System and Method for General Purpose Encryption of Data
First Claim
1. An information handling system, comprising:
- a processor;
a memory communicatively coupled to the processor; and
an encryption accelerator communicatively coupled to the processor, the encryption accelerator configured to;
encrypt and decrypt information in accordance with a plurality of cryptographic functions;
receive a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation; and
in response to receiving the command, encrypt or decrypt the data associated with the input/output operation based on a particular one of the plurality of cryptographic functions.
14 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and an encryption accelerator communicatively coupled to the processor. The encryption accelerator may be configured to encrypt and decrypt information in accordance with a plurality of cryptographic functions, receive a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation, and in response to receiving the command, encrypt or decrypt the data associated with the input/output operation based on a particular one of the plurality of cryptographic functions.
-
Citations
20 Claims
-
1. An information handling system, comprising:
-
a processor; a memory communicatively coupled to the processor; and an encryption accelerator communicatively coupled to the processor, the encryption accelerator configured to; encrypt and decrypt information in accordance with a plurality of cryptographic functions; receive a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation; and in response to receiving the command, encrypt or decrypt the data associated with the input/output operation based on a particular one of the plurality of cryptographic functions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for encryption and decryption of data, comprising:
-
receiving a command by an encryption accelerator to perform an encryption or decryption task upon data associated with an input/output operation, the command designating a particular one of a plurality of cryptographic functions stored on the encryption accelerator; and in response to receiving the command, encrypting or decrypting the data associated with the input/output operation based on the particular one of the plurality of cryptographic functions. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. An encryption accelerator, comprising:
-
logic for encrypting and decrypting information in accordance with a plurality of cryptographic functions; logic for receiving a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation; and logic for encrypting or decrypting the data associated with the input/output operation based on a particular one of the plurality of cryptographic functions in response to receiving the command. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification