Managing Distribution And Retrieval Of Security Key Fragments Among Proxy Storage Devices

Abstract

A method performed by a processor of a computer, includes obtaining a security key associated with data, dividing the security key into key fragments, and distributing different ones of the key fragments to different proxy storage devices. Key fragments are received from the proxy storage devices, a reconstructed security key is generated based on the key fragments received from the proxy storage devices, and programmatic access to the data is controlled based on the reconstructed security key. Related computer program products and systems are disclosed.


Claims
Download PDF
Document Preview
Document History
  • Publication: Aug 9, 2016
  • Application: Jan 20, 2015
    US US 201514600497 A
  • Priority: Jan 20, 2015
    US US 201514600497 A

Download Citation


Sign in to the Lens

Feedback