The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Apr. 09, 2019

Filed:

May. 18, 2016
Applicant:

Dell Products, L.p., Round Rock, TX (US);

Inventors:

Dinesh Kunnathur Ragupathi, Round Rock, TX (US);

Rama Rao Bisa, Kandukur, IN;

Pavan Kumar, Bangalore, IN;

Syama Sundar Poluri, Round Rock, TX (US);

Sanjeev S. Dambal, Austin, TX (US);

Satyajit Dipakbhai Desai, Round Rock, TX (US);

Kevin Warren Mundt, Austin, TX (US);

Assignee:

Dell Products, L.P., Round Rock, TX (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 12/14 (2006.01); G06F 13/42 (2006.01); G06F 21/60 (2013.01); G06F 21/78 (2013.01); H04L 29/06 (2006.01); H04L 29/08 (2006.01);
U.S. Cl.
CPC ...
G06F 12/1408 (2013.01); G06F 13/4282 (2013.01); G06F 21/60 (2013.01); G06F 21/602 (2013.01); G06F 21/78 (2013.01); H04L 63/0428 (2013.01); H04L 63/061 (2013.01); H04L 67/1097 (2013.01); G06F 2212/1052 (2013.01);
Abstract

A method and system provide local key management for storage enclosures. The method includes retrieving first security content from a security vault of a service processor, then dynamically detecting a hardware interface communicatively coupled to the service processor. A data storage device, communicatively coupled to the hardware interface is dynamically detected. A dynamic determination is made as to whether the data storage device is a self-encrypting capable data storage device. In response to the data storage device being a self-encrypting capable data storage device, a second security content is retrieved from the data storage device, and a validation regarding an association between the first security content and the second security content is made. Finally, in response to a positive validation of the association between the first security content and the second security content, security keys are transmitted to the data storage device, and access to the data storage device is enabled.


Find Patent Forward Citations

Loading…