Methods of operating storage systems including encrypting a key salt
First Claim
Patent Images
1. A method of operating a storage system, comprising:
- receiving a password at a device driver of the storage system from a host of the storage system, wherein the host is in communication with a removable storage device of the storage system through the device driver, and wherein the device driver is configured to enable a software program of the host to communicate to the removable storage device;
using the device driver to combine the password, a key salt, and a number of iterations to generate a primary key;
using the device driver to generate a key schedule from the primary key;
receiving an encrypted master key at the device driver from the removable storage device; and
using the device driver to decrypt the encrypted master key with the key schedule.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of operating a storage system includes using the device driver to combine a password, the key salt, and the number of iterations to generate a primary key, using the device driver to generate a key schedule from the primary key, receiving an encrypted master key at the device driver, and using the device driver to decrypt the encrypted master key with the key schedule.
-
Citations
20 Claims
-
1. A method of operating a storage system, comprising:
-
receiving a password at a device driver of the storage system from a host of the storage system, wherein the host is in communication with a removable storage device of the storage system through the device driver, and wherein the device driver is configured to enable a software program of the host to communicate to the removable storage device; using the device driver to combine the password, a key salt, and a number of iterations to generate a primary key; using the device driver to generate a key schedule from the primary key; receiving an encrypted master key at the device driver from the removable storage device; and using the device driver to decrypt the encrypted master key with the key schedule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of operating a storage system, comprising:
-
receiving a password at a device driver of the storage system from a host of the storage system, wherein the host is in communication with a removable storage device of the storage system through the device driver, and wherein the device driver is configured to enable a software program of the host to communicate to the removable storage device; using the device driver to combine the password, a key salt, and a number of iterations to generate a first primary key; using the device driver to determine whether a portion of the first primary key matches a portion of a second primary key stored in a secure storage area of the removable storage device; using the device driver to generate a key schedule from the first primary key in response to the portion of the first primary key matching the portion of the second primary key; receiving an encrypted master key at the device driver from the removable storage device; and using the device driver to decrypt the encrypted master key with the key schedule. - View Dependent Claims (16, 17)
-
-
18. A method of operating a storage system, comprising:
-
receiving an old password at a device driver of the storage system from a host of the storage system, wherein the host is in communication with a removable storage device of the storage system through the device driver, and wherein the device driver is configured to enable a software program of the host to communicate to the removable storage device; using the device driver to combine the old password, a first key salt, and a number of iterations to generate a first primary key; using the device driver to determine whether a portion of the first primary key matches a portion of a second primary key stored in a secure storage area of the storage device; using the device driver to generate a first key schedule from the first primary key in response to the portion of the first primary key matching the portion of the second primary key; receiving an encrypted master key at the device driver from the removable storage device; using the device driver to decrypt the master key with the first key schedule; receiving a new pass word at the device driver; using the device driver to combine the new password, a second key salt, and the number of iterations to generate a third primary key; using the device driver to generate a second key schedule from the third primary key; and using the device driver to encrypt the decrypted master key with the second key schedule. - View Dependent Claims (19, 20)
-
Specification