| CPC G06F 21/602 (2013.01) [G06F 3/0604 (2013.01); G06F 3/0619 (2013.01); G06F 3/0622 (2013.01); G06F 3/0623 (2013.01); G06F 3/065 (2013.01); G06F 3/0659 (2013.01); G06F 3/067 (2013.01); G06F 3/0673 (2013.01); G06F 11/1453 (2013.01); G06F 11/1464 (2013.01); G06F 16/164 (2019.01); G06F 16/1748 (2019.01); G06F 16/1824 (2019.01); G06F 21/6218 (2013.01); H04L 9/0816 (2013.01); H04L 9/14 (2013.01); H04L 67/1097 (2013.01); G06F 21/107 (2023.08); H04L 2209/30 (2013.01)] | 20 Claims |

|
1. A method implemented by a computing device comprising a processor and a memory device, the method comprising:
identifying a second storage system that contains data that was stored on a first storage system that has become unavailable; and
retrieving, by a replacement storage system that replaces the first storage system, the data from the second storage system, wherein the data retrieved by the replacement storage system is encrypted.
|