Methods and devices for authentication and data encryption
First Claim
1. A storage device configured to secure a password and to authenticate a host device, comprising:
- a non-volatile storage media;
an interface coupled to at least one host device; and
a processor, the processor being operative to;
receive, via the interface with the at least one host device, a first entered password needed for accessing data stored in the non-volatile storage media;
generate a first number;
combine the first entered password and the first number;
generate a cryptographic key based on the combination of the first entered password and the first number;
encrypt the received first entered password using the cryptographic key;
store the encrypted first entered password and the first number in the non-volatile media;
receive, via the interface, a request for authentication;
responsive to the received request for authentication, provide to the at least one host device, via the interface, a reply comprising the first number with which the cryptographic key was generated;
receive, via the interface, a second number calculated by the at least one host device, the second number being based on a cryptographic combination of the first number provided to the at least one host device and a second entered password; and
authenticate the at least one host device if the second number successfully decrypts the encrypted first entered password.
8 Assignments
0 Petitions
Accused Products
Abstract
A storage device comprises a non-volatile storage media and a processor that is operative to receive, via an interface with one or more host devices, a first entered password needed for accessing data stored in the non-volatile storage media, generate a first number, combine the first entered password and the first number, generate a cryptographic key based on the combination of the first entered password and the first number, encrypt the received first entered password using the cryptographic key, and store the encrypted first entered password and the first number in the non-volatile media. The processor may be further operative to receive a request for authentication; provide a reply comprising the first number; receive a second number calculated based on a cryptographic combination of the first number and a second entered password, and authenticate the host device if the second number successfully decrypts the encrypted first entered password.
72 Citations
31 Claims
-
1. A storage device configured to secure a password and to authenticate a host device, comprising:
-
a non-volatile storage media; an interface coupled to at least one host device; and a processor, the processor being operative to; receive, via the interface with the at least one host device, a first entered password needed for accessing data stored in the non-volatile storage media; generate a first number; combine the first entered password and the first number; generate a cryptographic key based on the combination of the first entered password and the first number; encrypt the received first entered password using the cryptographic key; store the encrypted first entered password and the first number in the non-volatile media; receive, via the interface, a request for authentication; responsive to the received request for authentication, provide to the at least one host device, via the interface, a reply comprising the first number with which the cryptographic key was generated; receive, via the interface, a second number calculated by the at least one host device, the second number being based on a cryptographic combination of the first number provided to the at least one host device and a second entered password; and authenticate the at least one host device if the second number successfully decrypts the encrypted first entered password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A storage device configured to authenticate a host device, comprising:
-
a non-volatile storage media; an interface coupled to the at least one host device; and a processor, the processor being operative to; receive, via an interface with the at least one host device, a request for authentication; read, from the non-volatile storage media, a first number; responsive to the received request for authentication, provide to the at least one host device, via the interface, a reply comprising the first number with which a cryptographic key was generated; receive, via the interface, a second number calculated by the at least one host device, the second number being calculated based on a cryptographic combination of the first number provided to the at least one host device and a second entered password; read, from the storage device, a first encrypted first entered password that has been encrypted with a cryptographic combination of a first entered password and the first number; and authenticate the at least one host device if the second number successfully decrypts the first encrypted first entered password. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for a storage device to secure a password and authenticate a host device, the method comprising:
-
receiving, via, an interface with at least one host device, a first entered password needed for accessing data stored on the storage device; generating a first number; combining the first entered password and the first number; determining a cryptographic key based on the combination of the first entered password and the first number; encrypting at least the first entered password using the cryptographic key; storing the encrypted first entered password and the first number in the storage device; receiving, via the interface, a request for authentication; reading, from the storage device, a first number; responsive to the received request for authentication, providing to the at least one host device, via the interface, a reply comprising the first number with which the cryptographic key was generated; receiving, via the interface, a second number calculated by the at least one host device, the second number being calculated based on a cryptographic combination of the first number provided to the at least one host device and a second entered password; reading the encrypted first entered password from the storage device; and authenticating the at least one host device if the second number successfully decrypts the encrypted first entered password. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
-
26. A method for a storage device to authenticate a host device, comprising:
-
receiving, via an interface with the at least one host device, a request for authentication; reading, from the storage device, a first number; responsive to the received request for authentication, providing to the at least one host device, via the interface, a reply comprising the first number with which a cryptographic key was generated; receiving, via the interface, a second number calculated by the at least one host device, the second number being calculated based on a cryptographic combination of the first number provided to the at least one host device and a second entered password; reading, from the storage device, a first encrypted first entered password based on a cryptographic combination of a first entered password and the first number; and authenticating the at least one host device if the second number successfully decrypts the first encrypted first entered password. - View Dependent Claims (27, 28, 29, 30, 31)
-
Specification