System and Method of Storage Device Data Encryption and Data Access Via a Hardware Key
First Claim
1. A method comprising:
- a hardware key intercepting a request sent from a host to a storage device to access data stored on the storage device, wherein the data stored on the storage device has been encrypted using a first encryption key, the hardware key configured to be plugged into a port of the host and the hardware key comprising a controller comprising the first encryption key to decipher the encrypted data from the storage device;
the hardware key interpreting the request and issuing a command to the storage device to access the encrypted data; and
the hardware key providing the first encryption key to decipher the encrypted data from the storage device.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods of storage device data encryption and data access via a hardware key are described herein. One embodiment includes a hardware key intercepting a request sent from a host to a storage device to access data stored on the storage device, wherein the data stored on the storage device has been encrypted using a first encryption key, the hardware key configured to be plugged into a port of the host and the hardware key comprising a controller comprising the first encryption key to decipher the encrypted data from the storage device. The hardware key interpreting the request and issuing a command to the storage device to access the encrypted data. The hardware key providing the first encryption key to decipher the encrypted data from the storage device.
-
Citations
20 Claims
-
1. A method comprising:
-
a hardware key intercepting a request sent from a host to a storage device to access data stored on the storage device, wherein the data stored on the storage device has been encrypted using a first encryption key, the hardware key configured to be plugged into a port of the host and the hardware key comprising a controller comprising the first encryption key to decipher the encrypted data from the storage device; the hardware key interpreting the request and issuing a command to the storage device to access the encrypted data; and the hardware key providing the first encryption key to decipher the encrypted data from the storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A machine readable medium having stored thereon a set of instructions which when executed perform a method comprising:
-
a hardware key intercepting a request sent from a host to a storage device to access data stored on the storage device, wherein the data stored on the storage device has been encrypted using a first encryption key, the hardware key configured to be plugged into a port of the host and the hardware key comprising a controller comprising the first encryption key to decipher the encrypted data from the storage device; the hardware key interpreting the request and issuing a command to the storage device to access the encrypted data; and the hardware key providing the first encryption key to decipher the encrypted data from the storage device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a means for a hardware key intercepting a request sent from a host to a storage device to access data stored on the storage device, wherein the data stored on the storage device has been encrypted using a first encryption key, the hardware key configured to be plugged into a port of the host and the hardware key comprising a controller comprising the first encryption key to decipher the encrypted data from the storage device; a means for the hardware key interpreting the request and issuing a command to the storage device to access the encrypted data; and a means for the hardware key providing the first encryption key to decipher the encrypted data from the storage device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification