International Business Machines Corporation
CRYPTO-ERASURE OF DATA STORED IN A KEY PER IO-ENABLED DEVICE VIA INTERNAL ACTION
Last updated:
Abstract:
Device-implemented methodology for enabling and/or performing crypto-erase via internal action and/or external action in a Key per IO-enabled system. In various approaches, crypto-erasure of the data stored in a Key per IO scheme is enabled by implementing an internal key, which is combined with an external key to generate a media encryption key, which is in turn used to encrypt/decrypt data. By restricting access to the internal key, destruction of the internal key and all media encryption key(s) created using the internal key, renders the data crypto-erased, and thus unrecoverable.
Status:
Application
Type:
Utility
Filling date:
15 Dec 2020
Issue date:
16 Jun 2022