Sign In to Follow Application
View All Documents & Correspondence

Method And System For Performing Secure I/O Operation In A Pluggable Flash Storage Device

Abstract: The present disclosure relates to a method and a system for performing secure read/write operations in the pluggable flash storage device. In one embodiment, a request for at least writing and reading of data in/from the pluggable flash storage device is received. Upon receiving the request for writing data, the storage device is authenticated based on a predetermined signature of the pluggable flash storage device. Upon authenticating the storage device, the at least one of user and the storage controller who made the request is also authenticated and write operation is performed based on successful authentication of the at least one of the user and the storage controller. By way of establishing secure communication between the storage device and the user or the storage controller during the read/write operation the hacking of the data in the storage device or use of the storage device with wrong intent is avoided.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
05 February 2015
Publication Number
07/2015
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
ipo@knspartners.com
Parent Application
Patent Number
Legal Status
Grant Date
2021-07-09
Renewal Date

Applicants

WIPRO LIMITED
Doddakannelli, Sarjapur Road, Bangalore 560035, Karnataka, India.

Inventors

1. MADHUKAR GUNJAN CHAKHAIYAR
New Area, Bisar Talab Gaya-823001, Bihar, India

Specification

CLIAMS:We Claim:
1. A method of performing secure read/write operation in a pluggable flash storage device, said method comprising:
receiving, from at least one of user and a storage controller, one or more requests for at least one of writing and reading of data in/from the pluggable flash storage device;
upon receiving the request for writing data, authenticating the pluggable flash storage device based on a predetermined signature of the pluggable flash storage device;
authenticating at least one of user and the storage controller by comparing a write access key provided to at least one of user and the storage controller with a predetermined write access key; and
performing write operation of data in the pluggable flash storage device upon authenticating the pluggable flash storage device and at least one of the user and the storage controller.
2. The method as claimed in claim 1, wherein the predetermined signature of the pluggable flash storage device is generated by the steps of:
extracting information associated with the pluggable flash storage device, the information include at least physical serial number, model number, manufacturing identity number and name of manufacturer;
generating a pseudo number based on the extracted information and storing the generated pseudo number in the predefined memory location of the storage controller;
processing the pseudo number using hash function to generate a hashed value; and
encrypting the hashed value into the predetermined signature of the pluggable flash storage device.
3. The method as claimed in claim 1, wherein authenticating the pluggable flash storage device comprises the steps of:
determining signature of the pluggable flash storage device stored in a predefined memory location of the pluggable flash storage device;
decrypting the determined signature into a hashed value;
generating a pseudo number based on the hashed value;
comparing the generated pseudo number of the pluggable flash storage device with a predetermined pseudo number stored in the predefined memory location of the storage controller; and
authenticating the pluggable flash storage device based on comparison.
4. The method as claimed in claim 1, further comprising:
determining a last session ID of a last session established between the authenticated pluggable flash storage device and at least one of the user and the storage controller;
upon determining the last session ID, performing write operation of unfinished data of the last session; and
creating a new session between the authenticated pluggable flash storage device and at least one of the user and the storage controller based on the last session ID for performing write operation of data in the pluggable flash storage device.
5. The method as claimed in claim 1, wherein performing the write operation of data in the pluggable flash storage device comprising the steps of:
encrypting the data to be written in the pluggable flash storage device;
compressing the encrypted data into a compressed data; and
storing the compressed data in the predetermined memory location of the pluggable flash storage device.
6. The method as claimed in claim 1, further comprising:
upon receiving, from at least one of user or the storage controller, a request for reading of data from the pluggable flash storage device;
authenticating at least one of the user and the storage controller by comparing a read access key provided to at least one of user and the storage controller with a predetermined read access key;
upon authenticating, extracting the compressed data from the predefined memory location of the pluggable flash storage device;
decompressing the extracted compressed data to obtain an encrypted data;
decrypting the encrypted data to generate the decrypted data; and
performing read operation of the decrypted data from the pluggable flash storage device.
7. The method as claimed in claims 1, 4 and 6, wherein the predetermined write access key, the predetermined read access key, and last session ID are stored in predefined memory location of the storage controller.
8. A system for performing secure read/write operation in a pluggable flash storage device, the system comprising:
a user IO request queue for receiving one or more requests for at least one of reading and writing of data from at least one of user and a storage controller;
the pluggable flash storage device;
an IO engine coupled with the pluggable flash storage device;
the storage controller coupled with the user IO request queue and the IO engine, comprising:
at least a device authentication and data security (DADS) component configured to:
receive, from the user IO request queue, the one or more requests for writing data;
upon receiving the request, authenticate the pluggable flash storage device based on a predetermined signature of the pluggable flash storage device;
authenticate at least one of user and the storage controller by comparing a write access key provided to at least one of user and the storage controller with a predetermined write access key; and
perform write operation of data in the pluggable flash storage device upon authenticating the pluggable flash storage device and at least one of the user and the storage controller .
9. The system as claimed in claim 8, wherein the DADS component comprises at least a hash key generating and authenticating unit configured to generate the predetermined signature of the pluggable flash storage device by the steps of:
extracting information associated with the pluggable flash storage device, the information include at least physical serial number, model number, manufacturing identity number and name of manufacturer;
generating a pseudo number based on the extracted information and storing the generated pseudo number in the predefined memory location of the storage controller;
processing the pseudo number using hash function to generate a hashed value; and
encrypting the hashed value into the predetermined signature of the pluggable flash storage device.
10. The system as claimed in claim 8, wherein the hash key generating and authenticating unit is configured to authenticate the pluggable flash storage device by the steps of:
determining signature of the pluggable flash storage device stored in a predefined memory location of the pluggable flash storage device;
decrypting the determined signature into a hashed value;
generating a pseudo number based on the hashed value;
comparing the generated pseudo number of the pluggable flash storage device with a predetermined pseudo number stored in the predefined memory location of the storage controller; and
authenticating the pluggable flash storage device based on comparison.
11. The system as claimed in claim 8, wherein the DADS component further comprises a session and write control unit configured to:
determine a last session ID of a last session established between the authenticated pluggable flash storage device and at least one of the user and the storage controller;
upon determining the last session ID, perform write operation of unfinished data of the last session; and
create a new session between the authenticated pluggable flash storage device and at least one of the user and the storage controller based on the last session ID for performing write operation of data in the pluggable flash storage device.
12. The system as claimed in claim 8, wherein the DADS component further comprises a encryption and compression unit configured to perform the write operation of data in the pluggable flash storage device by the steps of:
encrypting the data to be written in the pluggable flash storage device;
compressing the encrypted data into a compressed data; and
storing the compressed data in the predetermined memory location of the pluggable flash storage device.
13. The system as claimed in claim 8, wherein the DADS component is further configured to:
receive, from at least one of user or the storage controller, a request for reading of data from the pluggable flash storage device;
authenticate at least one of the user and the storage controller by comparing a read access key provided to at least one of user and the storage controller with a predetermined read access key;
upon authenticating, extract the compressed data from the predefined memory location of the pluggable flash storage device;
decompress the extracted compressed data to obtain an encrypted data;
decrypt the encrypted data to generate the decrypted data; and
perform read operation of the decrypted data from the pluggable flash storage device.
14. The system as claimed in claim 8, further comprises a dedicated controller cache coupled with the storage controller, configured to store predetermined write access key, the predetermined read access key, the pseudo number and the last session ID are stored in predefined memory location of the storage controller.
15. A non-transitory computer readable medium including instructions stored thereon that when processed by at least one processor cause a system to perform acts of:
receiving, from at least one of user and a storage controller, one or more request for at least one of writing and reading of data in/from the pluggable flash storage device;
upon receiving the request for writing data, authenticating the pluggable flash storage device based on a predetermined signature of the pluggable flash storage device;
authenticating at least one of user and the storage controller by comparing a write access key provided to at least one of user and the storage controller with a predetermined write access key; and
performing write operation of data in the pluggable flash storage device upon authenticating the pluggable flash storage device and at least one of the user and the storage controller.

Dated this 5th day of February 2015
M.S. Devi
Of K&S Partners
Agent for the Applicant
,TagSPECI:FIELD OF THE DISCLOSURE
The present subject matter is related, in general to data security, and more particularly, but not exclusively to method and system for preforming secure read/write operation in a pluggable flash storage device.

Documents

Application Documents

# Name Date
1 582-CHE-2015 FORM-9 05-02-2015.pdf 2015-02-05
2 582-CHE-2015 FORM-18 05-02-2015.pdf 2015-02-05
3 582CHE2015_CertifiedCopyRequest.pdf ONLINE 2015-02-12
4 582-CHE-2015-Request For Certified Copy-Online(12-02-2015).pdf 2015-02-12
5 IP29885-spec.pdf 2015-03-12
6 IP29885-fig.pdf 2015-03-12
7 FORM 5-IP29885.pdf 2015-03-12
8 FORM 3-IP29885.pdf 2015-03-12
9 582CHE2015_CertifiedCopyRequest.pdf 2015-03-13
10 582-CHE-2015 POWER OF ATTORNEY 16-06-2015.pdf 2015-06-16
11 582-CHE-2015 FORM-1 16-06-2015.pdf 2015-06-16
12 582-CHE-2015 CORRESPONDENCE OTHERS 16-06-2015.pdf 2015-06-16
13 REQUEST FOR CERTIFIED COPY [16-09-2015(online)].pdf 2015-09-16
14 582-CHE-2015-FER.pdf 2018-12-19
15 582-CHE-2015-FER_SER_REPLY [19-06-2019(online)].pdf 2019-06-19
16 582-CHE-2015-Correspondence to notify the Controller [16-04-2021(online)].pdf 2021-04-16
17 582-CHE-2015-Written submissions and relevant documents [19-05-2021(online)].pdf 2021-05-19
18 582-CHE-2015-PatentCertificate09-07-2021.pdf 2021-07-09
19 582-CHE-2015-IntimationOfGrant09-07-2021.pdf 2021-07-09
20 582-CHE-2015-US(14)-HearingNotice-(HearingDate-07-05-2021).pdf 2021-10-17
21 582-CHE-2015-PROOF OF ALTERATION [05-02-2022(online)].pdf 2022-02-05
22 582-CHE-2015-RELEVANT DOCUMENTS [27-09-2022(online)].pdf 2022-09-27
23 582-CHE-2015-RELEVANT DOCUMENTS [20-09-2023(online)].pdf 2023-09-20

Search Strategy

1 search_31-10-2018.pdf

ERegister / Renewals

3rd: 06 Oct 2021

From 05/02/2017 - To 05/02/2018

4th: 06 Oct 2021

From 05/02/2018 - To 05/02/2019

5th: 06 Oct 2021

From 05/02/2019 - To 05/02/2020

6th: 06 Oct 2021

From 05/02/2020 - To 05/02/2021

7th: 06 Oct 2021

From 05/02/2021 - To 05/02/2022

8th: 05 Feb 2022

From 05/02/2022 - To 05/02/2023

9th: 01 Feb 2023

From 05/02/2023 - To 05/02/2024

10th: 31 Jan 2024

From 05/02/2024 - To 05/02/2025

11th: 05 Feb 2025

From 05/02/2025 - To 05/02/2026