Utilizing an address-independent, non-repeating encryption key to encrypt data
First Claim
Patent Images
1. A method of utilizing an address-independent, non-repeating encryption key to encrypt data, the method comprising:
- receiving a request to write data to a storage device in a storage array;
selecting a location where the data will be stored, wherein the selected location is unique relative to every other location identifier previously utilized by the storage device, wherein the selected location identifier cannot be reutilized to service another request to write data to the storage device, and wherein multiple location identifiers map to the same physical location within the storage device during the lifetime of the storage device;
utilizing the location identifier to encrypt the data; and
writing the encrypted data to the storage device at the selected location, including utilizing the encryption key.
1 Assignment
0 Petitions
Accused Products
Abstract
Utilizing a non-repeating identifier to encrypt data, including: receiving a request to write data to a storage device; selecting a segment-offset pair where the data will be stored, where the selected segment-offset pair is unique to every other segment-offset pair utilized during the lifetime of the storage device; and encrypting the data in dependence upon an identifier of the segment-offset pair.
142 Citations
17 Claims
-
1. A method of utilizing an address-independent, non-repeating encryption key to encrypt data, the method comprising:
-
receiving a request to write data to a storage device in a storage array; selecting a location where the data will be stored, wherein the selected location is unique relative to every other location identifier previously utilized by the storage device, wherein the selected location identifier cannot be reutilized to service another request to write data to the storage device, and wherein multiple location identifiers map to the same physical location within the storage device during the lifetime of the storage device; utilizing the location identifier to encrypt the data; and writing the encrypted data to the storage device at the selected location, including utilizing the encryption key. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus for utilizing an address-independent, non-repeating encryption key to encrypt data, the apparatus comprising a computer processor, a computer memory operatively coupled to the computer processor, the computer memory having disposed within it computer program instructions that, when executed by the computer processor, cause the apparatus to carry out the steps of:
-
receiving a request to write data to a storage device in a storage array; selecting a location where the data will be stored, wherein the selected location is unique relative to every other location identifier previously utilized by the storage device, wherein the selected location identifier cannot be reutilized to service another request to write data to the storage device, and wherein multiple location identifiers map to the same physical location within the storage device during the lifetime of the storage device; utilizing the location identifier to encrypt the data; and writing the encrypted data to the storage device at the selected location, including utilizing the encryption key. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product for utilizing an address-independent, non-repeating encryption key to encrypt data, the computer program product disposed upon a computer readable medium, wherein the computer readable medium is not a signal;
- the computer program product comprising computer program instructions that, when executed, cause a computer to carry out the steps of;
receiving a request to write data to a storage device in a storage array; selecting a location where the data will be stored, wherein the selected location is unique relative to every other location identifier previously utilized by the storage device, wherein the selected location identifier cannot be reutilized to service another request to write data to the storage device, and wherein multiple location identifiers map to the same physical location within the storage device during the lifetime of the storage device; utilizing the location identifier to encrypt the data; and writing the encrypted data to the storage device at the selected location, including utilizing the encryption key. - View Dependent Claims (14, 15, 16, 17)
- the computer program product comprising computer program instructions that, when executed, cause a computer to carry out the steps of;
Specification