Techniques for providing verifiable security in storage devices

Information security – Access control or authentication – Stand-alone

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S004000, C726S018000, C726S026000, C713S164000, C713S193000, C713S182000, C380S028000, C380S279000

Reexamination Certificate

active

07971241

ABSTRACT:
A verifiable security mode is provided for securing data on a storage device, such as a hard disk drive. When the verifiable security mode is enabled, only authenticated accesses to data stored on the storage device are permitted after entering a password. An end user is prevented from disabling the verifiable security mode. The verifiable security mode can be set to allow or disallow an administrator from disabling the verifiable security mode. The verifiable security mode can be implemented, for example, in firmware on a hard disk drive (HDD).

REFERENCES:
patent: 5704039 (1997-12-01), Yishay et al.
patent: 6268789 (2001-07-01), Diamant et al.
patent: 6272221 (2001-08-01), Tsunoo
patent: 6738879 (2004-05-01), Chan et al.
patent: 7107455 (2006-09-01), Merkin
patent: 7111321 (2006-09-01), Watts et al.
patent: 7464219 (2008-12-01), Hinrichs et al.
patent: 2002/0099950 (2002-07-01), Smith
patent: 2002/0184527 (2002-12-01), Chun et al.
patent: 2004/0025027 (2004-02-01), Balard et al.
patent: 2004/0128163 (2004-07-01), Goodman et al.
patent: 2005/0157880 (2005-07-01), Kurn et al.
patent: 2005/0223154 (2005-10-01), Uemura
patent: 2006/0123259 (2006-06-01), Yokota et al.
patent: 2006/0139807 (2006-06-01), Shimotono et al.
patent: 2007/0118768 (2007-05-01), Wolford
patent: 2008/0052777 (2008-02-01), Kawano et al.
patent: 1527208 (2004-09-01), None
State Intellectual Property Office of the Peoples' Republic of China, “First Office Action Notification,” for patent application 2007101936184, pp. 1-7, Jan. 8, 2010 (original and English translation).
“Software That Drives e-Commerce, Alliance AES/400,” Patrick Townsend & Associates, Aug. 11, 2006, pp. 1-3.
Barrie VanBrackle and Paul Masto, “Identity Theft: Federal Law Enforcement & Legal Updates,” ETA Annual Meeting and Expo 2006, Apr. 19, 2006, pp. 1-15.
Harald Bogeholz , “At Your Disservice: How ATA security functions jeopardize your data,” Aug. 2005, pp. 1-7, http://www.heise.de/ct/english/05/08/172/.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Techniques for providing verifiable security in storage devices does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Techniques for providing verifiable security in storage devices, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Techniques for providing verifiable security in storage devices will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2684521

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.