Crypto-erasure of data stored in key per IO-enabled device via internal action

Device-implemented methodology for enabling and/or performing crypto-erase via internal action and/or external action in a Key per IO-enabled system. In various approaches, crypto-erasure of the data stored in a Key per IO scheme is enabled by implementing an internal key, which is combined with an...

Full description

Saved in:
Bibliographic Details
Main Author Glen Alan Jaquette
Format Patent
LanguageEnglish
Published 27.09.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Device-implemented methodology for enabling and/or performing crypto-erase via internal action and/or external action in a Key per IO-enabled system. In various approaches, crypto-erasure of the data stored in a Key per IO scheme is enabled by implementing an internal key, which is combined with an external key to generate a media encryption key, which is in turn used to encrypt/decrypt data. By restricting access to the internal key, destruction of the internal key and all media encryption key (s) created using the internal key, renders the data crypto-erased, and thus unrecoverable.
Bibliography:Application Number: GB20230010288