发明名称 Methods and systems for deleting requested information
摘要 A method of deleting log records may include identifying a plurality of log records generated during a time period, for each identified log record, determining whether a delete request associated with the log record has been made, and, in response to determining that a delete request has not been received, identifying a unique identifier associated with the log record, searching a user activity table for an entry having a key table index associated with the unique identifier, where the entry is associated with a timestamp, using the key table index and the timestamp to identify a key associated with the unique identifier and the timestamp from a key table, encrypting at least a portion of the log record with the identified key to generate an encrypted value, and storing the encrypted value as an entry in the log record database that is associated with the identified log record.
申请公布号 US9189641(B2) 申请公布日期 2015.11.17
申请号 US201414173931 申请日期 2014.02.06
申请人 Google Inc. 发明人 Syben Joanne
分类号 G06F21/00;G06F21/62 主分类号 G06F21/00
代理机构 Fox Rothschild LLP 代理人 Fox Rothschild LLP
主权项 1. A method of deleting log records, the method comprising: identifying, by a computing device from a log record database, a plurality of log records generated during a time period, wherein each log record corresponds to a user activity; for each identified log record: determining, by the computing device, whether a delete request associated with the log record has been made, andin response to determining that a delete request has not been received: identifying a unique identifier associated with the log record,searching a user activity table for an entry having a key table index associated with the unique identifier, wherein the entry is associated with a timestamp,using the key table index and the timestamp to identify a key associated with the unique identifier and the timestamp from a key table,encrypting, by the computing device, at least a portion of the log record with the identified key to generate an encrypted value, andstoring the encrypted value as an entry in the log record database that is associated with the identified log record; receiving a second delete request, wherein the second delete request indicates that one of the log records from the plurality of log records is to be deleted; identifying the unique identifier and the timestamp associated with the log record; searching the user activity table for the key table index associated with the unique identifier of the log record to be deleted; using the key table index to identify an entry in the key table that corresponds to the timestamp of the log record; and deleting a key associated with the identified entry from the key table.
地址 Mountain View CA US