Removable information storage device that includes a master encryption key and encryption keys
First Claim
Patent Images
1. A removable information storage device suitable for use with a host, comprising:
- a non-volatile memory configured to store a master encryption key; and
a non-volatile magnetic memory configured to store encryption keys which have been encrypted using the master encryption key and to store data which has been encrypted using the encryption keys.
1 Assignment
0 Petitions
Accused Products
Abstract
A removable information storage device which encrypts and decrypts encryption keys and data is disclosed. In one embodiment, the information storage device includes a non-volatile memory that is configured to store a master encryption key and includes a non-volatile magnetic memory that is configured to store encryption keys that have been encrypted using the master encryption key and to store data that has been encrypted using the encryption keys.
98 Citations
30 Claims
-
1. A removable information storage device suitable for use with a host, comprising:
-
a non-volatile memory configured to store a master encryption key; and
a non-volatile magnetic memory configured to store encryption keys which have been encrypted using the master encryption key and to store data which has been encrypted using the encryption keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A portable memory card, comprising:
-
a non-volatile memory storage device configured to store one or more encrypted encryption keys and encrypted data; and
a card controller system coupled to the memory storage device configured to store and retrieve the encrypted encryption keys and the encrypted data from the memory storage device, wherein the encryption keys are encrypted and decrypted using a master encryption key and the data is encrypted and decrypted using the encryption keys. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
-
24. A memory card, comprising:
-
a non-volatile master key memory configured to store a master encryption key;
an encryption and decryption engine configured to implement one or more symmetrical encryption key algorithms based on the master encryption key and encryption keys;
a memory storage device comprising an atomic resolution storage device including a field emitter, a media and a micromover, the atomic resolution storage device configured to store the encryption keys after the encryption keys are encrypted using the master encryption key and to store data after the data is encrypted using the encryption keys;
a host interface configured to provide a communication interface to a host;
a memory interface configured to provide a communication interface to the memory storage device;
a data path manager configured to manage communication of the data and the encrypted data between the host and the memory storage device; and
a controller processor configured to control the encryption and decryption of the encryption keys using the master encryption key and the encryption and decryption of the data using the encryption keys.
-
-
25. An information storage device, comprising:
-
a non-volatile memory storage device configured to store one or more encrypted encryption keys and encrypted data; and
controller means configured to store and retrieve the encrypted encryption keys and the encrypted data from the memory storage device and to encrypt and decrypt the encryption keys using a master encryption key and to encrypt and decrypt the data using the encryption keys. - View Dependent Claims (26)
-
-
27. A method of encrypting encryption keys using a master encryption key in an information storage device, comprising:
-
providing the encryption keys to the information storage device;
reading a master encryption key from a non-volatile memory;
encrypting each one of the encryption keys using the master encryption key; and
writing the encrypted encryption keys to a random access memory.
-
-
28. A method of decrypting encryption keys in an information storage device, comprising:
-
reading the encrypted encryption keys from the magnetic random access memory;
reading a master encryption key from a first non-volatile memory; and
decrypting each one of the encryption keys using the master encryption key. - View Dependent Claims (29, 30)
-
Specification