CPC G06F 12/1408 (2013.01) [G06F 3/061 (2013.01); G06F 3/0623 (2013.01); G06F 3/0656 (2013.01); G06F 3/0688 (2013.01); G06F 3/0689 (2013.01); G06F 21/6218 (2013.01); G06F 21/80 (2013.01); H04L 9/088 (2013.01); H04L 9/0891 (2013.01); H04L 9/0894 (2013.01); H04L 63/061 (2013.01); H04L 63/068 (2013.01); G06F 2221/2107 (2013.01); H04L 67/1097 (2013.01); H04L 2463/062 (2013.01)] | 17 Claims |
1. A method comprising:
determining that data stored in a first location of a storage device is encrypted with a data encryption key that has been decommissioned, wherein the data is associated with a user-visible identifier; and
storing the data re-encrypted with the current data encryption key to a second location of the storage device that is different from the first location, wherein the data is associated with the user-visible identifier when stored at the second location.
|