System and method for wiping encrypted data on a device having file-level content protection

作者: Tahoma Madrone Toelkes , David Rahardja , Thomas Brogan Duffy , Michael John Smith , Gordon Freedman

DOI:

关键词:

摘要: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for erasing user data stored in a file system. The method includes destroying all key bags containing encryption keys on device having system encrypted per class basis, rebuilding at least part of the associated with data, creating new default bag keys. Also disclosed is remote basis. transmitting obliteration instructions to device, which cause destroy erase rebuild create

参考文章(139)
John R. Douceur, William J. Bolosky, Marvin M. Theimer, Atul Adya, Encrypted key cache ,(2005)
Ersin Domangue, Roger Butler, Wai Tsang, Edward M Scheidt, Access system utilizing multiple factor identification and authentication ,(2003)
Ronald P. Doyle, Marcia L. Stockton, John R. Hind, Security containers for document components ,(2003)
Alan Frindell, Thomas Fountain, Network attached encryption ,(2003)
Milan Petkovic, Merchan Jorge Guajardo, Authenticating a device and a user ,(2009)
Jaybe Mark Ammons, Gary Steven Sumner, Mike Liddell, Method and system for data backup ,(2006)