Encryption of data in storage systems
First Claim
Patent Images
1. A method, comprising:
- receiving, from a requestor, a request to access data;
determining whether the requestor is authorized to access the data;
determining whether the data is encrypted, in response to determining that the requestor is authorized to access the data; and
requesting an encryption key from the requester, in response to determining that the data is not encrypted.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are a method, system and article of manufacture, wherein a request to access data is received from a requestor. A determination is made as to whether the requestor is authorized to access the data. In response to determining that the requestor is authorized to access the data, a determination is made as to whether the data is encrypted. An encryption key is requested from the requester, in response to determining that the data is not encrypted.
46 Citations
30 Claims
-
1. A method, comprising:
-
receiving, from a requestor, a request to access data;
determining whether the requestor is authorized to access the data;
determining whether the data is encrypted, in response to determining that the requestor is authorized to access the data; and
requesting an encryption key from the requester, in response to determining that the data is not encrypted. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system, comprising:
-
memory; and
processor coupled to the memory, wherein the processor executes;
receiving, from a requestor, a request to access data;
determining whether the requestor is authorized to access the data;
determining whether the data is encrypted, in response to determining that the requestor is authorized to access the data; and
requesting an encryption key from the requestor, in response to determining that the data is not encrypted. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system, comprising:
-
a host; and
a storage subsystem, wherein the storage subsystem receives from the host a request to access data, wherein the storage subsystem determines whether the host is authorized to access the data, wherein the storage subsystem determines whether the data is encrypted, in response to determining that the host is authorized to access the data, and wherein the storage subsystem requests an encryption key, in response to determining that the data is not encrypted. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An article of manufacture, wherein the article of manufacture includes code that when executed on a machine performs operations, the operations comprising:
-
receiving, from a requester, a request to access data;
determining whether the requester is authorized to access the data;
determining whether the data is encrypted, in response to determining that the requestor is authorized to access the data; and
requesting an encryption key from the requester, in response to determining that the data is not encrypted. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A method for deploying computer infrastructure, comprising integrating computer-readable code into a controller, wherein the code in combination with the controller is capable of performing:
-
receiving, from a requester, a request to access data;
determining whether the requestor is authorized to access the data;
determining whether the data is encrypted, in response to determining that the requester is authorized to access the data; and
requesting an encryption key from the requestor, in response to determining that the data is not encrypted. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A system, comprising:
-
means for receiving, from a requester, a request to access data;
means for determining whether the requestor is authorized to access the data;
means for determining whether the data is encrypted, in response to determining that the requester is authorized to access the data; and
means for requesting an encryption key from the requester, in response to determining that the data is not encrypted. - View Dependent Claims (27, 28, 29, 30)
-
Specification