Patent application number | Description | Published |
20080235476 | Media Vaulting in an Automated Data Storage Library - Disclosed are a system, a method, and article of manufacture to provide for managing data storage media to provide secure storage of the data storage media in an automated data storage library. A logical library partition vault is created in the automated data storage library that is not accessible by any host computer. Data storage media in the logical library partition vault may only be accessed by an operator using a secure means. The logical library partition vault may comprise various components of the automated data storage library by assigning storage shelves, service bays, data storage media, data storage drives or other library components to the logical library partition vault. | 09-25-2008 |
20090028322 | System for an Encryption Key Path Diagnostic - A system is provided to perform a key path diagnostic that aids in isolating an error within the encryption storage system. The system includes at least one drive, a key proxy, a key server, a key manager, and a processor. The processor performs a first communication test on a path between the key proxy and the drive. The first communication test verifies that the path between the drive and the key proxy is operational. The processor performs a second communication test on a path between the key proxy and the key server. The second communication test verifies that the path between the key proxy and the key server is operational. In addition, processor sends a command to the key manager to attempt communication with the key manager. The communication attempt verifies the installation and configuration parameters related to the key manager. | 01-29-2009 |
20090028336 | Encryption Key Path Diagnostic - A method and a computer program product are provided to perform a key path diagnostic that aids in isolating an error within the encryption storage system. A first communication test is performed on a path between the key proxy and the drive. The first communication test verifies that the path between the drive and the key proxy is operational. A second communication test is performed on a path between the key proxy and the key server. The second communication test verifies that the path between the key proxy and the key server is operational. In addition, the drive or the key proxy sends a command to the key manager to attempt communication with the key manager. The communication attempt verifies the installation and configuration parameters related to the key manager. | 01-29-2009 |
20090028339 | Auto-Configuration of a Drive List for Encryption - A method, a system and a computer program product are provided to auto configure a drive list. When information is received for a drive, the key manager compares the information to drive information on a drive list. If the drive is not on the drive list the drive list is auto configured by adding the drive to the drive list. By adding the drive to the drive list the drive is able to obtain keys from the key manager to perform encryption and decryption. | 01-29-2009 |
20090052664 | Bulk Data Erase Utilizing An Encryption Technique - Disclosed is a method for eliminating access to data on removable storage media of a removable storage media cartridge. A key is stored on the removable storage media cartridge, such that data on the removable storage media is accessible with the key. Upon receiving a command to eliminate access to data on the removable storage media the key is shredded such that access to data on the removable storage media is eliminated. | 02-26-2009 |
20090052665 | Bulk Data Erase Utilizing An Encryption Technique - A system and a computer program product are disclosed for eliminating access to data on removable storage media of a removable storage media cartridge. The system comprises a data storage drive that stores a key on the removable storage media cartridge, such that data on the removable storage media is accessible with the key. Upon receiving a command to eliminate access to data on the removable storage media the data storage drive shreds the key such that access to data on the removable storage media is eliminated. | 02-26-2009 |
20090112358 | SYSTEM AND PROGRAM FOR VIRTUALIZATION OF DATA STORAGE LIBRARY ADDRESSES - Disclosed is a system and program for using storage slots efficiently. A storage element count is assigned to each one of multiple logical libraries, and the sum of the storage element count for each one of the multiple logical libraries exceeds the total number of storage slots in the library. | 04-30-2009 |
20090149984 | BURST COMMUNICATIONS FOR AN AUTOMATED DATA STORAGE LIBRARY - An automated data storage library with storage shelves, data storage drive(s), a bus bar; and a robot accessor with a drive system for moving the robot accessor, an accessor communication interface, a bus bar relay configured to engage and disengage the bus bar; and a robot control configured to operate the drive system to move the robot accessor, to operate a picker, and to operate the bus bar relay to engage the bus bar when the robot accessor is stationary, to provide communication capability with a library communication interface via the bus bar relay and the bus bar when the bus bar relay engages the bus bar. Additionally, a second communication system may be provided between the robot accessor and the automated data storage library, which is operable at least when the robot accessor is moving. | 06-11-2009 |
20090208017 | VALIDATION OF ENCRYPTION KEY - A label corresponding to a cryptographic key is stored at a first computational device. A user provided label is received at a second computational device. The user provided label is sent from the second computational device to the first computational device. The user provided label is compared to the label stored at the first computational device. The cryptographic key is used to perform cryptographic operations on data, in response to determining that the user provided label matches the label stored at the first computational device. | 08-20-2009 |
20100094949 | Method of Backing Up Library Virtual Private Database Using a Web Browser - A library uses a web server to store library vital product data (VPD) to a user's computer. In certain embodiments, the library uses web type cookies to save library VPD as name-value pairs. After an action, such as a service action, that results in a loss of VPD, the library can automatically retrieve the VPD from the web browser of the user's computer. This approach has several advantages. No user intervention is required to back up or restore the library VPD. Simply using the web user interface of the library accomplishes the necessary connection to the user's computer storage. If the user does not connect to the web browser then it is likely that library VPD is not being changed. No additional hardware or software is required. Additionally, the library already has a web server and the customer already uses web browsers to access the library. No cost, installation, or setup is required. In certain embodiments, library firmware can use the existing operator panel and web user interface for prompting the user through any decisions that may be required, as it relates to backing up or restoring library VPD. | 04-15-2010 |
20100172045 | CALIBRATION OF AN AUTOMATED DATA STORAGE LIBRARY WITH A CARTRIDGE-LIKE ELEMENT - Calibration of an automated data storage library having a plurality of storage slots configured to store at least one data storage cartridge. An element is placed in one of the plurality of storage slots having a known location, the element having similar external dimensions as a data storage cartridge having a fiducial mark thereon. The fiducial mark is sensed, and the position of the fiducial mark is calibrated with respect to the known location of the storage slot. The element comprises an exterior shell having similar external dimensions as a data storage cartridge; and the fiducial mark located on the exterior shell comprises at least one contrasting edge defining a specific calibration location on the element. | 07-08-2010 |
20120102335 | REKEYING ENCRYPTION KEYS FOR REMOVABLE STORAGE MEDIA - Provided are a method, system, and article of manufacture for rekeying encryption keys for removable storage media. A rekey request is received for a coupled removable storage media, wherein encryption on the coupled removable storage media uses a first key and wherein the rekey request indicates a second key. The first key and the second key are accessed in response to the rekey request. The first key is used to perform decryption for the coupled removable storage media and the second key is used to perform encryption for the coupled removable storage media. | 04-26-2012 |
20120239944 | Selective Encryption of Data Stored on Removable Media in an Automated Data Storage Library - In an automated data storage library, selective encryption for data stored or to be stored on removable media is provided. One or more encryption policies are established, each policy including a level of encryption, one or more encryption keys and the identity of one or more data cartridges. The encryption policies are stored in a policy table and the encryption keys are stored in a secure key server. A host requests access to a specified data cartridge and the cartridge is transported from a storage shelf in the library to a storage drive. Based on the identity of the specified cartridge, the corresponding encryption policy is selected from the table and the appropriate encryption key is obtained from the key server. The storage drive encrypts data in accordance with the key and stores the data on the media within the specified data cartridge. | 09-20-2012 |