US 12,255,991 B2
Providing secure data storage and management
Peng Hui Jiang, Beijing (CN); Xi Qing Zhang, Beijing (CN); Ming Zhe Jiang, Beijing (CN); Mu Chen, Beijing (CN); and Chun Ling Li, Beijing (CN)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by INTERNATIONAL BUSINESS MACHINES CORPORATION, Armonk, NY (US)
Filed on May 5, 2022, as Appl. No. 17/662,093.
Prior Publication US 2023/0361997 A1, Nov. 9, 2023
Int. Cl. H04L 9/08 (2006.01); H04L 9/14 (2006.01); H04L 9/32 (2006.01)
CPC H04L 9/0861 (2013.01) [H04L 9/14 (2013.01); H04L 9/3247 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A computer-implemented method (CIM) for use with a data storage system that includes stored data, the CIM comprising:
receiving a common encryption/decryption (e/d) key;
combining the common e/d key with additional information to obtain a specialized e/d key, with the additional information including at least one selected from the group consisting of a client signature and a first server signature;
encrypting a first portion of the stored data with the specialized e/d key so that the specialized e/d key and the first portion of the stored data are a one-on-one match; and
when copying the first portion of the stored data to a new location, generating a new key chain that contains the specialized e/d key and a new key with a new server signature.