System and Method of Data Encryption and Data Access of a Set of Storage Devices via a Hardware Key
First Claim
1. A method, comprising:
- a hardware key intercepting a request sent from a host to a storage device to access data stored on one of a set of storage devices, wherein the data stored on the storage device has been encrypted, the hardware key configured to be plugged into a port of the host and comprising a unit to control data access to the set of storage devices;
the hardware key interpreting the request and issuing a command to the one of the set of storage devices, to access the encrypted data; and
the hardware key providing the encryption key to decipher the encrypted data from the one of the set of storage devices.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods of storage device data encryption and data access via a hardware key are described here. One embodiment includes a hardware key to intercept a request sent from a host to a storage device to access data stored on one of a set of storage devices, wherein the data stored on the storage device has been encrypted. The hardware key is configured to be plugged into a port of the host and comprising a unit to control data access to the set of storage devices. The hardware key is to interpret the request and issue a command to the one of the set of storage devices, to access the encrypted data. The hardware key is to provide an encryption key to decipher the encrypted data from the one of the set of storage devices.
147 Citations
20 Claims
-
1. A method, comprising:
-
a hardware key intercepting a request sent from a host to a storage device to access data stored on one of a set of storage devices, wherein the data stored on the storage device has been encrypted, the hardware key configured to be plugged into a port of the host and comprising a unit to control data access to the set of storage devices; the hardware key interpreting the request and issuing a command to the one of the set of storage devices, to access the encrypted data; and the hardware key providing the encryption key to decipher the encrypted data from the one of the set of storage devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A hardware key comprising:
-
a unit to intercept a request sent from a host to a storage device to access data stored on one of a set of storage devices, wherein the data stored on the storage device has been encrypted, the hardware key configured to be plugged into a port of the host and comprising a unit to control data access to the set of storage devices; a unit to interpret the request and issue a command to the one of the set of storage devices, to access the encrypted data; and a unit to providing an encryption key to decipher the encrypted data from the one of the set of storage devices. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A machine-readable medium having stored thereon a set of instructions which when executed perform a method comprising:
-
a hardware key intercepting a request sent from a host to a storage device to access data stored on one of a set of storage devices, wherein the data stored on the storage device has been encrypted, the hardware key configured to be plugged into a port of the host and comprising a unit to control data access to the set of storage devices; the hardware key interpreting the request and issuing a command to the one of the set of storage devices, to access the encrypted data; and the hardware key providing the encryption key to decipher the encrypted data from the one of the set of storage devices. - View Dependent Claims (18, 19, 20)
-
Specification