Management of encrypted storage networks
First Claim
Patent Images
1. A storage system comprising:
- at least one port in the storage system for being connected via a communications link to at least one port in an external device, the communications link being capable of transferring authenticated communications;
a storage controller coupled to receive data via the at least one port in the storage system;
a plurality of storage media coupled to the storage controller, the storage media being capable of storing encrypted data using an encryption technique;
a management program operating on a computer coupled to the storage controller and to the at least one port of the storage system, the management program operating to determine whether the communications link is authenticated and to determine whether an encryption technique was used in the storage media, and to maintain a record of such determinations; and
a display for displaying the record to a user of the storage system.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and technique for managing security in storage networks is provided. A management server searches the storage system and compiles information about security in the system, including authentication requirements for communications among ports and encryption states of various storage devices. The resulting information is enabled to be displayed to a system administrator enabling a better understanding of the system, and easier provisioning of added storage volumes in the system.
-
Citations
14 Claims
-
1. A storage system comprising:
-
at least one port in the storage system for being connected via a communications link to at least one port in an external device, the communications link being capable of transferring authenticated communications;
a storage controller coupled to receive data via the at least one port in the storage system;
a plurality of storage media coupled to the storage controller, the storage media being capable of storing encrypted data using an encryption technique;
a management program operating on a computer coupled to the storage controller and to the at least one port of the storage system, the management program operating to determine whether the communications link is authenticated and to determine whether an encryption technique was used in the storage media, and to maintain a record of such determinations; and
a display for displaying the record to a user of the storage system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. In a storage system adapted to be coupled to at least one host computer, the storage system having a plurality of communication ports, a plurality of storage media, and being coupled to a management computer in which a management program is executed to implement a method, the method comprising:
-
compiling a list of devices within and coupled to the storage system is prepared, the devices having ports;
for each device, collecting information about the ports of the device;
collecting information about the storage media;
collecting information about the at least one host;
preparing a record of any authentication state for each port; and
preparing a record of any encryption state for each storage media. - View Dependent Claims (10, 11, 12, 13, 14)
-
Specification