×

Apparatus, system, and method for transparent end-to-end security of storage data in a client-server environment

  • US 7,899,189 B2
  • Filed: 12/09/2004
  • Issued: 03/01/2011
  • Est. Priority Date: 12/09/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. An apparatus for transparent end-to-end security of storage data in a client-server environment, the apparatus comprising:

  • a key generator that generates a random storage key for each storage construct associated with a storage session, the randomly generated storage key uniquely associated with one storage construct;

    an encryption module that encrypts the storage construct according to a first encryption algorithm using the randomly generated storage key, the encryption module encrypting the randomly generated storage key using a transmission key and a second encryption algorithm known to a receiver;

    a communication interface that transmits the encrypted storage construct and the encrypted randomly generated storage key to the receiver without transmitting the transmission key, the encrypted storage construct stored on the first storage device on the receiver without decrypting the encrypted storage construct, the storage construct remaining encrypted as long as the storage construct is stored on the receiver, the randomly generated storage key stored on a second storage device physically distinct from the first storage device;

    a security module on the receiver that decrypts the encrypted randomly generated storage key using the transmission key, the security module re-encrypting the decrypted randomly generated storage key using a native key known exclusively to the receiver such that the randomly generated storage key stored on the second storage device is re-encrypted;

    an association module associating the randomly generated storage key and the storage construct in a data construct comprising the randomly generated storage key, a storage construct name, a storage construct location, a randomly generated storage key location, a randomly generated storage key size, and an identifier for the first encryption algorithm;

    the association module further receiving the storage construct name, and the storage construct location to identify the randomly generated storage key in a request for the storage construct from a client;

    the security module decrypting the re-encrypted randomly generated storage key with the native key and re-encrypting the decrypted randomly generated storage key with a transmission key known to the client in response to the request for the storage construct from the client; and

    the encryption module key generator, communication interface, and security module comprise one or more of hardware and executable code, the executable code stored on one or more computer readable media.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×