×

Encryption/decryption management method in computer system having storage hierarchy

  • US 7,716,496 B2
  • Filed: 11/16/2004
  • Issued: 05/11/2010
  • Est. Priority Date: 09/21/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. An encryption/decryption management method of a computer system, the computer system having:

  • one or more computers;

    a data storage system including a first data storage apparatus, and a second data storage apparatus provided in a path between said one or more computers and said first data storage apparatus;

    a management computer connected to the first data storage apparatus and the second data storage apparatus, a first encryption/decryption section provided with said first data storage apparatus, and a second encryption/decryption section provided with said second data storage apparatus, the first encryption/decryption section and the second encryption/decryption section having an encryption/decryption algorithm for both encrypting data to be stored in said data storage system and decrypting encrypted data from said data storage system, the encryption/decryption management method comprising;

    said second data storage apparatus providing a data storage area of said first data storage apparatus as an area to be accessed by the computer as if the area of the first data storage apparatus is a data storage area of the second data storage apparatus,acquiring a first information which indicates a type of encryption algorithm used for encrypting data stored in data storage area which the first data storage apparatus has;

    acquiring a second information which indicates an encryption algorithm supported by the second encryption/decryption section which the second data storage apparatus has;

    determining, based on the first information and the second information, whether or not the second encryption/decryption section supports the encryption algorithm used for encrypting data stored in the data storage area which the first data storage apparatus has; and

    if it is determined that the second encryption/decryption section supports the encryption algorithm,setting the first encryption/decryption section not to encrypt write data and not to decrypt read data, andsetting the second encryption/decryption section to encrypt write data and to decrypt read data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×