Cryptography – Key management – Having particular key generator
Reexamination Certificate
2007-05-08
2007-05-08
Moazzami, Nasser (Department: 2136)
Cryptography
Key management
Having particular key generator
C726S026000, C726S034000, C713S168000, C713S189000, C713S194000
Reexamination Certificate
active
09608103
ABSTRACT:
A secure disk drive is disclosed comprising a disk for storing data, and an input for receiving an encrypted message from a client disk drive, the encrypted message comprising ciphertext data and a client drive ID identifying the client disk drive. The secure disk drive comprises a secure drive key and an internal drive ID. A key generator within the secure disk drive generates a client drive key based on the client drive ID and the secure drive key, and an internal drive key based on the internal drive ID and the secure drive key. The secure disk drive further comprises an authenticator for verifying the authenticity of the encrypted message and generating an enable signal, the authenticator is responsive to the encrypted message and the client drive key. The secure disk drive further comprises a data processor comprising a message input for receiving the encrypted message from the client disk drive, and a data output for outputting the ciphertext data to be written to the disk. The data processor further comprises an enable input for receiving the enable signal for enabling the data processor, and a key input for receiving the internal drive key, the internal drive key for use in generating a message authentication code. The data processor outputs reply data comprising the message authentication code. The secure disk drive outputs a reply to the client disk drive, the reply comprising the reply data and the internal drive ID.
REFERENCES:
patent: 4757534 (1988-07-01), Matyas et al.
patent: 5235641 (1993-08-01), Nozawa et al.
patent: 5463690 (1995-10-01), Crandall
patent: 5465183 (1995-11-01), Hattori
patent: 5583712 (1996-12-01), Brunelle
patent: 5592555 (1997-01-01), Stewart
patent: 5657470 (1997-08-01), Fisherman et al.
patent: 5677952 (1997-10-01), Blakley, III et al.
patent: 5687237 (1997-11-01), Naclerio
patent: 5805699 (1998-09-01), Akiyama et al.
patent: 5883958 (1999-03-01), Ishiguro
patent: 5915018 (1999-06-01), Aucsmith
patent: 5923754 (1999-07-01), Angelo et al.
patent: 5930358 (1999-07-01), Rao
patent: 5931947 (1999-08-01), Burns et al.
patent: 5995624 (1999-11-01), Fielder et al.
patent: 6061794 (2000-05-01), Angelo et al.
patent: 6064989 (2000-05-01), Cordery et al.
patent: 6085320 (2000-07-01), Kaliski, Jr.
patent: 6144743 (2000-11-01), Yamada et al.
patent: 6189098 (2001-02-01), Kaliski, Jr.
patent: 6226750 (2001-05-01), Trieger
patent: 6230269 (2001-05-01), Spies et al.
patent: 6253323 (2001-06-01), Cox et al.
patent: 6289102 (2001-09-01), Ueda et al.
patent: 6289451 (2001-09-01), Dice
patent: 6289457 (2001-09-01), Bishop et al.
patent: 6363487 (2002-03-01), Schneider
patent: 6397333 (2002-05-01), Sohne et al.
patent: 6405315 (2002-06-01), Burns et al.
patent: 6434700 (2002-08-01), Alonso et al.
patent: 6438235 (2002-08-01), Sims
patent: 6473809 (2002-10-01), Aref et al.
patent: 6473861 (2002-10-01), Stokes
patent: 6550009 (2003-04-01), Uranaka et al.
patent: 6609199 (2003-08-01), DeTreville
patent: 6615264 (2003-09-01), Stoltz et al.
patent: 6823398 (2004-11-01), Lee et al.
patent: 2001/0032088 (2001-10-01), Utsumi et al.
patent: 2003/0191816 (2003-10-01), Landress et al.
patent: 0816967 (1998-01-01), None
patent: 0911738 (1998-04-01), None
William Stallings, “Cryptography and Network Security, Principles and Practice”, Second Edition, Prentice Hall, Inc. ISBN 0-13-869017-0, pp. 323-353, Jul. 1998.
Menezes et al., “Handbook of Applied Cryptography”, 1997, CRC Press, p. 171, 357-358.
Menezes et al., “Handbook of Applied Cryptography”, 1997, CRC Press, pp. 500-501.
Bennet Yee, J.D. Tygar, “Secure Coprocessors in Electronic Commerce Applications”, First USENIX Workshop on Electronic Commerce, Jul. 11-12, 1995, 155-170.
Howard Gobioff, “Security for a High Performance Commodity Storage Subsystem”, School of Computer Science, Carnegie Mellon University, CMU-CS-99-160, Jul. 1999, pp. 171-178.
Rodney Van Meter, Steve Hotz, Gregory Finn, “Derived Virtual Devices: A Secure Distributed File System Mechanism”, In Proceedings of the Fifth NASA Goddard Space Flight Center Conference on Mass Storage Systems and Technologies, Sep. 1996.
Garth A. Gibson, David F. Nagle, Khalil Amiri, Fay W. Chang, Howard Gobioff, Erik Riedel, David Rochberg, and Jim Zelenka, “Filesystems for Network-Attached Secure Disks”, Jul. 1997, 1-18, CMU-CS-97-118, School of Computer Science, Carnegie Mellon University, Pittsburgh, Pennsylvania 15213-3890.
Howard Gobioff, Garth Gibson, and Doug Tygar, “Security for Network Attached Storage Devices”, Oct. 23, 1997, 1-18, CMU-CS-97-185, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA 15213.
“Digital Transmission License Agreement”, www.dtcp.com.
“Digital Transmission Content Protection Specification”, vol. 1, Revision 1.0, Apr. 12, 1999, www.dtcp.com.
“5C Digital Transmission Content Protection White Paper”, Revision 1.0, Jul. 14, 1998, www.dtcp.com.
Steve Grossman, “Two-Chip Set Safeguards Digital Video Content”, Electronic Design, Jun. 12, 2000, pp. 68-72.
William Stallings, “Cryptography and Network Security, Principles and Practice”, Second Edition, Prentice Hall, Inc. ISBN 0-13-869017-0, pp. 323-353, Jul. 1998.
Microsoft, Computer Dictionary, 5th Edition, 2002, p. 165.
Bertino et al. “Advanced Transaction Processing in Multilevel Secure File Stores”, 1998, IEEE 1041-4347/98.
Menezes et al., “Handbook of Applied Cryptography”, 1997, CRC Press, p. 171, 357-358.
Menezes et al., “Handbook of Applied Cryptography”, 1997, CRC Press, pp. 500-501.
Erik Ottem, “White Papers: Hold on to Your Memory: Password Protection for Disc Drive Security”, http://www.seagate.com
owsinfo
ewsroom/papers/D2c9.html, pp. 1-3, Jun. 1996.
Colin Carl
Moazzami Nasser
Sheerin, Esq. Howard H.
Western Digital Ventures, Inc.
LandOfFree
Secure disk drive comprising a secure drive key and a drive... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure disk drive comprising a secure drive key and a drive..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure disk drive comprising a secure drive key and a drive... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3790590