PROTECTING DATA IN A STORAGE DEVICE
First Claim
Patent Images
1. In a storage device, a method of protecting data stored on the storage device, the method comprising:
- accessing a first data encryption key stored in storage media on the storage device; and
generating a second data encryption key that is used to encrypt and decrypt data stored in the storage media on the storage device using;
the first data encryption key, a first key encryption key obtained from first information received from a host system that is communicatively coupled to the storage device, and second information that is received from a source other than the host system and that is communicatively coupled to the storage device.
3 Assignments
0 Petitions
Accused Products
Abstract
A first data encryption key is stored on a storage device. The first data encryption key, a first key encryption key obtained from first information received from a host system, and second information that is received from a source other than the host system are used to generate a second data encryption key that can be used to encrypt and decrypt data stored on the storage device. The second information may be sent from the source to the storage device only if a condition is satisfied.
-
Citations
20 Claims
-
1. In a storage device, a method of protecting data stored on the storage device, the method comprising:
-
accessing a first data encryption key stored in storage media on the storage device; and generating a second data encryption key that is used to encrypt and decrypt data stored in the storage media on the storage device using;
the first data encryption key, a first key encryption key obtained from first information received from a host system that is communicatively coupled to the storage device, and second information that is received from a source other than the host system and that is communicatively coupled to the storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
a host comprising; a processor; and memory coupled to the processor; and a storage device coupled to the host; the storage device configured to access a first data encryption key stored in the storage media and to generate an intermediary data encryption key using the first data encryption key and a first key encryption key that is obtained from first information received from the host; and the storage device further configured to generate a second data encryption key using the intermediary data encryption key and second information that is received from a source that is communicatively coupled to the storage device and that that bypasses the host when communicating with the storage device, wherein the second data encryption key is used to decrypt data stored in the storage media on the storage device. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A storage device, comprising:
-
a first module; a second module coupled to the first module; and storage media coupled to the first module; the first module operable for accessing a first data encryption key stored in the storage media and for generating an intermediary data encryption key using the first data encryption key and a first key encryption key that is obtained from first information received from a host system that is communicatively coupled to the storage device; and the second module operable for generating a second data encryption key using the intermediary data encryption key and second information that is received from a source that is communicatively coupled to the storage device and that bypasses the host system when communicating with the storage device, wherein the second data encryption key is used to decrypt data stored in the storage media on the storage device. - View Dependent Claims (17, 18, 19, 20)
-
Specification