STEALTH APPLIANCE BETWEEN A STORAGE CONTROLLER AND A DISK ARRAY
First Claim
Patent Images
1. A system, comprising:
- a storage controller on a first secured network;
a disk array on a second secured network; and
a stealth appliance coupled to the storage controller and the disk array.
3 Assignments
0 Petitions
Accused Products
Abstract
A stealth appliance may be coupled between a storage controller and a disk array. The stealth appliance may be configured to receive a request from the storage controller encrypted with a first community-of-interest (COI) key, to decrypt the request with the first COI key, to encrypt the request with a second COI key, and to transmit the encrypted request to the disk array.
-
Citations
18 Claims
-
1. A system, comprising:
-
a storage controller on a first secured network; a disk array on a second secured network; and a stealth appliance coupled to the storage controller and the disk array. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
receiving, by a stealth appliance, a request from the storage controller encrypted with a first community-of-interest (COI) key; decrypting, by the stealth appliance, the request with the first COI key; encrypting, by the stealth appliance, the request with a second COI key; and transmitting, by the stealth appliance, the encrypted request to the disk array. - View Dependent Claims (9, 10, 11, 12)
-
-
13. An apparatus, comprising:
-
a memory; a network interface; and a processor coupled to the memory and to the network interface, in which the processor is configured; to receive, through the network interface, a request from the storage controller encrypted with a first community-of-interest (COI) key; to decrypt, by the processor, the request with the first COI key; to encrypt, by the processor, the request with a second COI key; and to transmit, through the network interface, the encrypted request to the disk array. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification