CLONING STORAGE DEVICES THROUGH SECURE COMMUNICATIONS LINKS
First Claim
Patent Images
1. A method, comprising:
- establishing a secure communications link between a first storage device and a second storage device;
generating a data stream of data stored on the first storage device;
splitting the data stream cryptographically; and
transmitting the cryptographically split data.
4 Assignments
0 Petitions
Accused Products
Abstract
New storage devices located remote to old storage devices may be cloned through a secure data communications link established with a secure boot device located in the storage device. The secure communications link cryptographically splits data and encrypts the data for transmission over unsecure public network through the secure communications link. The cloning process may be completed between the new storage device and the old storage device with little or no involvement from other devices.
-
Citations
20 Claims
-
1. A method, comprising:
-
establishing a secure communications link between a first storage device and a second storage device; generating a data stream of data stored on the first storage device; splitting the data stream cryptographically; and transmitting the cryptographically split data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product, comprising:
a non-transitory computer readable medium comprising; code to establish a secure communications link between a first storage device and a second storage device; code to generate a data stream of data stored on the first storage device; code to split the data stream cryptographically; and code to transmit the cryptographically split data. - View Dependent Claims (9, 10, 11, 12, 13)
-
14. An apparatus, comprising:
-
a processor; a memory connected to the processor; a secure boot device connected to the processor; and a network adapter connected to the processor, in which the processor is configured; to establish a secure communications link between a first storage device and a second storage device with the secure boot device; to generate a data stream of data stored on the first storage device; to split the data stream cryptographically; and to transmit the cryptographically split data through the network adapter. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification