Cryptographic method certifies retention lock status with embedded log
Summary
The USPTO has granted patent US12585547B2 for a cryptographic method to certify the retention lock status of backup files. The patent, assigned to Dell Products L.P., details a system for encrypting retention lock status and maintaining an auditable verification log.
What changed
The United States Patent and Trademark Office (USPTO) has granted patent US12585547B2, titled 'Cryptographic method certifies retention lock status with embedded log'. This patent, assigned to Dell Products L.P., introduces a novel method for certifying the retention lock (RL) status of backup files stored in a storage target. The system involves obtaining the RL status, encrypting it to create a certified RL status, and maintaining an auditable verification log by appending timestamps to tokens. This log is made available to auditors for reviewing the certified RL status of locked files.
This patent establishes a new technical standard for data backup systems, particularly concerning data immutability and auditability. Companies involved in data storage, backup solutions, and cybersecurity will need to assess how this patent impacts their existing or planned technologies. While this is a patent grant and not a direct regulatory mandate, it represents intellectual property that could influence future product development and potentially lead to licensing requirements or design considerations for entities operating in this space.
Archived snapshot
Mar 27, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Cryptographic method to certify retention lock status with an embedded verification log in a backup system
Grant US12585547B2 Kind: B2 Mar 24, 2026
Assignee
Dell Products L.P.
Inventors
Salil Dangi, Nitin Madan
Abstract
The retention lock (RL) status for a backup file stored in a storage target is certified by obtaining the RL status and encrypting it using an encryption key process to create a certified RL status. Verification logs are kept by appending the time of certification to a new token that can be audited. Each time a certification is attempted, a log corresponding to the latest attempt and the latest timestamp is added to the end of the verification list. This verification log may be implemented through a verification timestamp is appended to the token, or a verification log that is its own token. The verification log is maintained in a backup system and made available to an auditor for review of the certified RL status of the locked files.
CPC Classifications
G06F 11/1458 G06F 16/125 G06F 2201/84 H04L 9/3213 H04L 9/3268
Filing Date
2024-01-31
Application No.
18429388
Claims
20
Related changes
Get daily alerts for USPTO Patent Grants - Networking (H04L)
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from USPTO.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when USPTO Patent Grants - Networking (H04L) publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.