Single command functionality for providing data security and preventing data access within a decommissioned information handling system

A computer-implemented method comprises a service processor: establishing a kill switch encryption key (KSEK) to provide data security for data within storage devices of configurable components within a system; automatically encrypting, with the KSEK, data that is written to one of the storage devic...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: WEBB THEODORE, JABER MUHAMMED, HASS JON
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator WEBB THEODORE
JABER MUHAMMED
HASS JON
description A computer-implemented method comprises a service processor: establishing a kill switch encryption key (KSEK) to provide data security for data within storage devices of configurable components within a system; automatically encrypting, with the KSEK, data that is written to one of the storage devices; configuring the configurable components to prevent access to the stored data unless a valid copy of the KSEK is received from the service processor along with the request for the data; automatically decrypting, with the KSEK, the KSEK-encrypted data that is read from storage device; and in response to receiving a verified request to decommission the system, performing the decommissioning by deleting/erasing the KSEK from a secure storage at which the only instance of the KSEK is maintained. Deletion of the KSEK results in a permanent loss of access to the stored encrypted data within the system because the stored encrypted data cannot be decrypted without the KSEK.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US8938626B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US8938626B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US8938626B23</originalsourceid><addsrcrecordid>eNqNjD0KwkAQRtNYiHqHuYBNAiG2imIfrcOwO9GB_WNnE8kJvLa7INZWX_G999bVu2f3MATKW4tOwzg5ldg7NJwWGH2EEP3MOlOgMSEIqSmWr9Ah0kwu_U5UikTgxenJDhA0lS6L5CJpYJeDFksfntk3RZRFEtlttRrRCO2-u6ngcr6drnsKfiAJqMhRGu59d2i6tm6PdfMH8gG2GE0h</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Single command functionality for providing data security and preventing data access within a decommissioned information handling system</title><source>esp@cenet</source><creator>WEBB THEODORE ; JABER MUHAMMED ; HASS JON</creator><creatorcontrib>WEBB THEODORE ; JABER MUHAMMED ; HASS JON</creatorcontrib><description>A computer-implemented method comprises a service processor: establishing a kill switch encryption key (KSEK) to provide data security for data within storage devices of configurable components within a system; automatically encrypting, with the KSEK, data that is written to one of the storage devices; configuring the configurable components to prevent access to the stored data unless a valid copy of the KSEK is received from the service processor along with the request for the data; automatically decrypting, with the KSEK, the KSEK-encrypted data that is read from storage device; and in response to receiving a verified request to decommission the system, performing the decommissioning by deleting/erasing the KSEK from a secure storage at which the only instance of the KSEK is maintained. Deletion of the KSEK results in a permanent loss of access to the stored encrypted data within the system because the stored encrypted data cannot be decrypted without the KSEK.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2015</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20150120&amp;DB=EPODOC&amp;CC=US&amp;NR=8938626B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,778,883,25547,76298</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20150120&amp;DB=EPODOC&amp;CC=US&amp;NR=8938626B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>WEBB THEODORE</creatorcontrib><creatorcontrib>JABER MUHAMMED</creatorcontrib><creatorcontrib>HASS JON</creatorcontrib><title>Single command functionality for providing data security and preventing data access within a decommissioned information handling system</title><description>A computer-implemented method comprises a service processor: establishing a kill switch encryption key (KSEK) to provide data security for data within storage devices of configurable components within a system; automatically encrypting, with the KSEK, data that is written to one of the storage devices; configuring the configurable components to prevent access to the stored data unless a valid copy of the KSEK is received from the service processor along with the request for the data; automatically decrypting, with the KSEK, the KSEK-encrypted data that is read from storage device; and in response to receiving a verified request to decommission the system, performing the decommissioning by deleting/erasing the KSEK from a secure storage at which the only instance of the KSEK is maintained. Deletion of the KSEK results in a permanent loss of access to the stored encrypted data within the system because the stored encrypted data cannot be decrypted without the KSEK.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2015</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjD0KwkAQRtNYiHqHuYBNAiG2imIfrcOwO9GB_WNnE8kJvLa7INZWX_G999bVu2f3MATKW4tOwzg5ldg7NJwWGH2EEP3MOlOgMSEIqSmWr9Ah0kwu_U5UikTgxenJDhA0lS6L5CJpYJeDFksfntk3RZRFEtlttRrRCO2-u6ngcr6drnsKfiAJqMhRGu59d2i6tm6PdfMH8gG2GE0h</recordid><startdate>20150120</startdate><enddate>20150120</enddate><creator>WEBB THEODORE</creator><creator>JABER MUHAMMED</creator><creator>HASS JON</creator><scope>EVB</scope></search><sort><creationdate>20150120</creationdate><title>Single command functionality for providing data security and preventing data access within a decommissioned information handling system</title><author>WEBB THEODORE ; JABER MUHAMMED ; HASS JON</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US8938626B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2015</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>WEBB THEODORE</creatorcontrib><creatorcontrib>JABER MUHAMMED</creatorcontrib><creatorcontrib>HASS JON</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>WEBB THEODORE</au><au>JABER MUHAMMED</au><au>HASS JON</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Single command functionality for providing data security and preventing data access within a decommissioned information handling system</title><date>2015-01-20</date><risdate>2015</risdate><abstract>A computer-implemented method comprises a service processor: establishing a kill switch encryption key (KSEK) to provide data security for data within storage devices of configurable components within a system; automatically encrypting, with the KSEK, data that is written to one of the storage devices; configuring the configurable components to prevent access to the stored data unless a valid copy of the KSEK is received from the service processor along with the request for the data; automatically decrypting, with the KSEK, the KSEK-encrypted data that is read from storage device; and in response to receiving a verified request to decommission the system, performing the decommissioning by deleting/erasing the KSEK from a secure storage at which the only instance of the KSEK is maintained. Deletion of the KSEK results in a permanent loss of access to the stored encrypted data within the system because the stored encrypted data cannot be decrypted without the KSEK.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US8938626B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Single command functionality for providing data security and preventing data access within a decommissioned information handling system
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T09%3A06%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=WEBB%20THEODORE&rft.date=2015-01-20&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS8938626B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true