System and method for in-place encryption

A technology of unencrypted and encrypted volumes, applied in the direction of internal/peripheral computer component protection, etc.

Active Publication Date: 2013-09-11
APPLE INC
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Consequently, many users realize the need to encrypt their storage, bu...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for in-place encryption
  • System and method for in-place encryption
  • System and method for in-place encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Various embodiments of the present disclosure are discussed in detail below. While specific implementations are discussed herein, it should be understood that this is done for illustration purposes only. A person skilled in the art will recognize that other components and configurations may be used without departing from the spirit and scope of the present disclosure.

[0019] This disclosure addresses a need in the art to streamline and simplify the user experience for enabling and disabling encryption. Disclosed herein are the concepts that can be used to practice the invention in figure 1 A brief introductory description of a basic general-purpose system or computing device in . The following will be a more detailed description about the method and approach of in-situ encryption. Various variations illustrated by the various embodiments will be discussed herein. This disclosure now goes to figure 1 .

[0020] refer to figure 1 , the exemplary system 100 includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for performing in-place encryption. A system configured to practice the method receives a request from a user to encrypt an unencrypted volume of a computing device and identifies, generates, and/or randomly selects a volume key. Then the system converts the unencrypted volume to an encryptable format divided into portions. The system then encrypts, based on the volume key, the encryptable volume, portion by portion, to enable the user to use the computing device while encrypting. The system can maintain an encryption progress status and display the encryption progress status. The system can monitor disk accesses to the encryptable volume, and, when the disk accesses exceed a first threshold, apply a back-off algorithm to stop encrypting until the disk accesses fall below a second threshold. Thus, the computing device can be used while the encryption occurs in the background.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to U.S. Patent Application Serial No. 12 / 985,190, filed January 5, 2011, entitled "SYSTEM AND METHOD FOR IN-PLACE ENCRYPTION," which is incorporated by reference in its entirety, including here. technical field [0003] The present disclosure relates to encrypted storage, and more particularly to in-place encryption of storage within a computer while a user continues to use the computer. Background technique [0004] As the capacity and popularity of storage devices increase, many users and organizations are naturally concerned with protecting the stored data. Some of the threats that users may want to protect their data from include identity theft, corporate espionage, invasion of privacy, hacking, and more. Data stored on storage devices is vulnerable to theft of physical storage devices and unauthorized access via network-based attacks. Enterprises are usually concerned with the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/78
CPCG06F21/78
Inventor D·S·霍恩小J·索科尔O·J·斯特恩王文广
Owner APPLE INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products