Patent application number | Description | Published |
20080253570 | SYSTEM AND METHOD FOR PROCESSING USER DATA IN AN ENCRYPTION PIPELINE - A method, system and program are disclosed for efficiently processing host data which comprises encrypted and non-encrypted data and is to be written to a storage medium. The encrypted data is written to the storage medium in encrypted form. The non-encrypted data is encrypted by a storage device using a well known encryption key and written to the storage medium. In this way, the data that is processed by the storage device to and from the storage medium can always be processed through a single encryption engine. | 10-16-2008 |
20080316634 | MAGNETIC TAPE WRITE ONCE OVERWRITE PROTECTION - A magnetic tape cartridge, a recording system, and a magnetic tape drive are configured to, for example, guard against tampering with a write once overwrite protection pointer which allows a rewritable magnetic tape to be treated as write once. In one embodiment, the magnetic tape cartridge comprises a magnetic tape and a cartridge memory. The magnetic tape is configured to provide at least one overwrite protection pointer, the overwrite protection pointer identifying data to be protected from being overwritten; and the cartridge memory is configured to provide the at least one overwrite protection pointer, the overwrite protection pointer identifying magnetic tape data to be protected from being overwritten. | 12-25-2008 |
20090052664 | Bulk Data Erase Utilizing An Encryption Technique - Disclosed is a method for eliminating access to data on removable storage media of a removable storage media cartridge. A key is stored on the removable storage media cartridge, such that data on the removable storage media is accessible with the key. Upon receiving a command to eliminate access to data on the removable storage media the key is shredded such that access to data on the removable storage media is eliminated. | 02-26-2009 |
20090052665 | Bulk Data Erase Utilizing An Encryption Technique - A system and a computer program product are disclosed for eliminating access to data on removable storage media of a removable storage media cartridge. The system comprises a data storage drive that stores a key on the removable storage media cartridge, such that data on the removable storage media is accessible with the key. Upon receiving a command to eliminate access to data on the removable storage media the data storage drive shreds the key such that access to data on the removable storage media is eliminated. | 02-26-2009 |
20090174961 | Target Of Opportunity In An Automated Data Storage Library - A method is provided for utilizing target of opportunity to perform at least one special operation while a removable storage medium is mounted within a data storage drive for another purpose. A target of opportunity is recognized by determining if at least one special operation may be performed by the data storage drive. If it is determined that at least one special operation may be performed then a first notification that the data storage drive is to remain in a not ready state is sent in response. At least one special operation is performed, and in response to the at least one special operation being performed, a second notification is sent that the removable storage medium is in a ready state or an error state. | 07-09-2009 |
20090174965 | Data Storage Drive With Target Of Opportunity Recognition - A system and computer program product are provided for utilizing target of opportunity to perform at least one special operation while a removable storage medium is mounted within a data storage drive for another purpose. The system for recognizing a target of opportunity comprises a tape drive. The tape drive receives a command to mount a tape cartridge in the tape drive, and in response the tape drive mounts the tape cartridge in the tape drive. The tape drive determines if at least one special operation may be performed. If it is determined that at least one special operation may be performed, the tape drive recognizes that a target of opportunity exists. In response to determining that at least one special operation may be performed, the tape drive sends a first notification that the tape drive is to remain in a not ready state. The tape drive performs the at least one special operation, and in response to performing the at least one special operation, the tape drive sends a second notification that the tape drive is in a ready state or an error state. | 07-09-2009 |
20090175451 | Target Of Opportunity Recognition During An Encryption Related Process - A method, system, and computer program product are provided for utilizing target of opportunity to perform at least one special operation while a key session is opened with a key manager for another purpose. The method of recognizing a target of opportunity includes receiving a command to be performed on a removable storage medium and determining if the command requires interaction with the encryption key manager. If it is determined that the command requires interaction with the key manager the command is held off. A request is sent to the encryption key manager. A target of opportunity is recognized by determining if at least one special operation may be performed. If it is determined that at least one special operation may be performed then the at least one special operation and the request are performed. | 07-09-2009 |
20090177314 | Automated Data Storage Library with Target of Opportunity Recognition - A system and computer program product are provided for utilizing target of opportunity to perform at least one special operation while a removable storage medium is mounted within a data storage drive for another purpose. The system comprises a tape library and a tape drive coupled to the tape library. The tape library receives a command to mount a tape cartridge in the tape drive. If it is determined by the tape library that at least one special operation may be performed, then tape library has recognized that a target of opportunity exists. In response to determining that at least one special operation may be performed, the tape library sends a first notification that the tape drive is to remain in a not ready state. The tape library mounts the tape cartridge in the tape drive after determining that at least one special operation may be performed. In response to the tape drive performing the at least one special operation, the tape library sends a second notification that the tape drive is in a ready state or an error state. | 07-09-2009 |
20090208017 | VALIDATION OF ENCRYPTION KEY - A label corresponding to a cryptographic key is stored at a first computational device. A user provided label is received at a second computational device. The user provided label is sent from the second computational device to the first computational device. The user provided label is compared to the label stored at the first computational device. The cryptographic key is used to perform cryptographic operations on data, in response to determining that the user provided label matches the label stored at the first computational device. | 08-20-2009 |
20090327746 | KEY ENCRYPTION AND DECRYPTION - Provided is a data storage drive for encrypting data, comprising a microprocessor and circuitry coupled to the microprocessor and adapted to receive a session encrypted data key and to decrypt the session encrypted data key using a session key, wherein a result is a data key that is capable of being used to encrypt clear text and to decrypt cipher text written to a storage medium. Also provided is a system, comprising a microprocessor and circuitry coupled to the microprocessor and adapted to receive a session encrypted data key and to decrypt the session encrypted data key using a private key, wherein a result is a secret key that is capable of being used to encrypt clear text and to decrypt cipher text written to a storage medium. | 12-31-2009 |
20130305057 | CRYPTOGRAPHIC ERASURE OF SELECTED ENCRYPTED DATA - Exemplary method, system, and computer program product embodiments for cryptographic erasure of selected encrypted data are provided. In one embodiment, by way of example only, data files are configured with a derived key. The derived keys adapted to be individually shredded in a subsequent erasure operation. The derived key allows for cryptographic erasure of the selected encrypted data in the data files without necessitating at least one of removal and rewrite of retained data. Additional system and computer program product embodiments are disclosed and provide related advantages. | 11-14-2013 |
20140063634 | TAPE DRIVE BUFFER UTILIZATION - Records and filemarks read from data segments are aggregated into at least one single data segment. The records and the filemarks are reorganized and restructured in the single data segment such that buffer utilization is improved. | 03-06-2014 |