Invention Application
WO2009056570A1 METHOD AND APPARATUS FOR RESTORING ENCRYPTED FILES TO AN ENCRYPTING FILE SYSTEM BASED ON DEPRECATED KEYSTORES
审中-公开
将加密文件恢复到基于删除键盘的加密文件系统的方法和装置
- Patent Title: METHOD AND APPARATUS FOR RESTORING ENCRYPTED FILES TO AN ENCRYPTING FILE SYSTEM BASED ON DEPRECATED KEYSTORES
- Patent Title (中): 将加密文件恢复到基于删除键盘的加密文件系统的方法和装置
-
Application No.: PCT/EP2008/064682Application Date: 2008-10-29
-
Publication No.: WO2009056570A1Publication Date: 2009-05-07
- Inventor: GARIMELLA, Neeta , KOJENOV, Alexei , MULLEN, Shawn , SHANKAR, Ravi , VIKSNE, John
- Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION , IBM UNITED KINGDOM LIMITED , GARIMELLA, Neeta , KOJENOV, Alexei , MULLEN, Shawn , SHANKAR, Ravi , VIKSNE, John
- Applicant Address: New Orchard Road Armonk, New York 10504 US
- Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION,IBM UNITED KINGDOM LIMITED,GARIMELLA, Neeta,KOJENOV, Alexei,MULLEN, Shawn,SHANKAR, Ravi,VIKSNE, John
- Current Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION,IBM UNITED KINGDOM LIMITED,GARIMELLA, Neeta,KOJENOV, Alexei,MULLEN, Shawn,SHANKAR, Ravi,VIKSNE, John
- Current Assignee Address: New Orchard Road Armonk, New York 10504 US
- Agency: WALDNER, Philip
- Priority: US11/929,103 20071030
- Main IPC: G06F21/00
- IPC: G06F21/00
Abstract:
The present invention provides a computer implemented method, data processing system, and computer program product to restore an encrypted file. A computer receives a command to restore an encrypted file, wherein the encrypted file was previously backed up. The computer identifies a user associated with the encrypted file. The computer looks up a first keystore of the user based on the user, the first keystore having an active private key. The computer determines that a public key of the encrypted file fails to match an active public key of the first keystore. The computer restores a second keystore of the user to form a restored private key, wherein the second keystore was previously backed up. The computer responsive to a determination that the public key of the encrypted file fails to match the active public key of the first keystore, decrypts the encrypted file encryption key based on the restored private key to form a file encryption key. The computer encrypts the file encryption key with the active private key of the first keystore.
Information query