×

Keys for encrypted disk partitions

  • US 10,389,693 B2
  • Filed: 08/23/2016
  • Issued: 08/20/2019
  • Est. Priority Date: 08/23/2016
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory machine-readable storage medium comprising instructions executable by a processing resource, the instructions comprising:

  • instructions to receive a key request from a requestor, wherein the key request is for a key to an encrypted disk partition of a protected computing device and comprises a unique identifier associated with the encrypted disk partition, and wherein the key request is one of a plurality of key requests received from the requestor;

    instructions to determine a validity of the key request, wherein the determination of the validity of the key request is based on a number of previous key requests comprising the unique identifier; and

    instructions to identify a pattern of requests indicative of a normal boot-up process;

    instructions to identify a received pattern for the plurality of key requests received from the requestor;

    instructions to determine if the received pattern is the same as the pattern of requests indicative of a normal boot-up process;

    in response to determining the received pattern is different from the pattern of requests indicative of a normal boot-up process, instructions to determine the key request is invalid;

    instructions to send the key to the requestor based on the determination of the validity of the key request;

    instructions to receive a registration request from the protected computing device, the registration request including information identifying the protected computing device;

    instructions to receive the unique identifier from the protected computing device;

    instructions to receive the key from the protected computing device;

    instructions to store the unique identifier with the information identifying the protected computing device on a first database;

    instructions to store the key on a second database;

    instructions to receive a key identification number; and

    instructions to store the key identification number, unique identifier, and information identifying the protected computing device on a third database,wherein the pattern of requests indicative of a normal boot-up process comprises a non-linear pattern of requests.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×