- Round Rock TX, US Vigneswaran PONNUSAMY - Round Rock TX, US Kumaran PALANIAPPAN - Austin TX, US Karthikeyan RAJAGOPALAN - Austin TX, US Karthik ARUNACHALAM - Round Rock TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
G06F 21/78 G06F 21/60 G06F 21/62
Abstract:
An information handling system may include a processor; an encrypted storage resource, wherein the encrypted storage resource is coupled to the information handling system via a storage controller that does not implement locking and unlocking functionality for the encrypted storage resource; and a management controller configured to: receive a request to unlock the encrypted storage resource; determine an encryption key associated with the encrypted storage resource; and unlock the encrypted storage resource with the received encryption key via a sideband interface coupling the management controller to the encrypted storage resource.
Managing Migration Of Self Encrypted Drive Within A Single Key Management System User Group
- Round Rock TX, US Vigneswaran PONNUSAMY - Round Rock TX, US Karthikeyan RAJAGOPALAN - Austin TX, US Sanjeev DAMBAL - Austin TX, US Kumaran Palaniappan THANGAVELU - Austin TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
H04L 9/08
Abstract:
A disclosed method for managing encryption keys, which may be performed by a key management server, responds to receiving, from a first client, a request to create a new key for a self-encrypting drive (SED) associated with the first client by retrieving unique identifiers of the first client and the SED, generating and storing the new key and a corresponding key identifier (KeyID), and associating the unique identifiers of the SED and first client with the new key. Upon receiving, from a second client, a locate key request that includes the SED identifier, providing the new key, the KeyID, and the first client identifier to the second client. Associating the SED and first client identifiers with the new key may include adding the identifiers as attributes of the KeyID. Embodiments may be implemented in accordance with a key management interoperability protocol (KMIP) standard.
Method And Apparatus For Ensuring Integrity Of Keys In A Secure Enterprise Key Manager Solution
- Round Rock TX, US Chandrashekar Nelogal - Round Rock TX, US Karthikeyan Rajagopalan - Austin TX, US Texas Roemer - Round Rock TX, US
International Classification:
H04L 9/08 H04L 9/32
Abstract:
An information handling system includes a first node configured to generate a random alphanumeric string, to receive a cipher text and a key from an enterprise key management server, and to decrypt the cipher text using the key and an algorithm to generate a first decrypted value. The first node compares the random alphanumeric string with the first decrypted value to verify the key that is received at the first node. A second node receives the cipher text, the key, and the algorithm from the first node in response to the first decrypted value matching the random alphanumeric string. The second node decrypts the cipher text using the key and the algorithm to generate a second decrypted value, and the first node compares the second decrypted value with the random alphanumeric string to verify the key that is received at the second node. A self-encrypting drive receives the key from the second node in response to the second decrypted value matching the random alphanumeric string, and uses the key upon authentication of the key by the second node.