This patent application has not been assigned to a company or institution.
The following quote was obtained by the news editors from the background information supplied by the inventors: "Encrypted storage devices are used to store sensitive and confidential information. Drives of the self-encrypting variety contain their own encryption engine in which data gets encrypted when being written, and decrypted when read.
"A strong encryption key has the maximum amount of entropy allowed by its size. For example, a 256 bit AES key should have 256 bits of entropy. An encryption key based on a user password has relatively little entropy. A password of 8 characters, assuming upper and lower chase letters and numbers, can generate up to 218,340,105,584,896 different numbers. Which seems like a lot, but not when compared to 1.16.times.10.sup.77 possible values available from a 256 bit key.
"Given the ever increasing processing power of computers, it is desirable to have maximum entropy in order to thwart brute force attacks. Therefore, an encryption key based on a user password is not the most desired means.
"Generating a truly random number is difficult. Some mass storage manufacturers program encryption keys at the factory. These keys are generated by factory computers and copied into a region of private memory within the mass storage device. Customers are typically concerned with how these keys are created and whether the factory can associate a serial number with an encryption key. In addition, can the factory be trusted to create encryption keys with sufficient entropy? And, do mass storage devices contain duplicate keys?
"Given the difficulty of having a mass storage device create its own entropy, once factory programmed encryption keys are zeroized, the drive will no longer work and becomes a paper weight.
"There is accordingly an unmet need in the art to provide a mass storage device with the built-in ability to create a virtually unlimited supply of encryption keys with the entropy equivalent to its key length.
"An example of a prior art device is shown in US Publication No. 2011/0075840, entitled Method and System for Generating Random Numbers in a Storage Device, filed
"Another example of a prior art device is shown in US Publication No. 2008/0263363, entitled Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption, filed
"A further example of such a prior art device is shown in U.S. Pat. No. 6,044,388, entitled Pseudo-random number generator, issued
"Another prior art device is shown in U.S. Pat. No. 5778069, entitled Non-biased pseudo random number generator, issued
"A prior art device is shown in U.S. Pat. No. 8,001,054, issued
"A further prior art device is shown in U.S. Pat. No. 4,694,412, issued
"A prior art device is shown in U.S. Pat. No. 7,421,462, issued
"Another prior art device is shown in U.S. Pat. No. 6,728,740, entitled Random number generator seeding method and apparatus, to Kelly et al. This patent shows a plurality of event sensors associated with separate counters, and which is used to create a seed number which is then stored in a seed register. The counters identified in this patent are for a time stamp count, instructions executed, date of reads and writes, and a microsecond timer.
"A publication in US 2012/0179735 having a filing date of
In addition to the background information obtained for this patent application, VerticalNews journalists also obtained the inventor's summary information for this patent application: "The present invention relates to disk drives having encryption, and more specifically to removable disk drives which have password protection.
"The apparatus and system according to the present invention provides a mass storage device with an integrated input device mechanism that is electrically connected to a micro-controller equipped with a cyclic counter. In use, an input event causes the micro-controller to read the cyclic counter's current value; a predetermined number of such input events results in providing a mechanism of creating enough entropy to seed a deterministic random number generator (DRNG). The output of the DRNG is then used as an encryption key for encrypting/decrypting data contained within mass storage media.
"Certain embodiments of the invention have other aspects in addition to or in place of those mentioned above. These aspects will become apparent to those skilled in the art from a reading of the following detailed description when taken with reference to the accompanying drawings.
"Other objects and advantages of the present invention will be more readily apparent from the following detailed description when read in conjunction with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
"FIG. 1 schematically depicts a self-encrypting mass storage device with an integrated human interface device ('HID').
"FIG. 2 represents a flow diagram showing a user defining a PIN which simultaneously results in the creation of a random seed with sufficient entropy.
"FIG. 3 schematically depicts a self-encrypting mass storage device and a separate HID which are both connected to a host computer, whereby event detection occurs in the host computer, to provide entropy creation.
"FIG. 4 is a perspective view of a preferred embodiment of a self-encrypting flash drive with integrated user authentication."
URL and more information on this patent application, see: Johnson, Simon. Encryption Key Generation in Encrypted Storage Devices. Filed
Keywords for this news article include: Patents, Information Technology, Information and Data Encoding and Encryption.
Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC
Most Popular Stories
- Islamic State Obliterating Cultural Landmarks in Mosul
- VW Site Could Mean Another 2,000 Jobs for Chattanooga
- Anarchy, Chaos Sweep Across Libya
- Eid al-Fitr Celebrations Mark End of Ramadan
- Report: China to Declare Qualcomm a Monopoly
- The 2014 Fastest-Growing 100
- Oppression of Women Cripples Africa: Obama
- RV Sales See Highest Increase Post Great Recession
- Israeli Criticism of Kerry Annoys White House
- Contreras-Sweet to Speak at MED Week