Keys for encrypted disk partitions
First Claim
Patent Images
1. A non-transitory machine-readable storage medium comprising instructions executable by a processing resource, the instructions comprising:
- instructions to receive a key request from a requestor, wherein the key request is for a key to an encrypted disk partition of a protected computing device and comprises a unique identifier associated with the encrypted disk partition, and wherein the key request is one of a plurality of key requests received from the requestor;
instructions to determine a validity of the key request, wherein the determination of the validity of the key request is based on a number of previous key requests comprising the unique identifier; and
instructions to identify a pattern of requests indicative of a normal boot-up process;
instructions to identify a received pattern for the plurality of key requests received from the requestor;
instructions to determine if the received pattern is the same as the pattern of requests indicative of a normal boot-up process;
in response to determining the received pattern is different from the pattern of requests indicative of a normal boot-up process, instructions to determine the key request is invalid;
instructions to send the key to the requestor based on the determination of the validity of the key request;
instructions to receive a registration request from the protected computing device, the registration request including information identifying the protected computing device;
instructions to receive the unique identifier from the protected computing device;
instructions to receive the key from the protected computing device;
instructions to store the unique identifier with the information identifying the protected computing device on a first database;
instructions to store the key on a second database;
instructions to receive a key identification number; and
instructions to store the key identification number, unique identifier, and information identifying the protected computing device on a third database,wherein the pattern of requests indicative of a normal boot-up process comprises a non-linear pattern of requests.
1 Assignment
0 Petitions
Accused Products
Abstract
Examples described herein include receiving a key request from a requestor, determining a validity of the key request, and sending the key to the requestor based on the determination of the validity of the key request. In some examples, the key request is for a key to an encrypted disk partition of a protected computing device and comprises a unique identifier associated with the encrypted disk partition.
58 Citations
15 Claims
-
1. A non-transitory machine-readable storage medium comprising instructions executable by a processing resource, the instructions comprising:
-
instructions to receive a key request from a requestor, wherein the key request is for a key to an encrypted disk partition of a protected computing device and comprises a unique identifier associated with the encrypted disk partition, and wherein the key request is one of a plurality of key requests received from the requestor; instructions to determine a validity of the key request, wherein the determination of the validity of the key request is based on a number of previous key requests comprising the unique identifier; and instructions to identify a pattern of requests indicative of a normal boot-up process; instructions to identify a received pattern for the plurality of key requests received from the requestor; instructions to determine if the received pattern is the same as the pattern of requests indicative of a normal boot-up process; in response to determining the received pattern is different from the pattern of requests indicative of a normal boot-up process, instructions to determine the key request is invalid; instructions to send the key to the requestor based on the determination of the validity of the key request; instructions to receive a registration request from the protected computing device, the registration request including information identifying the protected computing device; instructions to receive the unique identifier from the protected computing device; instructions to receive the key from the protected computing device; instructions to store the unique identifier with the information identifying the protected computing device on a first database; instructions to store the key on a second database; instructions to receive a key identification number; and instructions to store the key identification number, unique identifier, and information identifying the protected computing device on a third database, wherein the pattern of requests indicative of a normal boot-up process comprises a non-linear pattern of requests. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computing device, comprising:
-
a registration engine to receive a registration request from a protected computing device and to receive a key for an encrypted disk partition of the protected computing device and a unique identifier associated with the encrypted disk partition, wherein the registration request comprises information identifying the protected computing device; a request engine to receive a plurality of key requests comprise a key request from a requestor, the key request comprising the unique identifier and information identifying the requestor; a validation engine to determine validity of the key request and to send the key based on the determination of the validity of the key request, wherein the determination of the validity of the key request is based on a number of previous key requests comprising the unique identifier; and a memory comprising a first database, a second database, and a third database; wherein the validation engine is configured to determine validity of key requests by; identifying a pattern of requests indicative of a normal boot-up process, wherein the pattern of requests indicative of a normal boot-up process comprises a non-linear pattern of requests; identifying a received pattern for the plurality of key requests received from the requestor; determining if the received pattern is the same as the pattern of requests indicative of a normal boot-up process; in response to determining the received pattern is different from the pattern of requests indicative of a normal boot-up process, determining the key request is invalid; and in response to determining the received pattern is the same as the pattern of requests indicative of a normal boot up process, sending the key to the requestor; wherein the registration engine is configured to store the key, the information identifying the protected computing device, and the unique identifier by; storing the unique identifier with the information identifying the protected computing device on the first database; instructions to store the key on the second database; instructions to receive a key identification number; and instructions to store the key identification number, unique identifier, and information identifying the protected computing device on the third database. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
Specification