×

Automation of coordination of encryption keys in a SAN based environment where an encryption engine, device management, and key management are not co-located

  • US 8,498,417 B1
  • Filed: 03/06/2008
  • Issued: 07/30/2013
  • Est. Priority Date: 12/27/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method of operation in a data processing system including a storage area network, a storage system computer, and a key management server computer separate from the storage system computer, the storage area network including data storage devices, and the storage system computer including a replication facility and an encryption engine separate from the data storage devices, and the key management server computer providing encryption keys to the encryption engine, said method comprising:

  • a) the storage system computer creating an encrypted storage object in the storage area network, and the storage system computer sending a first request to the key management server computer for a data encryption key for writing encrypted data into the storage object, and the key management server computer responding to the first request by assigning a data encryption key to the storage object and keeping a record of the data encryption key assigned to the storage object;

    b) the storage system computer creating a replica of the storage object in the storage area network, and the storage system computer sending a second request to the key management server computer for a data encryption key for the replica to be associated in the key management server, and the key management server computer responding to the second request by assigning a data encryption key to the replica in coordination with the replication facility independent of the encryption engine, and the key management server computer keeping a record of the data encryption key assigned to the replica and an association of the replica with the storage object; and

    c) the storage system computer responding to a failure of the storage object in the storage area network by obtaining from the key management server computer an identification of the replica of the storage object that is associated with the storage object, and using the identification of the replica from the key management server computer to find the replica in the storage area network, and using the replica found in the storage area network to recover from the failure of the storage object.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×