REMOTE STORAGE ENCRYPTION SYSTEM
First Claim
1. A method, comprising:
- mapping at least one access credential to at least one encryption key;
receiving a request for the encryption key from a remote requestor;
accepting the access credential with the request;
validating the access credential against a previously stored version thereof;
retrieving the encryption key associated with the access credential based on the mapping; and
sending the key to the remote requester.
0 Assignments
0 Petitions
Accused Products
Abstract
An exemplary remote storage encryption system includes a data storage unit and a key server having a key management module configured to communicate with a client device. The key management module stores at least one key access map that maps at least one access credential to at least one encryption key to determine which encryption key to provide to the client device. An exemplary method includes mapping the at least one access credential to the at least one encryption key, receiving a request for the encryption key from a remote requestor, accepting the access credential with the request, validating the access credential against a previously stored version thereof, retrieving the encryption key associated with the access credential based on the mapping, and sending the key to the remote requester.
150 Citations
23 Claims
-
1. A method, comprising:
-
mapping at least one access credential to at least one encryption key; receiving a request for the encryption key from a remote requestor; accepting the access credential with the request; validating the access credential against a previously stored version thereof; retrieving the encryption key associated with the access credential based on the mapping; and sending the key to the remote requester. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
a data storage unit; and a key server in communication with said data storage unit, said key server including a key management module configured to communicate with a client device; wherein said key management module stores at least one key access map that maps at least one access credential to at least one encryption key to determine which of said at least one encryption keys to provide to the client device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system comprising:
-
a data storage unit having a unique identifier, said data storage unit being selectively attachable to a client device; and a key server in communication with said data storage unit, said key server including a key management module configured to communicate with the client device, said key management module storing at least one key access map that maps at least one access credential to at least one encryption key to determine which of said at least one encryption keys to provide to the client device and said key management module being configured to provide the at least one access credential with a key request received from the client device, wherein said data storage unit is configured to provide at least a portion of the at least one access credential to said key management module.
-
Specification