Recovery of encrypted data from a secure storage device
First Claim
Patent Images
1. An encrypted data recovery software product to recover the encrypted data from a target secure storage device, the software product comprising:
- software operational when executed by a processor to receive a recovery request to recover the encrypted data;
send a transfer command to the target secure storage device;
receive an authorization request from the target secure storage device in response to the transfer command;
respond to the authorization request; and
receive the encrypted data from the target secure storage device.
3 Assignments
0 Petitions
Accused Products
Abstract
An exemplary software product to recover encrypted data from a target secure storage device can comprise software operational when executed by a processor to receive a recovery request to recovery the encrypted data, send a transfer command to the target secure storage device, receive an authorization request from the target secure storage device in response to the transfer command, respond to the authorization request, and receive the encrypted data from the target secure storage device.
-
Citations
35 Claims
-
1. An encrypted data recovery software product to recover the encrypted data from a target secure storage device, the software product comprising:
software operational when executed by a processor to receive a recovery request to recover the encrypted data;
send a transfer command to the target secure storage device;
receive an authorization request from the target secure storage device in response to the transfer command;
respond to the authorization request; and
receive the encrypted data from the target secure storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 19, 23)
-
17. A method to recover encrypted data from a target secure storage device, the method comprising:
-
receiving a recovery request to recover the encrypted data;
sending a transfer command to the target secure storage device;
receiving an authorization request from the target secure storage device in response to the transfer command;
responding to the authorization request; and
receiving the encrypted data from the target secure storage device. - View Dependent Claims (18, 20, 21, 22, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A system to recover encrypted data from a target secure storage device, the system comprising:
-
an interface configured to couple with the target secure storage device; and
a processor configured to receive a recovery request to recover the encrypted data;
send a transfer command to the target secure storage device;
receive an authorization request from the target secure storage device in response to the transfer command;
respond to the authorization request; and
receive the encrypted data from the target secure storage device. - View Dependent Claims (34, 35)
-
Specification