MANAGING SELF-ENCRYPTING DRIVES IN DECENTRALIZED ENVIRONMENTS
First Claim
Patent Images
1. A computer system comprising:
- one or more processors, wherein the processors process computer program instructions;
a self-encrypting drive;
wherein the computer program instructions, when processed, manage access to the self encrypting drive, wherein a provisioned drive includes one or more locking ranges and a global range and;
an authority object for each locking range that stores authentication information for the locking range, anda locking range object for each locking range that stores state information for the locking range.
2 Assignments
0 Petitions
Accused Products
Abstract
A self-encrypting drive allows finely grained control, i.e., the ability to create, protect, lock and unlock, of different volumes on the same drive. The different volumes enable multiple different operating systems to be booted, depending on the volume that is selected for booting.
53 Citations
20 Claims
-
1. A computer system comprising:
-
one or more processors, wherein the processors process computer program instructions; a self-encrypting drive; wherein the computer program instructions, when processed, manage access to the self encrypting drive, wherein a provisioned drive includes one or more locking ranges and a global range and; an authority object for each locking range that stores authentication information for the locking range, and a locking range object for each locking range that stores state information for the locking range. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An article of manufacture comprising:
-
a computer storage medium; computer program instructions stored on the computer storage medium which, when processed by a processing device, instruct the processing device to perform a process for provisioning a self encrypting drive comprising; specifying one or more locking ranges and a global range; creating data structures for storing information about the specified ranges, including; an authority object for each locking range that stores authentication information for the locking range, and a locking range object for each locking range that stores state information for the locking range. - View Dependent Claims (20)
-
Specification