Information security – Access control or authentication – Stand-alone
Reexamination Certificate
2011-06-28
2011-06-28
Zand, Kambiz (Department: 2434)
Information security
Access control or authentication
Stand-alone
C726S002000, C726S004000, C726S018000, C726S026000, C713S164000, C713S193000, C713S182000, C380S028000, C380S279000
Reexamination Certificate
active
07971241
ABSTRACT:
A verifiable security mode is provided for securing data on a storage device, such as a hard disk drive. When the verifiable security mode is enabled, only authenticated accesses to data stored on the storage device are permitted after entering a password. An end user is prevented from disabling the verifiable security mode. The verifiable security mode can be set to allow or disallow an administrator from disabling the verifiable security mode. The verifiable security mode can be implemented, for example, in firmware on a hard disk drive (HDD).
REFERENCES:
patent: 5704039 (1997-12-01), Yishay et al.
patent: 6268789 (2001-07-01), Diamant et al.
patent: 6272221 (2001-08-01), Tsunoo
patent: 6738879 (2004-05-01), Chan et al.
patent: 7107455 (2006-09-01), Merkin
patent: 7111321 (2006-09-01), Watts et al.
patent: 7464219 (2008-12-01), Hinrichs et al.
patent: 2002/0099950 (2002-07-01), Smith
patent: 2002/0184527 (2002-12-01), Chun et al.
patent: 2004/0025027 (2004-02-01), Balard et al.
patent: 2004/0128163 (2004-07-01), Goodman et al.
patent: 2005/0157880 (2005-07-01), Kurn et al.
patent: 2005/0223154 (2005-10-01), Uemura
patent: 2006/0123259 (2006-06-01), Yokota et al.
patent: 2006/0139807 (2006-06-01), Shimotono et al.
patent: 2007/0118768 (2007-05-01), Wolford
patent: 2008/0052777 (2008-02-01), Kawano et al.
patent: 1527208 (2004-09-01), None
State Intellectual Property Office of the Peoples' Republic of China, “First Office Action Notification,” for patent application 2007101936184, pp. 1-7, Jan. 8, 2010 (original and English translation).
“Software That Drives e-Commerce, Alliance AES/400,” Patrick Townsend & Associates, Aug. 11, 2006, pp. 1-3.
Barrie VanBrackle and Paul Masto, “Identity Theft: Federal Law Enforcement & Legal Updates,” ETA Annual Meeting and Expo 2006, Apr. 19, 2006, pp. 1-15.
Harald Bogeholz , “At Your Disservice: How ATA security functions jeopardize your data,” Aug. 2005, pp. 1-7, http://www.heise.de/ct/english/05/08/172/.
Campello de Souza Jorge
Guyot Cyril
Kulkarni Anand Krishnamurthi
New Richard M. H.
Bayou Yonas
Cahill Steven J.
Hitachi Global Storage Technologies - Netherlands B.V.
Zand Kambiz
LandOfFree
Techniques for providing verifiable security in storage devices does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Techniques for providing verifiable security in storage devices, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Techniques for providing verifiable security in storage devices will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2684521