ADDING OR REPLACING DISKS WITH RE-KEY PROCESSING
First Claim
1. A method, comprising:
- receiving a command, at a first storage device, to clone a second storage device;
copying data from the second storage device to the first storage device;
re-keying the first storage device with an encryption key matching an encryption key of the second storage device; and
establishing, by the first storage service, secure communications with the encryption key.
9 Assignments
0 Petitions
Accused Products
Abstract
In a network of multiple storage devices, a storage device may become faulty and need to be replaced or additional capacity may need to be added through additional storage devices. When the storage devices communicate through a secure communications link using an encryption key for cryptographically splitting data, replacement or new storage devices may be re-keyed using an encryption key from an existing or prior storage device on the secure data network. After the storage device is re-keyed, the new or replacement storage device may continue to function on the secure data network without requiring changes to clients accessing the secure data network.
24 Citations
20 Claims
-
1. A method, comprising:
-
receiving a command, at a first storage device, to clone a second storage device; copying data from the second storage device to the first storage device; re-keying the first storage device with an encryption key matching an encryption key of the second storage device; and establishing, by the first storage service, secure communications with the encryption key. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product, comprising:
a non-transitory computer readable medium comprising; code to receive a command, at a first storage device, to clone a second storage device; code to copy data from the second storage device to the first storage device; code to re-key the first storage device with an encryption key matching an encryption key of the second storage device; and code to establish, by the first storage service, secure communications with the encryption key. - View Dependent Claims (8, 9, 10, 11, 12)
-
13. An apparatus, comprising:
-
a processor; a memory connected to the processor; a secure boot device connected to the processor; and a network adapter connected to the processor, in which the processor is configured; to receive a command, through the network adapter, to clone a second storage device; to copy data from the second storage device to the memory; to re-key the secure boot device with an encryption key matching an encryption key of the second storage device; and to establish, through the network adapter, secure communications with the encryption key. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification