NAMESPACE ENCRYPTION IN NON-VOLATILE MEMORY DEVICES
First Claim
1. A computer storage device, comprising:
- a host interface;
a controller;
non-volatile storage media; and
firmware containing instructions which, when executed by the controller, instruct the controller to at least;
limit a crypto key to be used in data access requests made in a first namespace allocated on the non-volatile storage media of the computer storage device;
store data in the first namespace in an encrypted form corresponding to the crypto key;
free a portion of the non-volatile storage media from the first namespace, the portion storing the data; and
make the portion of the non-volatile storage media available in a second namespace without erasing the data stored in the portion of the non-volatile storage media.
6 Assignments
0 Petitions
Accused Products
Abstract
A computer storage device having a host interface, a controller, non-volatile storage media, and firmware. The firmware instructs the controller to: limit a crypto key to be used in data access requests made in a first namespace allocated on the non-volatile storage media of the computer storage device; store data in the first namespace in an encrypted form that is to be decrypted using the crypto key; free a portion of the non-volatile storage media from the first namespace, the portion storing the data; and make the portion of the non-volatile storage media available in a second namespace without erasing the data stored in the portion of the non-volatile storage media.
-
Citations
20 Claims
-
1. A computer storage device, comprising:
-
a host interface; a controller; non-volatile storage media; and firmware containing instructions which, when executed by the controller, instruct the controller to at least; limit a crypto key to be used in data access requests made in a first namespace allocated on the non-volatile storage media of the computer storage device; store data in the first namespace in an encrypted form corresponding to the crypto key; free a portion of the non-volatile storage media from the first namespace, the portion storing the data; and make the portion of the non-volatile storage media available in a second namespace without erasing the data stored in the portion of the non-volatile storage media. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method implemented in a computer storage device, the method comprising:
-
limiting a crypto key to be used in data access requests made in a first namespace allocated on a non-volatile storage media of the computer storage device; storing data in the first namespace in an encrypted form corresponding to the crypto key; freeing a portion of the non-volatile storage media from the first namespace, the portion storing the data; and making the portion of the non-volatile storage media available in a second namespace without erasing the data stored in the portion of the non-volatile storage media. - View Dependent Claims (19)
-
-
20. A non-transitory computer storage medium storing instructions which, when executed by a controller of a computer storage device, cause the controller to perform a method, the method comprising:
-
limiting a crypto key to be used in data access requests made in a first namespace allocated on a non-volatile storage media of the computer storage device; storing data in the first namespace in an encrypted form corresponding to the crypto key; freeing a portion of the non-volatile storage media from the first namespace, the portion storing the data; and making the portion of the non-volatile storage media available in a second namespace without erasing the data stored in the portion of the non-volatile storage media.
-
Specification