EFFICIENT REKEY IN A TRANSPARENT DECRYPTING STORAGE ARRAY
First Claim
Patent Images
1. A method, comprising:
- receiving an instruction to rekey data on a storage array, wherein the instruction identifies first encryption information and second encryption information;
decrypting, by a processing device of a storage array controller, the data using the first encryption information to generate decrypted data; and
encrypting the decrypted data using the second encryption information to generate encrypted data.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of efficient rekey in a transparent decrypting storage array includes receiving an instruction to rekey data on a storage array, wherein the instruction identifies first encryption information and second encryption information. The method further includes decrypting, by a processing device of a storage array controller, the data using the first encryption information to generate decrypted data. The method further includes encrypting the decrypted data using the second encryption information to generate encrypted data.
22 Citations
20 Claims
-
1. A method, comprising:
-
receiving an instruction to rekey data on a storage array, wherein the instruction identifies first encryption information and second encryption information; decrypting, by a processing device of a storage array controller, the data using the first encryption information to generate decrypted data; and encrypting the decrypted data using the second encryption information to generate encrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A storage system comprising:
-
a storage array comprising one or more storage devices; and a storage array controller coupled to the storage array, the storage array controller to; receive an instruction to rekey data on the storage array, wherein the instruction identifies first encryption information and second encryption information; decrypt the data using the first encryption information to generate decrypted data; and encrypt the decrypted data using the second encryption information to generate encrypted data. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A storage system comprising:
-
a storage array comprising one or more storage devices; and a storage array controller coupled to the storage array, the storage array controller to; receive an instruction to rekey data on the storage array to correspond to desired encryption information; determine that the data on the storage array was decrypted using correct encryption information; and based on the determining, modify metadata associated with the data on the storage array to correspond to the desired encryption information. - View Dependent Claims (20)
-
Specification