×

Key generation and retrieval using key servers

  • US 7,953,978 B2
  • Filed: 09/07/2006
  • Issued: 05/31/2011
  • Est. Priority Date: 09/07/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for key generation and retrieval, comprising:

  • storing, using a computer including a processor, unique identifiers of two or more key servers, wherein each key server generates keys for encryption of data and returns keys for decryption of data, and wherein a key request can be directed to any one of the two or more key servers;

    in response to a data storage drive processing a first write to a data storage medium,receiving, from the data storage drive, a first key request asking for an encryption key to encrypt data;

    identifying a first selection technique from a set of selection techniques for selecting one of the key servers to which the first key request is to be forwarded, wherein the set of selection techniques consists of a selection technique using an order of the IP addresses of the key servers, a selection technique based on local IP addresses and remote IP addresses, a selection technique using connection information, and a selection technique based on load balancing among the key servers;

    selecting one of the key servers using the first selection technique by iterating through the two or more key servers until identifying a first key server;

    sending, to the first key server, the first key requestin response to the first key request, receiving, from the first key server, a first response that includes an encrypted key and a protected key, wherein the protected key is decryptable by the first key server for key retrieval, and wherein the encrypted key is decrypted by the data storage drive to obtain the encryption key and used to encrypt the data; and

    in response to the data storage drive processing a read to the data storage medium,receiving, from the data storage drive, a second key request asking for a decryption key to decrypt the data;

    selecting another one of the key servers using a second selection technique from the set of selection techniques by iterating through the two or more key servers until identifying a second key server;

    sending, to the second key server, the second key request that includes the protected key decryptable by the second key server; and

    in response to the second key request, receiving, from the second key server, a second response that includes an encrypted decryption key, wherein the encrypted decryption key is decrypted by the data storage drive to obtain the decryption key and used to decrypt the encrypted data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×