example, when data is to be encrypted and stored on a removable storage medium, the data is encrypted using a data key, such as by performing AES encryption using a randomly generated 256-bit data key. The data can then be encrypted with a different encryption key (also called a key encryption key), such as by using public key cryptography techniques such as Rivest, Shamir and Adleman (RSA) or elliptic curve cryptography (ECC). Encryption or wrapping is performed to generate the EEDK, and the EEDK may be stored in one or more locations outside the user data area. By encrypting the data key with an encryption key to form an EEDK and then storing the EEDK to one...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method, system and program are provided for enabling access to encrypted data in a storage cartridge, where the encrypted data may be decoded by retrieving an encryption encapsulated data key (EEDK)from the cartridge, decrypting the EEDK with a decryption key to extract the underlying data key, and then using the extracted data key to decrypt the encrypted data. Access to the encrypted data maybe controlled by transforming one or more of the EEDKs stored on the cartridge without also having to use a new data key to encrypt and store encrypted data to the cartridge. Existing EEDKs may be transformed by adding new EEDKs to a cartridge to either supplement or replace existing EEDKs, or by deleting the existing EEDKs from the cartridge to effectively shred the cartridge, or by storing an unencrypted data key on the cartridge to set the cartridge to an unencrypted state.

Description

technical field [0001] The present invention relates to a method, system and program for securely providing a key to encode and decode data in a storage box. Background technique [0002] Whether designing an information management system for a single user, a small business, or a large-scale data warehouse, data protection and security assurance is one of the major concerns that must be addressed. Typically, data can be continuously archived on various storage media, such as magnetic tape cartridges or optical disks. When archiving data on tape or other removable storage media, one security risk is that someone could steal the tape and access the data. Likewise, if a tape could be mounted into a tape drive via a remote command transmitted over a network, there is a risk that someone could "hack" the system, mount a tape or other storage medium in the drive, and then data is accessed. [0003] Existing solutions have addressed some of these problems by encrypting all or mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00
CPCH04L9/30H04L9/08H04L9/0822H04L9/0894
Inventor J·M·卡普G·A·雅奎特P·M·格雷科
Owner IBM CORP