Encryption of memory device with wear leveling
First Claim
1. A method performed by a data processing apparatus, the method comprising:
- accessing, by a computer, an address map of a memory device, the address map referencing first memory locations and second memory locations of the memory device, wherein the first memory locations store data that are to be encrypted by a full disk encryption operation on the memory device;
designating, by the computer, the second memory locations as being encrypted without performing an encryption operation on the second memory locations, wherein the second memory locations comprise empty memory locations; and
encrypting, by the computer, only the data stored in memory locations of the memory device not already designated as encrypted, wherein the data of the first memory locations and the second memory locations are designated as being disk encrypted following the encrypting.
10 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for encryption of a memory device with wear leveling. In one aspect, a method includes accessing an address map of the memory device, the address map referencing first memory locations and second memory locations of the memory device, wherein the first memory locations store data that are to be encrypted by a full disk encryption operation on the memory device; designating the second memory locations as being encrypted without performing an encryption operation on the second memory locations; and encrypting only the data stored in the first memory locations of the memory device so that the data of the first memory locations and the second memory locations are designated as being disk encrypted.
-
Citations
20 Claims
-
1. A method performed by a data processing apparatus, the method comprising:
-
accessing, by a computer, an address map of a memory device, the address map referencing first memory locations and second memory locations of the memory device, wherein the first memory locations store data that are to be encrypted by a full disk encryption operation on the memory device; designating, by the computer, the second memory locations as being encrypted without performing an encryption operation on the second memory locations, wherein the second memory locations comprise empty memory locations; and encrypting, by the computer, only the data stored in memory locations of the memory device not already designated as encrypted, wherein the data of the first memory locations and the second memory locations are designated as being disk encrypted following the encrypting. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
-
a data processing apparatus; a memory device; instructions stored in a computer readable medium, the instructions being executable to cause the data processing apparatus to perform operations comprising; accessing an address map of the memory device, the address map referencing first memory locations and second memory locations of the memory device, wherein the first memory locations store data that are to be encrypted by a full disk encryption operation on the memory device; designating the second memory locations as being encrypted without performing an encryption operation on the second memory locations, wherein the second memory locations comprise empty memory locations; and encrypting only the data stored in memory locations of the memory device not already designated as encrypted, wherein the data of the first memory locations and the second memory locations are designated as being disk encrypted following the encrypting. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. At least one non-transitory machine accessible storage medium having instructions stored thereon, the instructions when executed on a machine, cause the machine to:
-
access an address map of a memory device, the address map referencing first memory locations and second memory locations of the memory device; determine that data at the second memory locations is to be left unencrypted by a full disk encryption operation on the memory device, wherein the full disk encryption operation is to encrypt data stored at the first memory locations and the second memory location comprise empty memory locations; designate the second memory locations as being encrypted; and encrypt only the data stored in memory locations of the memory device not already designated as encrypted, wherein the encrypting encrypts data of the first memory locations and data of the first memory locations and the second memory locations are designated as being disk encrypted following the encrypting. - View Dependent Claims (20)
-
Specification