US20080288782A1 - Method and Apparatus of Providing Security to an External Attachment Device - Google Patents
Method and Apparatus of Providing Security to an External Attachment Device Download PDFInfo
- Publication number
- US20080288782A1 US20080288782A1 US11/782,618 US78261807A US2008288782A1 US 20080288782 A1 US20080288782 A1 US 20080288782A1 US 78261807 A US78261807 A US 78261807A US 2008288782 A1 US2008288782 A1 US 2008288782A1
- Authority
- US
- United States
- Prior art keywords
- partition
- advanced technology
- technology attachment
- storage device
- serial advanced
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/10—Program control for peripheral devices
- G06F13/12—Program control for peripheral devices using hardware independent of the central processor, e.g. channel or peripheral processor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
Definitions
- the present disclosure relates generally to a system and method of providing security to an external Serial Advanced Technology Attachment device, and in particular to providing security to an external Serial Advanced Technology Attachment (eSATA) storage device.
- eSATA Serial Advanced Technology Attachment
- External storage devices may often be used to backup data on another storage device, for example, from data stored on an internal storage device of a desktop computer and/or a laptop computer.
- External storage devices are connected to a computing device via various types of ports, such as a USB port, an eSATA port, a FireWire port, etc. Further, external storage devices may frequently be hot-swappable, i.e. the external storage devices can be removed and connected to the computing device while it is powered on.
- external storage devices can also be used to transport data from one computing device to another, further facilitated by scaling of external devices and the need for portable digital data.
- One embodiment includes a method, which may be embodied on a system, of creating a first partition of an external Serial Advanced Technology Attachment storage device, presenting to a computing device, the first partition of the external Serial Advanced Technology Attachment storage device, as a Read Only Memory; restricting the computing device from accessing a secured second partition of the external Serial Advanced Technology Attachment storage device; and in response to receiving a valid identity authentication, unrestricting access to the second partition of the external Serial Advanced Technology Attachment storage device.
- an identity authentication process is initiated, wherein the process is stored on the first partition.
- a process stored on a disk controller receives an encryption key from the process stored on the first partition of the Serial Advanced Technology Attachment storage device, and the process stored on the disk controller uses the encryption key to decrypt the second partition of the Serial Advanced Technology Attachment storage device.
- the present disclosure includes methods and apparatuses which perform these methods, including processing systems which perform these methods, and computer readable media which when executed on processing systems cause the systems to perform these methods.
- FIG. 1A illustrates an external attachment that communicates with a computing device through a controller, according to one embodiment.
- FIG. 1B illustrates a SATA storage device that communicates with a computing device through an interface chip, via an eSATA port and a USB port of the computing device, according to one embodiment.
- FIG. 2A illustrates an example screenshot of an interface for identify verification via password submission, according to one embodiment.
- FIG. 2B illustrates another example screenshot of an interface for identity verification via password submission, according to one embodiment.
- FIG. 3A illustrates an example of an interface chip to communicate with a computing device via a plurality of ports of the computing device, according to one embodiment.
- FIG. 3B illustrates an example of a plurality of SATA storage devices coupled to an interface chip to communicate with the computing device of FIG. 3A , according to one embodiment.
- FIG. 4 is a flow chart illustrating a process to provide secured access to one or more SATA storage devices, according to one embodiment.
- FIG. 5 illustrates a block diagram of a machine-readable medium, according to one embodiment.
- Embodiments of the present disclosure include systems and methods of providing security to an external storage device.
- An external device can communicate with a computing device via one or more interface ports of a computing device.
- the interface ports can be one of many interfaces, such as, a USB interface, a FireWire (IEEE 1394) interface, and/or an eSATA interface, etc.
- External storage devices may additionally be connected to a disk controller to be coupled to one or more interface ports of the computing device.
- the type of disk controller depends on the interface of the external storage device.
- the disk controller can be a device separate from the motherboard or built into the motherboard.
- a SATA storage device can be connected to a controller to be coupled to an eSATA port of the computing device.
- the controller includes a software instance to present a SATA storage device coupled to the controller as multiple partitions to the computing device.
- the computing device may see the SATA storage device as multiple storage devices or multiple partitions.
- one of the partitions of the SATA storage device is presented to the computing device as a bootable CD-ROM (e.g., a disk image or .ISO file) to the operating system of the computing device, and a second partition of the SATA storage device is initially locked (e.g., secured or encrypted).
- the second partition of the SATA storage device may not be identified by the computing device while the second partition of the SATA storage device is locked.
- the CD-ROM partition of the SATA storage device includes an executable that can be automatically initiated.
- the executable includes a security application for identification purposes.
- the security application can initiate a logon procedure to a user such that a user's identity is verified, via submission of various identifiers including, RFID, passwords, and/or other biometrics identifiers such as finger prints, etc.
- the security application on the CD-ROM partition of the SATA storage device acknowledges the completion to the controller.
- the software instance on the controller unlocks (e.g., decrypts) the second partition of the SATA storage device.
- the second partition then becomes visible and accessible to the operating system and the computing device.
- the security application sends a security key (e.g., encryption key) to the software instance for unlocking (e.g., decrypting) the second partition of the SATA storage device.
- FIG. 1A illustrates a SATA storage device 118 that communicates with a computing device 102 through a controller 112 , according to one embodiment.
- the controller 112 interfaces with the computing device via an eSATA connection to utilize an interconnection of relatively longer length.
- the controller 112 can interface with the external SATA storage device using an eSATA connection or SATA based connections.
- the SATA storage device includes either an external SATA storage device (e.g., eSATA) or other SATA devices that support the transfer of data at 1.5 Gbps, 3 Gbps, or higher.
- the computing device 102 is a computing device able to be coupled to a SATA storage device (e.g., the SATA storage device 118 ).
- the computing device 102 may include a chipset to support the SATA interface protocol.
- the computing device may also have an external port that can be connected to a SATA storage device.
- the computing device can have a PCI based SATA controller mounted to the motherboard with an eSATA port accessible from a panel external to the chassis (e.g., a bracket connector).
- a SATA device can therefore connect to the computing device through the eSATA controller card via the externally accessible eSATA port.
- the computing device 102 can be a laptop computer (e.g., notebook or portable computer) that utilizes a PCMCIA based controller having eSATA interfacing capabilities.
- the eSATA interface protocol capability may be provided with a PCI-Express card.
- the computing device 102 can be any of a PDA, a laptop, a desktop computer, a telephone, a cellular phone, a portable device, and/or a server device, etc.
- the controller 112 is a chip associated with circuitry to control a storage device.
- the controller can be built-in to a motherboard or be included in a stand-alone device that is separate from the motherboard.
- the controller 112 can have one or more of many interfaces such as, an IDE (PATA) interface, an EIDE interface, a SCSI interface, a SATA interface, and/or an eSATA interface.
- the controller 112 can be coupled to the SATA storage device 118 .
- the controller 112 has an IDE/EIDE interface to be coupled to an IDE to eSATA converter, such that the controller is able to communicate with the SATA storage device.
- FIG. 1B illustrates a SATA storage device 118 that communicates with a computing device 102 through an interface chip 200 , via an eSATA port 104 and a USB port 106 of the computing device 102 , according to one embodiment.
- the computing device 102 can include multiple interface ports such as the USB port 106 and/or the eSATA port 104 .
- the eSATA and/or USB connectivity can either be built-in to the motherboard or added-on through an external PCI bracket (e.g., a host bus adaptor, or HBA) or card-based controllers.
- the computing device may also have additional ports other than USB ports or eSATA ports, such as FireWire (IEEE 1394) ports, that are not shown in the figure.
- the interface chip 200 is coupled to the eSATA port 104 , and the USB port 106 of the computing device.
- the USB port 106 of the computing device 102 can supply power to the interface chip 200 and/or the SATA storage device 118 connected to the interface chip, whereas the eSATA port 104 of the computing device can be used for data transmission to/from the SATA storage device 118 .
- the interface chip 200 includes a software instance 116 that is executable by a controller 112 of the interface chip 200 .
- the software instance 106 can present the SATA storage device 118 as multiple partitions 108 - 110 A-N to an operating system of the computing device.
- the operating system can be any of Windows, Mac OSX, Linux, Unix, MacroS, etc.
- one of the partitions 108 of the SATA storage device 118 is a virtual CD-ROM partition including a bootable .ISO file (e.g., CD image).
- the additional partitions 110 A-N may be secured, and remain so until completion of an authentication process.
- the secured partitions 110 A-N e.g., the partitions can be encrypted
- the bootable .ISO file in the first partition 108 of the storage device 118 can be launched in response to a request to logon to the computing device and/or a request to access the SATA storage device.
- the bootable .ISO file includes a security application to verify the identity of the user requesting system and/or storage device access.
- the security application presents an interface for password entry.
- one or more types of identity verification such as RFID, fingerprinting or other biometrics identifiers, passwords, voice recognition, etc., can be used.
- a command can be sent to the controller 112 indicating the user's identity has been verified.
- the command sent to the controller 112 may include a security key (e.g., an encryption/decryption key) for unlocking the one or more secured partitions 110 A-N of the SATA storage device.
- the software instance 106 unlocks the one or more secured partitions 110 A-N of the SATA storage device and presents the unsecured partitions 110 A-N to the operating system. The unsecured partitions 110 A-N of the SATA storage device can then be accessed by the user.
- FIG. 2A illustrates an example screenshot of an interface for identity verification via password submission, as provided by the security application, according to one embodiment.
- the interface is launched by the security application stored in the first partition of the SATA storage device.
- the interface prompts the user to provide a password in the password field.
- the password can be entered via the on-screen keyboard as displayed.
- the password can be entered via a physical keyboard.
- the password can be used to verify the user's identity prior to unlocking one or more secured partitions of the SATA storage device to be accessed by the user.
- identifiers such as an RFID, voice identifiers, biometric identifiers such as fingerprints can be used to verify the user's identity.
- FIG. 2B illustrates another example screenshot of an interface for identity verification via password submission, according to one embodiment.
- the interface includes an additional field for entering a second code in addition to the password.
- the second code may be displayed on the interface in a non-machine readable format (e.g., a scrambled bitmap) to be read by the user and entered into the ‘bitmap window’ field.
- FIG. 3A illustrates an example of an interface chip to communicate with a computing device via a plurality of ports of the computing device, according to one embodiment.
- the computing device 302 can include multiple interface ports such as USB ports 306 A-N and/or eSATA ports 304 A-N.
- the computing device may also have ports other than USB ports and/or eSATA ports, such as FireWire ports that are not shown in the figure.
- the interface chip 300 includes the controller 312 .
- the interface chip 300 may further include an eSATA interface 308 , a converter 310 , and/or an USB interface 320 .
- the eSATA interface 308 and the converter 310 as illustrated in 304 are shown to be internal to the chip interface 300 , in some embodiments, the eSATA interface 308 and the converter 310 , are external to the interface chip 300 .
- the eSATA interface 308 is external to the interface chip 300 and the converter 310 is internal to the interface chip 300 .
- the USB interface 320 can be external or internal to the interface chip 300 .
- the controller 312 is coupled to at least one eSATA port 304 , and at least one USB port 306 via an eSATA interface 308 and a USB interface 320 , respectively.
- the USB interface 320 can supply power to the controller 312 from one or more USB ports 306 of the computing device.
- multiple USB ports 306 can be utilized, depending on the power requirements of the controller 312 and/or the SATA devices (e.g., storage devices) coupled to the controller.
- the number of USB ports utilized to power the SATA devices can depend on one or more of the following metrics, such as the number of active SATA devices (e.g., SATA storage devices), power supply/consumption of the computing device, and/or the data rate of the eSATA interface port (e.g., 1.5 Gbps, 3.0 Gbps, or 6.0 Gbps).
- FIG. 3B illustrates an example of a plurality of SATA storage devices coupled to an interface chip to communicate with the computing device of FIG. 3A , according to one embodiment.
- the interface chip 300 is connected to one or more SATA storage devices 318 A-N.
- the USB interface 320 is to provide a pathway through which the computing device can supply power to the one or more SATA storage devices coupled to the interface chip 300 via the one or more USB ports 306 A-N.
- the USB interface 320 can be internal or external to the controller 312 .
- the converters 310 and 314 illustrated in 322 in FIGS. 3A-3B may be provided to translate signals transmitted between the controller and the SATA protocol (e.g., either between the controller and the eSATA port 304 of the computing device or between the controller and the SATA device 318 ).
- the conversion is needed for the embodiment of the controller being compatible with an interface standard other than the SATA protocol.
- the controller 312 can be a controller that is compatible with the IDE (or PATA) protocol.
- the converters 310 and 314 translate the data entering and leaving the IDE controller.
- the controller 312 is a SATA controller.
- the converters 310 and 314 need not be present for coupling data between the controller and the eSATA port and the SATA devices, respectively.
- the eSATA interface 308 can be internal or external to the controller.
- FIG. 4 is a flow chart describing a process to provide secured access to one or more SATA storage devices, according to one embodiment.
- a partition of a SATA storage device is presented to the computing device as a bootable CD-ROM.
- the bootable CD-ROM partition includes a .ISO file (e.g., disk image) having a security application to verify a user's identity.
- the computing device is restricted from accessing a second secured partition of the SATA storage device.
- the second partition can be a data drive to be used and accessed by the operating system and/or the user.
- multiple secured partitions can be provided within the SATA storage device.
- data stored in the second partition of the SATA storage device is encrypted via an encryption algorithm by a software instance stored on the controller (e.g., disk controller).
- a software instance stored on the controller e.g., disk controller.
- Various encryption algorithms e.g., 3DES, Blowfish, DES-X, and/or AES, etc.
- the encryption key is stored on the first partition of the SATA storage device.
- the encryption key is stored on the software instance of the controller.
- an identity authentication process is launched in response to receiving a request to logon to the computing device, or when the computing device attempts to access data from the SATA storage device.
- the identity authentication process can be initiated by the security application, stored in the first partition of the SATA storage device.
- the identity authentication process prompts the user to submit one or more valid identifiers for identity verification, such as an RFID, a password, and/or a biometric identifier such as a fingerprint.
- the secured second partition of the SATA storage device is unsecured (e.g., decrypted) and the computing device is given access to the data stored in the second partition.
- the second partition is unsecured by the software instance on the controller.
- the security application stored on the first partition of the SATA drive performs the identity verification, and in one embodiment, sends a command to the software instance indicating that the user's identity has been verified.
- the command may additionally include the encryption key for unlocking one or more secured partitions of the SATA storage device.
- FIG. 5 shows a diagrammatic representation of a machine in the exemplary form of a computer system 500 within which a set of instructions, for causing the machine to perform any one or more of the methodologies discussed herein, may be executed.
- the machine operates as a standalone device or may be connected (e.g., networked) to other machines.
- the machine may operate in the capacity of a server or a client machine in a client-server network environment, or as a peer machine in a peer-to-peer (or distributed) network environment.
- the machine may be a server computer, a client computer, a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a cellular telephone, a web appliance, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
- PC personal computer
- PDA personal digital assistant
- machine-readable medium is shown in an exemplary embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions.
- the term “machine-readable medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present invention.
- routines executed to implement the embodiments of the disclosure may be implemented as part of an operating system or a specific application, component, program, object, module or sequence of instructions referred to as “computer programs.”
- the computer programs typically comprise one or more instructions set at various times in various memory and storage devices in a computer, and that, when read and executed by one or more processors in a computer, cause the computer to perform operations to execute elements involving the various aspects of the disclosure.
- computer-readable media include, but are not limited to, recordable type media such as volatile and non-volatile memory devices, floppy and other removable disks, hard disk drives, optical disks (e.g., Compact Disk Read-Only Memory (CD ROMS), Digital Versatile Disks, (DVDs), etc.), among others, and transmission type media such as digital and analog communication links.
- recordable type media such as volatile and non-volatile memory devices, floppy and other removable disks, hard disk drives, optical disks (e.g., Compact Disk Read-Only Memory (CD ROMS), Digital Versatile Disks, (DVDs), etc.
- CD ROMS Compact Disk Read-Only Memory
- DVDs Digital Versatile Disks
- transmission type media such as digital and analog communication links.
Abstract
Description
- The present application claims priority to U.S. Provisional Patent Application Ser. No. 60/939,030 entitled “Device, System, and Method for Further Enhanced Operation of an eSATA Device with a Computing Device,” which was filed on May 18, 2007, the contents of which are expressly incorporated herein by reference. In addition, the present application is related to a copending U.S. Patent Application entitled “Method and Apparatus of Providing Power to an External Attachment Device via a Computing Device,” which was filed on Jul. 24, 2007, with the same assignee as the present disclosure. The disclosure of the above-identified copending application is incorporated in its entirety herein by reference.
- The present disclosure relates generally to a system and method of providing security to an external Serial Advanced Technology Attachment device, and in particular to providing security to an external Serial Advanced Technology Attachment (eSATA) storage device.
- External storage devices may often be used to backup data on another storage device, for example, from data stored on an internal storage device of a desktop computer and/or a laptop computer. External storage devices are connected to a computing device via various types of ports, such as a USB port, an eSATA port, a FireWire port, etc. Further, external storage devices may frequently be hot-swappable, i.e. the external storage devices can be removed and connected to the computing device while it is powered on.
- Thus, in addition to backing up data, external storage devices can also be used to transport data from one computing device to another, further facilitated by scaling of external devices and the need for portable digital data.
- However, the ease with which portable devices such as notebooks, portable storage devices, etc. are lost has become a threat to data security and personal privacy. Loss of portable storage devices may have detrimental consequences due to, for example, loss of privacy of personal and/or medical information, financial loss, and identity theft.
- Systems and methods of providing security to an external Serial Advanced Technology Attachment (eSATA) device are described herein. Some embodiments of the present disclosure are summarized in this section.
- One embodiment includes a method, which may be embodied on a system, of creating a first partition of an external Serial Advanced Technology Attachment storage device, presenting to a computing device, the first partition of the external Serial Advanced Technology Attachment storage device, as a Read Only Memory; restricting the computing device from accessing a secured second partition of the external Serial Advanced Technology Attachment storage device; and in response to receiving a valid identity authentication, unrestricting access to the second partition of the external Serial Advanced Technology Attachment storage device.
- In one embodiment, in response to receiving a logon request from the computing device, an identity authentication process is initiated, wherein the process is stored on the first partition. Furthermore, in one embodiment, a process stored on a disk controller receives an encryption key from the process stored on the first partition of the Serial Advanced Technology Attachment storage device, and the process stored on the disk controller uses the encryption key to decrypt the second partition of the Serial Advanced Technology Attachment storage device.
- The present disclosure includes methods and apparatuses which perform these methods, including processing systems which perform these methods, and computer readable media which when executed on processing systems cause the systems to perform these methods.
- Other features of the present invention will be apparent from the accompanying drawings and from the detailed description which follows.
- The disclosure is illustrated by way of example and not limitation in the figures of the accompanying drawings in which like references indicate similar elements.
-
FIG. 1A illustrates an external attachment that communicates with a computing device through a controller, according to one embodiment. -
FIG. 1B illustrates a SATA storage device that communicates with a computing device through an interface chip, via an eSATA port and a USB port of the computing device, according to one embodiment. -
FIG. 2A illustrates an example screenshot of an interface for identify verification via password submission, according to one embodiment. -
FIG. 2B illustrates another example screenshot of an interface for identity verification via password submission, according to one embodiment. -
FIG. 3A illustrates an example of an interface chip to communicate with a computing device via a plurality of ports of the computing device, according to one embodiment. -
FIG. 3B illustrates an example of a plurality of SATA storage devices coupled to an interface chip to communicate with the computing device ofFIG. 3A , according to one embodiment. -
FIG. 4 is a flow chart illustrating a process to provide secured access to one or more SATA storage devices, according to one embodiment. -
FIG. 5 illustrates a block diagram of a machine-readable medium, according to one embodiment. - The following description and drawings are illustrative and are not to be construed as limiting. Numerous specific details are described to provide a thorough understanding of the disclosure. However, in certain instances, well-known or conventional details are not described in order to avoid obscuring the description.
- Reference in this specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the disclosure. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Moreover, various features are described which may be exhibited by some embodiments and not by others. Similarly, various requirements are described which may be requirements for some embodiments but not other embodiments.
- Embodiments of the present disclosure include systems and methods of providing security to an external storage device.
- An external device can communicate with a computing device via one or more interface ports of a computing device. The interface ports can be one of many interfaces, such as, a USB interface, a FireWire (IEEE 1394) interface, and/or an eSATA interface, etc. External storage devices may additionally be connected to a disk controller to be coupled to one or more interface ports of the computing device. The type of disk controller depends on the interface of the external storage device. The disk controller can be a device separate from the motherboard or built into the motherboard.
- For example, a SATA storage device can be connected to a controller to be coupled to an eSATA port of the computing device. In one embodiment, the controller includes a software instance to present a SATA storage device coupled to the controller as multiple partitions to the computing device. Thus, the computing device may see the SATA storage device as multiple storage devices or multiple partitions.
- In one embodiment, one of the partitions of the SATA storage device is presented to the computing device as a bootable CD-ROM (e.g., a disk image or .ISO file) to the operating system of the computing device, and a second partition of the SATA storage device is initially locked (e.g., secured or encrypted). The second partition of the SATA storage device may not be identified by the computing device while the second partition of the SATA storage device is locked.
- When a request to logon to the computing device or to access the SATA storage device is received, the CD-ROM partition of the SATA storage device includes an executable that can be automatically initiated. In one embodiment, the executable includes a security application for identification purposes. For example, the security application can initiate a logon procedure to a user such that a user's identity is verified, via submission of various identifiers including, RFID, passwords, and/or other biometrics identifiers such as finger prints, etc.
- Once the identification procedure has been completed, the security application on the CD-ROM partition of the SATA storage device acknowledges the completion to the controller. Thus, in one embodiment, the software instance on the controller unlocks (e.g., decrypts) the second partition of the SATA storage device. The second partition then becomes visible and accessible to the operating system and the computing device. In some instances, the security application sends a security key (e.g., encryption key) to the software instance for unlocking (e.g., decrypting) the second partition of the SATA storage device.
-
FIG. 1A illustrates aSATA storage device 118 that communicates with acomputing device 102 through acontroller 112, according to one embodiment. In one embodiment, thecontroller 112 interfaces with the computing device via an eSATA connection to utilize an interconnection of relatively longer length. Thecontroller 112 can interface with the external SATA storage device using an eSATA connection or SATA based connections. Furthermore, the SATA storage device, as described and illustrated herein, includes either an external SATA storage device (e.g., eSATA) or other SATA devices that support the transfer of data at 1.5 Gbps, 3 Gbps, or higher. - In one embodiment, the
computing device 102 is a computing device able to be coupled to a SATA storage device (e.g., the SATA storage device 118). For example, thecomputing device 102 may include a chipset to support the SATA interface protocol. The computing device may also have an external port that can be connected to a SATA storage device. - Alternatively, the computing device can have a PCI based SATA controller mounted to the motherboard with an eSATA port accessible from a panel external to the chassis (e.g., a bracket connector). A SATA device can therefore connect to the computing device through the eSATA controller card via the externally accessible eSATA port.
- The
computing device 102 can be a laptop computer (e.g., notebook or portable computer) that utilizes a PCMCIA based controller having eSATA interfacing capabilities. In some instances, the eSATA interface protocol capability may be provided with a PCI-Express card. Thecomputing device 102 can be any of a PDA, a laptop, a desktop computer, a telephone, a cellular phone, a portable device, and/or a server device, etc. - The
controller 112 is a chip associated with circuitry to control a storage device. The controller can be built-in to a motherboard or be included in a stand-alone device that is separate from the motherboard. In general, thecontroller 112 can have one or more of many interfaces such as, an IDE (PATA) interface, an EIDE interface, a SCSI interface, a SATA interface, and/or an eSATA interface. For example, thecontroller 112 can be coupled to theSATA storage device 118. In one embodiment, thecontroller 112 has an IDE/EIDE interface to be coupled to an IDE to eSATA converter, such that the controller is able to communicate with the SATA storage device. -
FIG. 1B illustrates aSATA storage device 118 that communicates with acomputing device 102 through aninterface chip 200, via aneSATA port 104 and a USB port 106 of thecomputing device 102, according to one embodiment. - The
computing device 102 can include multiple interface ports such as the USB port 106 and/or theeSATA port 104. The eSATA and/or USB connectivity can either be built-in to the motherboard or added-on through an external PCI bracket (e.g., a host bus adaptor, or HBA) or card-based controllers. The computing device may also have additional ports other than USB ports or eSATA ports, such as FireWire (IEEE 1394) ports, that are not shown in the figure. - In one embodiment, the
interface chip 200 is coupled to theeSATA port 104, and the USB port 106 of the computing device. The USB port 106 of thecomputing device 102 can supply power to theinterface chip 200 and/or theSATA storage device 118 connected to the interface chip, whereas theeSATA port 104 of the computing device can be used for data transmission to/from theSATA storage device 118. - In one embodiment, the
interface chip 200 includes asoftware instance 116 that is executable by acontroller 112 of theinterface chip 200. The software instance 106 can present theSATA storage device 118 as multiple partitions 108-110A-N to an operating system of the computing device. The operating system can be any of Windows, Mac OSX, Linux, Unix, MacroS, etc. - In one embodiment, one of the partitions 108 of the
SATA storage device 118 is a virtual CD-ROM partition including a bootable .ISO file (e.g., CD image). Theadditional partitions 110A-N may be secured, and remain so until completion of an authentication process. In one embodiment, thesecured partitions 110A-N (e.g., the partitions can be encrypted) are not visible to the operating system of the computing device, and become operable for data access and storage only when unlocked (e.g., decrypted). - The bootable .ISO file in the first partition 108 of the
storage device 118 can be launched in response to a request to logon to the computing device and/or a request to access the SATA storage device. In one embodiment, the bootable .ISO file includes a security application to verify the identity of the user requesting system and/or storage device access. In one embodiment, the security application presents an interface for password entry. In other embodiments, one or more types of identity verification such as RFID, fingerprinting or other biometrics identifiers, passwords, voice recognition, etc., can be used. - Once the security application has verified the user's identity, a command can be sent to the
controller 112 indicating the user's identity has been verified. In one embodiment, the command sent to thecontroller 112 may include a security key (e.g., an encryption/decryption key) for unlocking the one or moresecured partitions 110A-N of the SATA storage device. In one embodiment, the software instance 106 unlocks the one or moresecured partitions 110A-N of the SATA storage device and presents theunsecured partitions 110A-N to the operating system. Theunsecured partitions 110A-N of the SATA storage device can then be accessed by the user. -
FIG. 2A illustrates an example screenshot of an interface for identity verification via password submission, as provided by the security application, according to one embodiment. - The interface is launched by the security application stored in the first partition of the SATA storage device. In one embodiment, the interface prompts the user to provide a password in the password field. The password can be entered via the on-screen keyboard as displayed. In one embodiment, the password can be entered via a physical keyboard. The password can be used to verify the user's identity prior to unlocking one or more secured partitions of the SATA storage device to be accessed by the user. In other embodiments, identifiers such as an RFID, voice identifiers, biometric identifiers such as fingerprints can be used to verify the user's identity.
-
FIG. 2B illustrates another example screenshot of an interface for identity verification via password submission, according to one embodiment. - In one embodiment, the interface includes an additional field for entering a second code in addition to the password. The second code may be displayed on the interface in a non-machine readable format (e.g., a scrambled bitmap) to be read by the user and entered into the ‘bitmap window’ field.
-
FIG. 3A illustrates an example of an interface chip to communicate with a computing device via a plurality of ports of the computing device, according to one embodiment. Thecomputing device 302 can include multiple interface ports such asUSB ports 306A-N and/oreSATA ports 304A-N. The computing device may also have ports other than USB ports and/or eSATA ports, such as FireWire ports that are not shown in the figure. - In one embodiment, the
interface chip 300 includes thecontroller 312. Theinterface chip 300 may further include aneSATA interface 308, aconverter 310, and/or an USB interface 320. Even though theeSATA interface 308 and theconverter 310 as illustrated in 304, are shown to be internal to thechip interface 300, in some embodiments, theeSATA interface 308 and theconverter 310, are external to theinterface chip 300. Alternatively, in some embodiments, theeSATA interface 308 is external to theinterface chip 300 and theconverter 310 is internal to theinterface chip 300. Similarly, the USB interface 320 can be external or internal to theinterface chip 300. - In one embodiment, the
controller 312 is coupled to at least one eSATA port 304, and at least one USB port 306 via aneSATA interface 308 and a USB interface 320, respectively. The USB interface 320 can supply power to thecontroller 312 from one or more USB ports 306 of the computing device. - In some embodiments, multiple USB ports 306 can be utilized, depending on the power requirements of the
controller 312 and/or the SATA devices (e.g., storage devices) coupled to the controller. The number of USB ports utilized to power the SATA devices can depend on one or more of the following metrics, such as the number of active SATA devices (e.g., SATA storage devices), power supply/consumption of the computing device, and/or the data rate of the eSATA interface port (e.g., 1.5 Gbps, 3.0 Gbps, or 6.0 Gbps). -
FIG. 3B illustrates an example of a plurality of SATA storage devices coupled to an interface chip to communicate with the computing device ofFIG. 3A , according to one embodiment. In one embodiment, theinterface chip 300 is connected to one or more SATA storage devices 318A-N. In one embodiment, the USB interface 320 is to provide a pathway through which the computing device can supply power to the one or more SATA storage devices coupled to theinterface chip 300 via the one ormore USB ports 306A-N. The USB interface 320 can be internal or external to thecontroller 312. - The
converters FIGS. 3A-3B may be provided to translate signals transmitted between the controller and the SATA protocol (e.g., either between the controller and the eSATA port 304 of the computing device or between the controller and the SATA device 318). The conversion is needed for the embodiment of the controller being compatible with an interface standard other than the SATA protocol. For example, thecontroller 312 can be a controller that is compatible with the IDE (or PATA) protocol. Thus, theconverters - In one embodiment, the
controller 312 is a SATA controller. Thus, theconverters eSATA interface 308 can be internal or external to the controller. -
FIG. 4 is a flow chart describing a process to provide secured access to one or more SATA storage devices, according to one embodiment. - In
process 402, a partition of a SATA storage device is presented to the computing device as a bootable CD-ROM. In one embodiment, the bootable CD-ROM partition includes a .ISO file (e.g., disk image) having a security application to verify a user's identity. - In
process 404, the computing device is restricted from accessing a second secured partition of the SATA storage device. When unrestricted, the second partition can be a data drive to be used and accessed by the operating system and/or the user. In some embodiments, multiple secured partitions can be provided within the SATA storage device. - In one embodiment, data stored in the second partition of the SATA storage device is encrypted via an encryption algorithm by a software instance stored on the controller (e.g., disk controller). Various encryption algorithms (e.g., 3DES, Blowfish, DES-X, and/or AES, etc.) may be used. In one embodiment, the encryption key is stored on the first partition of the SATA storage device. In other embodiments, the encryption key is stored on the software instance of the controller.
- In
process 406, an identity authentication process is launched in response to receiving a request to logon to the computing device, or when the computing device attempts to access data from the SATA storage device. The identity authentication process can be initiated by the security application, stored in the first partition of the SATA storage device. In process 408, the identity authentication process prompts the user to submit one or more valid identifiers for identity verification, such as an RFID, a password, and/or a biometric identifier such as a fingerprint. - In response to receiving the valid identity authentication, in
process 410, the secured second partition of the SATA storage device is unsecured (e.g., decrypted) and the computing device is given access to the data stored in the second partition. In one embodiment, the second partition is unsecured by the software instance on the controller. The security application stored on the first partition of the SATA drive performs the identity verification, and in one embodiment, sends a command to the software instance indicating that the user's identity has been verified. The command may additionally include the encryption key for unlocking one or more secured partitions of the SATA storage device. -
FIG. 5 shows a diagrammatic representation of a machine in the exemplary form of acomputer system 500 within which a set of instructions, for causing the machine to perform any one or more of the methodologies discussed herein, may be executed. In alternative embodiments, the machine operates as a standalone device or may be connected (e.g., networked) to other machines. In a networked deployment, the machine may operate in the capacity of a server or a client machine in a client-server network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. The machine may be a server computer, a client computer, a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a cellular telephone, a web appliance, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. - While the machine-readable medium is shown in an exemplary embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “machine-readable medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present invention. In general, the routines executed to implement the embodiments of the disclosure, may be implemented as part of an operating system or a specific application, component, program, object, module or sequence of instructions referred to as “computer programs.” The computer programs typically comprise one or more instructions set at various times in various memory and storage devices in a computer, and that, when read and executed by one or more processors in a computer, cause the computer to perform operations to execute elements involving the various aspects of the disclosure.
- Moreover, while embodiments have been described in the context of fully functioning computers and computer systems, those skilled in the art will appreciate that the various embodiments are capable of being distributed as a program product in a variety of forms, and that the disclosure applies equally regardless of the particular type of machine or computer-readable media used to actually effect the distribution. Examples of computer-readable media include, but are not limited to, recordable type media such as volatile and non-volatile memory devices, floppy and other removable disks, hard disk drives, optical disks (e.g., Compact Disk Read-Only Memory (CD ROMS), Digital Versatile Disks, (DVDs), etc.), among others, and transmission type media such as digital and analog communication links.
- Although embodiments have been described with reference to specific exemplary embodiments, it will be evident that various modifications and changes can be made to these embodiments without departing from the broader spirit and scope as set forth in the following claims. Accordingly, the specification and drawings are to be regarded in an illustrative sense rather than in a restrictive sense.
Claims (20)
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/782,618 US20080288782A1 (en) | 2007-05-18 | 2007-07-24 | Method and Apparatus of Providing Security to an External Attachment Device |
TW097116971A TW200846970A (en) | 2007-05-18 | 2008-05-08 | System and method of providing security to an external device |
EP08251638A EP1993058A1 (en) | 2007-05-18 | 2008-05-08 | System and method of providing security to an external device |
PCT/US2008/063428 WO2008144280A1 (en) | 2007-05-18 | 2008-05-12 | System and method of providing security to an external attachment device |
JP2008129912A JP2009076045A (en) | 2007-05-18 | 2008-05-16 | System and method of providing security to external device |
KR1020080045744A KR20080101799A (en) | 2007-05-18 | 2008-05-16 | System and method of providing security to an external device |
US12/893,232 US8230207B2 (en) | 2007-01-30 | 2010-09-29 | System and method of providing security to an external attachment device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US93903007P | 2007-05-18 | 2007-05-18 | |
US11/782,618 US20080288782A1 (en) | 2007-05-18 | 2007-07-24 | Method and Apparatus of Providing Security to an External Attachment Device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/669,092 Continuation-In-Part US20080181406A1 (en) | 2007-01-30 | 2007-01-30 | System and Method of Storage Device Data Encryption and Data Access Via a Hardware Key |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/893,232 Continuation US8230207B2 (en) | 2007-01-30 | 2010-09-29 | System and method of providing security to an external attachment device |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080288782A1 true US20080288782A1 (en) | 2008-11-20 |
Family
ID=39620205
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/782,618 Abandoned US20080288782A1 (en) | 2007-01-30 | 2007-07-24 | Method and Apparatus of Providing Security to an External Attachment Device |
US12/893,232 Expired - Fee Related US8230207B2 (en) | 2007-01-30 | 2010-09-29 | System and method of providing security to an external attachment device |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/893,232 Expired - Fee Related US8230207B2 (en) | 2007-01-30 | 2010-09-29 | System and method of providing security to an external attachment device |
Country Status (6)
Country | Link |
---|---|
US (2) | US20080288782A1 (en) |
EP (1) | EP1993058A1 (en) |
JP (1) | JP2009076045A (en) |
KR (1) | KR20080101799A (en) |
TW (1) | TW200846970A (en) |
WO (1) | WO2008144280A1 (en) |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030172295A1 (en) * | 2002-03-01 | 2003-09-11 | Onspec Electronics, Inc. | Device and system for allowing secure identification of an individual when accessing information and a method of use |
US20070162626A1 (en) * | 2005-11-02 | 2007-07-12 | Iyer Sree M | System and method for enhancing external storage |
US20070300006A1 (en) * | 2006-06-23 | 2007-12-27 | Genesys Logic, Inc. | Multi-interface conversion device |
US20080114994A1 (en) * | 2006-11-14 | 2008-05-15 | Sree Mambakkam Iyer | Method and system to provide security implementation for storage devices |
US20080181406A1 (en) * | 2007-01-30 | 2008-07-31 | Technology Properties Limited | System and Method of Storage Device Data Encryption and Data Access Via a Hardware Key |
US20080181551A1 (en) * | 2007-01-29 | 2008-07-31 | Shih-Yuan Wang | Nanowire-based modulators |
US20080184035A1 (en) * | 2007-01-30 | 2008-07-31 | Technology Properties Limited | System and Method of Storage Device Data Encryption and Data Access |
US20080288703A1 (en) * | 2007-05-18 | 2008-11-20 | Technology Properties Limited | Method and Apparatus of Providing Power to an External Attachment Device via a Computing Device |
US20090046858A1 (en) * | 2007-03-21 | 2009-02-19 | Technology Properties Limited | System and Method of Data Encryption and Data Access of a Set of Storage Devices via a Hardware Key |
US20090113128A1 (en) * | 2007-10-24 | 2009-04-30 | Sumwintek Corp. | Method and system for preventing virus infections via the use of a removable storage device |
US20090132556A1 (en) * | 2007-11-16 | 2009-05-21 | Nitin Gupta | Offline operations for online applications |
US20090210603A1 (en) * | 2008-02-19 | 2009-08-20 | Chao-Nan Chen | Flash memory circuit with combinational interface |
US20100169590A1 (en) * | 2008-12-31 | 2010-07-01 | Clint Gordon-Carroll | Providing backups using a portable storage device |
US20100169668A1 (en) * | 2008-12-31 | 2010-07-01 | Clint Gordon-Carroll | Obtaining backups using a portable storage device |
WO2010077353A1 (en) * | 2008-12-31 | 2010-07-08 | Emc Corporation | Obtaining backups using a portable storage device |
US20100174835A1 (en) * | 2009-01-08 | 2010-07-08 | Chen-Yao Chung | Signal Converter for an All-In-One USB Connector |
US20100250799A1 (en) * | 2009-03-24 | 2010-09-30 | Kabushiki Kaisha Toshiba | Information processing apparatus and power supply controlling method |
US20110081015A1 (en) * | 2009-10-06 | 2011-04-07 | Parker Jeffrey C | Encryption System And Method |
US20110154023A1 (en) * | 2009-12-21 | 2011-06-23 | Smith Ned M | Protected device management |
US20110202715A1 (en) * | 2010-02-12 | 2011-08-18 | Phison Electronics Corp. | Management-partitionable storage system, use method and management method thereof, and controller thereof |
US20110235086A1 (en) * | 2010-03-24 | 2011-09-29 | Oki Data Corporation | Image forming apparatus and image output apparatus |
US20110307642A1 (en) * | 2008-03-13 | 2011-12-15 | Canon Kabushiki Kaisha | Data processing device |
US20110314094A1 (en) * | 2009-02-27 | 2011-12-22 | Manuel Fernando De Oliveira Antunes | School content management and filling system and methodology |
US20120017271A1 (en) * | 2010-07-14 | 2012-01-19 | Smith Ned M | Domain-authenticated control of platform resources |
US9336357B2 (en) | 2012-09-28 | 2016-05-10 | Intel Corporation | Secure access management of devices |
US9411975B2 (en) | 2014-03-31 | 2016-08-09 | Intel Corporation | Methods and apparatus to securely share data |
US20160350132A1 (en) * | 2015-06-01 | 2016-12-01 | Dell Products, L.P. | Systems and methods for exporting diagnostic data and securing privileges in a service operating system |
US20170061145A1 (en) * | 2015-08-28 | 2017-03-02 | Dell Products L.P. | System and method to redirect and unlock software secure disk devices in a high latency environment |
US20170063832A1 (en) * | 2015-08-28 | 2017-03-02 | Dell Products L.P. | System and method to redirect hardware secure usb storage devices in high latency vdi environments |
US9705869B2 (en) | 2013-06-27 | 2017-07-11 | Intel Corporation | Continuous multi-factor authentication |
US9858442B1 (en) | 2013-03-29 | 2018-01-02 | Secturion Systems, Inc. | Multi-tenancy architecture |
US10013580B2 (en) | 2013-03-29 | 2018-07-03 | Secturion Systems, Inc. | Security device with programmable systolic-matrix cryptographic module and programmable input/output interface |
US10073964B2 (en) | 2015-09-25 | 2018-09-11 | Intel Corporation | Secure authentication protocol systems and methods |
US10114766B2 (en) | 2013-04-01 | 2018-10-30 | Secturion Systems, Inc. | Multi-level independent security architecture |
US10708236B2 (en) | 2015-10-26 | 2020-07-07 | Secturion Systems, Inc. | Multi-independent level secure (MILS) storage encryption |
US11063914B1 (en) | 2013-03-29 | 2021-07-13 | Secturion Systems, Inc. | Secure end-to-end communication system |
US11283774B2 (en) | 2015-09-17 | 2022-03-22 | Secturion Systems, Inc. | Cloud storage using encryption gateway with certificate authority identification |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8868920B2 (en) | 2009-07-12 | 2014-10-21 | Hewlett-Packard Development Company, L.P. | Method, system and device for securing a digital storage device |
JP5565040B2 (en) | 2010-03-30 | 2014-08-06 | 富士通株式会社 | Storage device, data processing device, registration method, and computer program |
US8331084B2 (en) | 2010-05-13 | 2012-12-11 | General Electric Company | Apparatus for securing electronic equipment |
US8646054B1 (en) * | 2012-03-23 | 2014-02-04 | Western Digital Technologies, Inc. | Mechanism to manage access to user data area with bridged direct-attached storage devices |
JP6265783B2 (en) * | 2014-03-06 | 2018-01-24 | キヤノン株式会社 | Encryption / decryption system, control method therefor, and program |
KR102263880B1 (en) | 2014-06-19 | 2021-06-11 | 삼성전자주식회사 | Host controller and system-on-chip |
US10855465B2 (en) * | 2016-11-10 | 2020-12-01 | Ernest Brickell | Audited use of a cryptographic key |
CN109033848B (en) * | 2018-06-25 | 2020-09-25 | 湖南国科微电子股份有限公司 | Method and system for safely operating stored data |
JP7187362B2 (en) * | 2019-03-15 | 2022-12-12 | キオクシア株式会社 | Storage device and control method |
KR20210090505A (en) | 2020-01-10 | 2021-07-20 | 삼성전자주식회사 | Memory controller, storage device including the same |
CN113505402B (en) * | 2021-09-09 | 2022-01-18 | 深圳市博盛盈科供应链有限公司 | Intelligent chip-based safety management and control method and system |
Citations (92)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3922649A (en) * | 1974-09-10 | 1975-11-25 | Merck & Co Inc | Watchman{3 s tour recording system |
US5012514A (en) * | 1990-06-26 | 1991-04-30 | Paul Renton | Hard drive security system |
US5058161A (en) * | 1985-11-27 | 1991-10-15 | Kenneth Weiss | Method and apparatus for secure identification and verification |
US5226137A (en) * | 1989-05-15 | 1993-07-06 | Dallas Semiconductor Corp. | Electronic key with multiple password protected sub-keys using address and translation to implement a block data move between public and protected sub-keys |
US5266783A (en) * | 1991-05-13 | 1993-11-30 | First Tracks | Identification system requiring momentary contact by limb-worn ID unit with reader detector array |
US5291399A (en) * | 1990-07-27 | 1994-03-01 | Executone Information Systems, Inc. | Method and apparatus for accessing a portable personal database as for a hospital environment |
US5296692A (en) * | 1988-10-24 | 1994-03-22 | Sharp Kabushiki Kaisha | IC card adapter for use in memory card slot with or without superimposed memory card |
US5325323A (en) * | 1990-09-20 | 1994-06-28 | Nec Corporation | Erasable and programmable ROM with an identification code |
US5394206A (en) * | 1993-06-04 | 1995-02-28 | Eastman Kodak Company | Orientation independent, detachable film cartridge, memory module |
US5451763A (en) * | 1994-07-05 | 1995-09-19 | Alto Corporation | Personal medical IC card and read/write unit |
US5461390A (en) * | 1994-05-27 | 1995-10-24 | At&T Ipm Corp. | Locator device useful for house arrest and stalker detection |
US5576698A (en) * | 1994-09-22 | 1996-11-19 | Unisys Corporation | Physical addressing of modules |
US5589719A (en) * | 1995-03-10 | 1996-12-31 | Fiset; Peter D. | Card out of socket detector for IC cards |
US5623637A (en) * | 1993-12-06 | 1997-04-22 | Telequip Corporation | Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys |
US5640541A (en) * | 1995-03-24 | 1997-06-17 | Openconnect Systems, Inc. | Adapter for interfacing a SCSI bus with an IBM system/360/370 I/O interface channel and information system including same |
US5729204A (en) * | 1995-02-15 | 1998-03-17 | Children's Medical Center Corporation | Intelligent cable for controlling data flow |
US5786769A (en) * | 1996-12-11 | 1998-07-28 | International Business Machines Corporation | Method and system for detecting the presence of adapter cards |
US5815426A (en) * | 1996-08-13 | 1998-09-29 | Nexcom Technology, Inc. | Adapter for interfacing an insertable/removable digital memory apparatus to a host data part |
US5828905A (en) * | 1995-11-13 | 1998-10-27 | Mitsubishi Chemical America, Inc. | Adapter and method of connecting devices associated with at least three different protocols |
US5877975A (en) * | 1996-08-13 | 1999-03-02 | Nexcom Technology, Inc. | Insertable/removable digital memory apparatus and methods of operation thereof |
US5905888A (en) * | 1997-02-19 | 1999-05-18 | On Spec Electronic, Inc. | Bootable redundant hard disk attached to a PC's parallel port with rom-address auto-detect and configure during BIOS scan |
USD416541S (en) * | 1998-09-11 | 1999-11-16 | Honda Tsushin Kogyo Co., Ltd. | Connector receptacle for compact flash card |
US5995376A (en) * | 1997-05-20 | 1999-11-30 | National Instruments Corporation | Chassis which includes configurable slot 0 locations |
US6006295A (en) * | 1997-06-05 | 1999-12-21 | On Spec Electronic, Inc. | Translator with selectable FIFO for universal hub cables for connecting a PC's PCMCIA or parallel ports to various peripherals using IDE/ATAPI, SCSI, or general I/O |
US6023506A (en) * | 1995-10-26 | 2000-02-08 | Hitachi, Ltd. | Data encryption control apparatus and method |
US6028812A (en) * | 1998-03-03 | 2000-02-22 | Sharp Kabushiki Kaisha | Semiconductor memory device and method for controlling the same |
US6075706A (en) * | 1998-04-07 | 2000-06-13 | Itt Manufacturing Enterprises, Inc. | PC card for receiving chip card |
US6085976A (en) * | 1998-05-22 | 2000-07-11 | Sehr; Richard P. | Travel system and methods utilizing multi-application passenger cards |
US6154790A (en) * | 1998-07-10 | 2000-11-28 | International Business Machines | Monitoring and reporting hard disk drives identification using radio frequency |
US6181253B1 (en) * | 1993-12-21 | 2001-01-30 | Trimble Navigation Limited | Flexible monitoring of location and motion |
US6209060B1 (en) * | 1997-10-30 | 2001-03-27 | Fujitsu Limited | Disk array device for ensuring stable operation when a constituent disk device is replaced |
US6234537B1 (en) * | 1998-08-14 | 2001-05-22 | Bundesdruckerei Gmbh | Security document with optically excitable dyes for authenticity check |
US6264506B1 (en) * | 1999-04-23 | 2001-07-24 | J.S.T. Mfg. Co., Ltd. | Card connection adapter |
US6288645B1 (en) * | 1999-12-21 | 2001-09-11 | International Business Machines Corp. | Electronic location tag |
US20010029489A1 (en) * | 2000-02-16 | 2001-10-11 | George Brookner | Adaptable secure funds source |
US20010034795A1 (en) * | 2000-02-18 | 2001-10-25 | Moulton Gregory Hagan | System and method for intelligent, globally distributed network storage |
US20010037294A1 (en) * | 2000-04-25 | 2001-11-01 | Gregg Freishtat | System and method for syndicated transactions |
US20010056539A1 (en) * | 1996-12-04 | 2001-12-27 | Dominique Vincent Pavlin | Software protection device and method |
US6353776B1 (en) * | 1999-07-01 | 2002-03-05 | Siemens Aktiengesellschaft | Control system and method for controlling at least one function of an object and access control and driving authorization device for a motor vehicle |
US6353870B1 (en) * | 1999-05-11 | 2002-03-05 | Socket Communications Inc. | Closed case removable expansion card having interconnect and adapter circuitry for both I/O and removable memory |
US6438638B1 (en) * | 2000-07-06 | 2002-08-20 | Onspec Electronic, Inc. | Flashtoaster for reading several types of flash-memory cards with or without a PC |
US20020133702A1 (en) * | 2001-03-16 | 2002-09-19 | Stevens Curtis E. | Methods of granting access to a protected area |
US20020136214A1 (en) * | 2000-08-14 | 2002-09-26 | Consumer Direct Link | Pervasive computing network architecture |
US20020194528A1 (en) * | 2001-05-22 | 2002-12-19 | Nigel Hart | Method, disaster recovery record, back-up apparatus and RAID array controller for use in restoring a configuration of a RAID device |
US6546517B1 (en) * | 1999-07-15 | 2003-04-08 | Mitsubishi Denki Kabushiki Kaisha | Semiconductor memory |
US20030070083A1 (en) * | 2001-09-28 | 2003-04-10 | Kai-Wilhelm Nessler | Method and device for encryption/decryption of data on mass storage device |
US6557754B2 (en) * | 1998-10-21 | 2003-05-06 | Litronic, Inc. | Apparatus and method of providing a dual mode card and reader |
US20030091186A1 (en) * | 2001-10-12 | 2003-05-15 | Fontijn Wilhelmus Fransiscus Johannes | Apparatus and method for reading or writing user data |
US20030095664A1 (en) * | 2000-04-04 | 2003-05-22 | Tomoyuki Asano | Information recording/playback apparatus and method |
US6618788B1 (en) * | 2000-09-27 | 2003-09-09 | Cypress Semiconductor, Inc. | ATA device control via a packet-based interface |
US20030172295A1 (en) * | 2002-03-01 | 2003-09-11 | Onspec Electronics, Inc. | Device and system for allowing secure identification of an individual when accessing information and a method of use |
US20030169678A1 (en) * | 2001-04-06 | 2003-09-11 | Jun Nakano | Stamper for optical disk, method for manufacturing optical disk, and optical disk |
US6671808B1 (en) * | 1999-01-15 | 2003-12-30 | Rainbow Technologies, Inc. | USB-compliant personal key |
US20040148460A1 (en) * | 2003-01-13 | 2004-07-29 | Steinmetz Joseph Harold | Integrated-circuit implementation of a storage-shelf router and a path controller card for combined use in high-availability mass-storage-device shelves that may be incorporated within disk arrays, and a storage-shelf-interface tunneling method and system |
US20040151040A1 (en) * | 2003-01-31 | 2004-08-05 | Fujitsu Limited | Composite storage apparatus and a card board thereof |
US6779121B1 (en) * | 1999-07-09 | 2004-08-17 | Fujitsu Limited | Storage apparatus access control apparatus for a recording medium, and access control method for a recording medium |
US20040172538A1 (en) * | 2002-12-18 | 2004-09-02 | International Business Machines Corporation | Information processing with data storage |
US6851007B1 (en) * | 2001-05-30 | 2005-02-01 | Lsi Logic Corporation | Multi-channel interface controller for enabling a host to interface with one or more host devices |
US20050060586A1 (en) * | 1999-09-28 | 2005-03-17 | Chameleon Network, Inc. | Portable electronic authorization system and method |
US20050066129A1 (en) * | 2003-09-22 | 2005-03-24 | Chi-Tung Chang | Portable data storage device allowing dynamic setting of disk type and the method of dynamically setting disk type thereof |
US6930709B1 (en) * | 1997-12-04 | 2005-08-16 | Pentax Of America, Inc. | Integrated internet/intranet camera |
US20060041934A1 (en) * | 2004-08-17 | 2006-02-23 | Microsoft Corporation | Physical encryption key system |
US20060095647A1 (en) * | 2004-08-20 | 2006-05-04 | Smartdisk Corporation | Self-labeling digital storage unit |
US7055039B2 (en) * | 2003-04-14 | 2006-05-30 | Sony Corporation | Protection of digital content using block cipher crytography |
US7058749B2 (en) * | 2003-11-13 | 2006-06-06 | Dell Products L.P. | System and method for communications in serial attached SCSI storage network |
US7062652B2 (en) * | 1999-04-27 | 2006-06-13 | Matsushita Electric Industrial Co., Ltd. | Semiconductor memory card, data reading apparatus and data reading/reproducing apparatus |
US20060156396A1 (en) * | 2003-01-24 | 2006-07-13 | Ecebs Limited | Smartcard with protected memory access |
US20060195657A1 (en) * | 2005-02-28 | 2006-08-31 | Infrant Technologies, Inc. | Expandable RAID method and device |
US7127068B2 (en) * | 2000-05-24 | 2006-10-24 | Info Space, Inc. | Geographical comparison system and method |
US20060242431A1 (en) * | 2004-06-18 | 2006-10-26 | Emc Corporation | Storage data encryption |
US20060242696A1 (en) * | 2005-04-20 | 2006-10-26 | Honeywell International Inc. | Hardware encryption key for use in anti-tamper system |
US20060272027A1 (en) * | 2005-05-26 | 2006-11-30 | Finisar Corporation | Secure access to segment of data storage device and analyzer |
US20070016771A1 (en) * | 2005-07-11 | 2007-01-18 | Simdesk Technologies, Inc. | Maintaining security for file copy operations |
US20070050538A1 (en) * | 2005-08-25 | 2007-03-01 | Northcutt J D | Smart scalable storage switch architecture |
US7206989B2 (en) * | 2002-11-20 | 2007-04-17 | Intel Corporation | Integrated circuit having multiple modes of operation |
US20070094309A1 (en) * | 2005-10-11 | 2007-04-26 | Buckingham Jonathan P | Data transfer device |
US7243347B2 (en) * | 2002-06-21 | 2007-07-10 | International Business Machines Corporation | Method and system for maintaining firmware versions in a data processing system |
US20070162626A1 (en) * | 2005-11-02 | 2007-07-12 | Iyer Sree M | System and method for enhancing external storage |
US7251722B2 (en) * | 2004-05-11 | 2007-07-31 | Mistletoe Technologies, Inc. | Semantic processor storage server architecture |
US20070214299A1 (en) * | 2006-03-08 | 2007-09-13 | Chi-Jung Lo | Computing system and i/o board thereof |
US7278016B1 (en) * | 1999-10-26 | 2007-10-02 | International Business Machines Corporation | Encryption/decryption of stored data using non-accessible, unique encryption key |
US20070261118A1 (en) * | 2006-04-28 | 2007-11-08 | Chien-Chih Lu | Portable storage device with stand-alone antivirus capability |
US20070271348A1 (en) * | 2006-05-18 | 2007-11-22 | Sung Yang | System and method of fault-tolerant and privacy-safe location tracking via email |
US20070300287A1 (en) * | 2004-03-05 | 2007-12-27 | Secure Systems Limited | Partition Access Control System And Method For Controlling Partition Access |
US20080083036A1 (en) * | 2006-09-29 | 2008-04-03 | Microsoft Corporation | Off-premise encryption of data storage |
US20080114994A1 (en) * | 2006-11-14 | 2008-05-15 | Sree Mambakkam Iyer | Method and system to provide security implementation for storage devices |
US20080155276A1 (en) * | 2006-12-20 | 2008-06-26 | Ben Wei Chen | Secure storage system and method of use |
US20080181406A1 (en) * | 2007-01-30 | 2008-07-31 | Technology Properties Limited | System and Method of Storage Device Data Encryption and Data Access Via a Hardware Key |
US20080184035A1 (en) * | 2007-01-30 | 2008-07-31 | Technology Properties Limited | System and Method of Storage Device Data Encryption and Data Access |
US20080288703A1 (en) * | 2007-05-18 | 2008-11-20 | Technology Properties Limited | Method and Apparatus of Providing Power to an External Attachment Device via a Computing Device |
US20080288702A1 (en) * | 2007-05-14 | 2008-11-20 | Wael Diab | Method and system for docking a laptop with ethernet a/v bridging to guarantee services |
US20090046858A1 (en) * | 2007-03-21 | 2009-02-19 | Technology Properties Limited | System and Method of Data Encryption and Data Access of a Set of Storage Devices via a Hardware Key |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7555568B2 (en) * | 2004-02-28 | 2009-06-30 | Huang Evan S | Method and apparatus for operating a host computer from a portable apparatus |
US7370166B1 (en) * | 2004-04-30 | 2008-05-06 | Lexar Media, Inc. | Secure portable storage device |
CA2565596A1 (en) * | 2004-05-11 | 2005-11-24 | Mistletoe Technologies, Inc. | Semantic processor storage server architecture |
US20060069819A1 (en) * | 2004-09-28 | 2006-03-30 | Microsoft Corporation | Universal serial bus device |
TWM276255U (en) * | 2005-05-19 | 2005-09-21 | A Tec Subsystem Inc | Hot-plug application cassette for both internal and external connection |
US7650447B2 (en) * | 2007-02-16 | 2010-01-19 | Apple Inc. | System and method for a host to access an internal SATA storage device within an accessible host using an external serial ATA connection |
-
2007
- 2007-07-24 US US11/782,618 patent/US20080288782A1/en not_active Abandoned
-
2008
- 2008-05-08 TW TW097116971A patent/TW200846970A/en unknown
- 2008-05-08 EP EP08251638A patent/EP1993058A1/en not_active Withdrawn
- 2008-05-12 WO PCT/US2008/063428 patent/WO2008144280A1/en active Application Filing
- 2008-05-16 JP JP2008129912A patent/JP2009076045A/en active Pending
- 2008-05-16 KR KR1020080045744A patent/KR20080101799A/en not_active Application Discontinuation
-
2010
- 2010-09-29 US US12/893,232 patent/US8230207B2/en not_active Expired - Fee Related
Patent Citations (95)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3922649A (en) * | 1974-09-10 | 1975-11-25 | Merck & Co Inc | Watchman{3 s tour recording system |
US5058161A (en) * | 1985-11-27 | 1991-10-15 | Kenneth Weiss | Method and apparatus for secure identification and verification |
US5296692A (en) * | 1988-10-24 | 1994-03-22 | Sharp Kabushiki Kaisha | IC card adapter for use in memory card slot with or without superimposed memory card |
US5226137A (en) * | 1989-05-15 | 1993-07-06 | Dallas Semiconductor Corp. | Electronic key with multiple password protected sub-keys using address and translation to implement a block data move between public and protected sub-keys |
US5012514A (en) * | 1990-06-26 | 1991-04-30 | Paul Renton | Hard drive security system |
US5291399A (en) * | 1990-07-27 | 1994-03-01 | Executone Information Systems, Inc. | Method and apparatus for accessing a portable personal database as for a hospital environment |
US5325323A (en) * | 1990-09-20 | 1994-06-28 | Nec Corporation | Erasable and programmable ROM with an identification code |
US5266783A (en) * | 1991-05-13 | 1993-11-30 | First Tracks | Identification system requiring momentary contact by limb-worn ID unit with reader detector array |
US5394206A (en) * | 1993-06-04 | 1995-02-28 | Eastman Kodak Company | Orientation independent, detachable film cartridge, memory module |
US5623637A (en) * | 1993-12-06 | 1997-04-22 | Telequip Corporation | Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys |
US6181253B1 (en) * | 1993-12-21 | 2001-01-30 | Trimble Navigation Limited | Flexible monitoring of location and motion |
US5461390A (en) * | 1994-05-27 | 1995-10-24 | At&T Ipm Corp. | Locator device useful for house arrest and stalker detection |
US5451763A (en) * | 1994-07-05 | 1995-09-19 | Alto Corporation | Personal medical IC card and read/write unit |
US5576698A (en) * | 1994-09-22 | 1996-11-19 | Unisys Corporation | Physical addressing of modules |
US5729204A (en) * | 1995-02-15 | 1998-03-17 | Children's Medical Center Corporation | Intelligent cable for controlling data flow |
US5589719A (en) * | 1995-03-10 | 1996-12-31 | Fiset; Peter D. | Card out of socket detector for IC cards |
US5640541A (en) * | 1995-03-24 | 1997-06-17 | Openconnect Systems, Inc. | Adapter for interfacing a SCSI bus with an IBM system/360/370 I/O interface channel and information system including same |
US6023506A (en) * | 1995-10-26 | 2000-02-08 | Hitachi, Ltd. | Data encryption control apparatus and method |
US5828905A (en) * | 1995-11-13 | 1998-10-27 | Mitsubishi Chemical America, Inc. | Adapter and method of connecting devices associated with at least three different protocols |
US5815426A (en) * | 1996-08-13 | 1998-09-29 | Nexcom Technology, Inc. | Adapter for interfacing an insertable/removable digital memory apparatus to a host data part |
US5877975A (en) * | 1996-08-13 | 1999-03-02 | Nexcom Technology, Inc. | Insertable/removable digital memory apparatus and methods of operation thereof |
US6026007A (en) * | 1996-08-13 | 2000-02-15 | Integrated Silicon Solution, Inc. | Insertable and removable high capacity digital memory apparatus and methods of operation thereof |
US20010056539A1 (en) * | 1996-12-04 | 2001-12-27 | Dominique Vincent Pavlin | Software protection device and method |
US5786769A (en) * | 1996-12-11 | 1998-07-28 | International Business Machines Corporation | Method and system for detecting the presence of adapter cards |
US5905888A (en) * | 1997-02-19 | 1999-05-18 | On Spec Electronic, Inc. | Bootable redundant hard disk attached to a PC's parallel port with rom-address auto-detect and configure during BIOS scan |
US5995376A (en) * | 1997-05-20 | 1999-11-30 | National Instruments Corporation | Chassis which includes configurable slot 0 locations |
US6006295A (en) * | 1997-06-05 | 1999-12-21 | On Spec Electronic, Inc. | Translator with selectable FIFO for universal hub cables for connecting a PC's PCMCIA or parallel ports to various peripherals using IDE/ATAPI, SCSI, or general I/O |
US6209060B1 (en) * | 1997-10-30 | 2001-03-27 | Fujitsu Limited | Disk array device for ensuring stable operation when a constituent disk device is replaced |
US6930709B1 (en) * | 1997-12-04 | 2005-08-16 | Pentax Of America, Inc. | Integrated internet/intranet camera |
US6028812A (en) * | 1998-03-03 | 2000-02-22 | Sharp Kabushiki Kaisha | Semiconductor memory device and method for controlling the same |
US6075706A (en) * | 1998-04-07 | 2000-06-13 | Itt Manufacturing Enterprises, Inc. | PC card for receiving chip card |
US6085976A (en) * | 1998-05-22 | 2000-07-11 | Sehr; Richard P. | Travel system and methods utilizing multi-application passenger cards |
US6154790A (en) * | 1998-07-10 | 2000-11-28 | International Business Machines | Monitoring and reporting hard disk drives identification using radio frequency |
US6234537B1 (en) * | 1998-08-14 | 2001-05-22 | Bundesdruckerei Gmbh | Security document with optically excitable dyes for authenticity check |
USD416541S (en) * | 1998-09-11 | 1999-11-16 | Honda Tsushin Kogyo Co., Ltd. | Connector receptacle for compact flash card |
US6557754B2 (en) * | 1998-10-21 | 2003-05-06 | Litronic, Inc. | Apparatus and method of providing a dual mode card and reader |
US6671808B1 (en) * | 1999-01-15 | 2003-12-30 | Rainbow Technologies, Inc. | USB-compliant personal key |
US6264506B1 (en) * | 1999-04-23 | 2001-07-24 | J.S.T. Mfg. Co., Ltd. | Card connection adapter |
US7062652B2 (en) * | 1999-04-27 | 2006-06-13 | Matsushita Electric Industrial Co., Ltd. | Semiconductor memory card, data reading apparatus and data reading/reproducing apparatus |
US6353870B1 (en) * | 1999-05-11 | 2002-03-05 | Socket Communications Inc. | Closed case removable expansion card having interconnect and adapter circuitry for both I/O and removable memory |
US6353776B1 (en) * | 1999-07-01 | 2002-03-05 | Siemens Aktiengesellschaft | Control system and method for controlling at least one function of an object and access control and driving authorization device for a motor vehicle |
US6779121B1 (en) * | 1999-07-09 | 2004-08-17 | Fujitsu Limited | Storage apparatus access control apparatus for a recording medium, and access control method for a recording medium |
US6546517B1 (en) * | 1999-07-15 | 2003-04-08 | Mitsubishi Denki Kabushiki Kaisha | Semiconductor memory |
US20050060586A1 (en) * | 1999-09-28 | 2005-03-17 | Chameleon Network, Inc. | Portable electronic authorization system and method |
US7278016B1 (en) * | 1999-10-26 | 2007-10-02 | International Business Machines Corporation | Encryption/decryption of stored data using non-accessible, unique encryption key |
US6288645B1 (en) * | 1999-12-21 | 2001-09-11 | International Business Machines Corp. | Electronic location tag |
US20010029489A1 (en) * | 2000-02-16 | 2001-10-11 | George Brookner | Adaptable secure funds source |
US20010034795A1 (en) * | 2000-02-18 | 2001-10-25 | Moulton Gregory Hagan | System and method for intelligent, globally distributed network storage |
US20030095664A1 (en) * | 2000-04-04 | 2003-05-22 | Tomoyuki Asano | Information recording/playback apparatus and method |
US20010037294A1 (en) * | 2000-04-25 | 2001-11-01 | Gregg Freishtat | System and method for syndicated transactions |
US7127068B2 (en) * | 2000-05-24 | 2006-10-24 | Info Space, Inc. | Geographical comparison system and method |
US6438638B1 (en) * | 2000-07-06 | 2002-08-20 | Onspec Electronic, Inc. | Flashtoaster for reading several types of flash-memory cards with or without a PC |
US20020136214A1 (en) * | 2000-08-14 | 2002-09-26 | Consumer Direct Link | Pervasive computing network architecture |
US6618788B1 (en) * | 2000-09-27 | 2003-09-09 | Cypress Semiconductor, Inc. | ATA device control via a packet-based interface |
US20020133702A1 (en) * | 2001-03-16 | 2002-09-19 | Stevens Curtis E. | Methods of granting access to a protected area |
US20030169678A1 (en) * | 2001-04-06 | 2003-09-11 | Jun Nakano | Stamper for optical disk, method for manufacturing optical disk, and optical disk |
US20020194528A1 (en) * | 2001-05-22 | 2002-12-19 | Nigel Hart | Method, disaster recovery record, back-up apparatus and RAID array controller for use in restoring a configuration of a RAID device |
US6851007B1 (en) * | 2001-05-30 | 2005-02-01 | Lsi Logic Corporation | Multi-channel interface controller for enabling a host to interface with one or more host devices |
US20030070083A1 (en) * | 2001-09-28 | 2003-04-10 | Kai-Wilhelm Nessler | Method and device for encryption/decryption of data on mass storage device |
US20030091186A1 (en) * | 2001-10-12 | 2003-05-15 | Fontijn Wilhelmus Fransiscus Johannes | Apparatus and method for reading or writing user data |
US20030172295A1 (en) * | 2002-03-01 | 2003-09-11 | Onspec Electronics, Inc. | Device and system for allowing secure identification of an individual when accessing information and a method of use |
US7243347B2 (en) * | 2002-06-21 | 2007-07-10 | International Business Machines Corporation | Method and system for maintaining firmware versions in a data processing system |
US7206989B2 (en) * | 2002-11-20 | 2007-04-17 | Intel Corporation | Integrated circuit having multiple modes of operation |
US20040172538A1 (en) * | 2002-12-18 | 2004-09-02 | International Business Machines Corporation | Information processing with data storage |
US20040148460A1 (en) * | 2003-01-13 | 2004-07-29 | Steinmetz Joseph Harold | Integrated-circuit implementation of a storage-shelf router and a path controller card for combined use in high-availability mass-storage-device shelves that may be incorporated within disk arrays, and a storage-shelf-interface tunneling method and system |
US20060156396A1 (en) * | 2003-01-24 | 2006-07-13 | Ecebs Limited | Smartcard with protected memory access |
US20040151040A1 (en) * | 2003-01-31 | 2004-08-05 | Fujitsu Limited | Composite storage apparatus and a card board thereof |
US20060159266A1 (en) * | 2003-04-14 | 2006-07-20 | Pierre Chavanne | Protection of digital content using block cipher crytography |
US7055039B2 (en) * | 2003-04-14 | 2006-05-30 | Sony Corporation | Protection of digital content using block cipher crytography |
US20050066129A1 (en) * | 2003-09-22 | 2005-03-24 | Chi-Tung Chang | Portable data storage device allowing dynamic setting of disk type and the method of dynamically setting disk type thereof |
US7058749B2 (en) * | 2003-11-13 | 2006-06-06 | Dell Products L.P. | System and method for communications in serial attached SCSI storage network |
US20070300287A1 (en) * | 2004-03-05 | 2007-12-27 | Secure Systems Limited | Partition Access Control System And Method For Controlling Partition Access |
US7251722B2 (en) * | 2004-05-11 | 2007-07-31 | Mistletoe Technologies, Inc. | Semantic processor storage server architecture |
US20060242431A1 (en) * | 2004-06-18 | 2006-10-26 | Emc Corporation | Storage data encryption |
US20060041934A1 (en) * | 2004-08-17 | 2006-02-23 | Microsoft Corporation | Physical encryption key system |
US20060095647A1 (en) * | 2004-08-20 | 2006-05-04 | Smartdisk Corporation | Self-labeling digital storage unit |
US20060195657A1 (en) * | 2005-02-28 | 2006-08-31 | Infrant Technologies, Inc. | Expandable RAID method and device |
US20060242696A1 (en) * | 2005-04-20 | 2006-10-26 | Honeywell International Inc. | Hardware encryption key for use in anti-tamper system |
US20060272027A1 (en) * | 2005-05-26 | 2006-11-30 | Finisar Corporation | Secure access to segment of data storage device and analyzer |
US20070016771A1 (en) * | 2005-07-11 | 2007-01-18 | Simdesk Technologies, Inc. | Maintaining security for file copy operations |
US20070050538A1 (en) * | 2005-08-25 | 2007-03-01 | Northcutt J D | Smart scalable storage switch architecture |
US20070094309A1 (en) * | 2005-10-11 | 2007-04-26 | Buckingham Jonathan P | Data transfer device |
US20070162626A1 (en) * | 2005-11-02 | 2007-07-12 | Iyer Sree M | System and method for enhancing external storage |
US20070214299A1 (en) * | 2006-03-08 | 2007-09-13 | Chi-Jung Lo | Computing system and i/o board thereof |
US20070261118A1 (en) * | 2006-04-28 | 2007-11-08 | Chien-Chih Lu | Portable storage device with stand-alone antivirus capability |
US20070271348A1 (en) * | 2006-05-18 | 2007-11-22 | Sung Yang | System and method of fault-tolerant and privacy-safe location tracking via email |
US20090077284A1 (en) * | 2006-06-30 | 2009-03-19 | Mcm Portfolio Llc | System and Method for Enhancing External Storage |
US20080083036A1 (en) * | 2006-09-29 | 2008-04-03 | Microsoft Corporation | Off-premise encryption of data storage |
US20080114994A1 (en) * | 2006-11-14 | 2008-05-15 | Sree Mambakkam Iyer | Method and system to provide security implementation for storage devices |
US20080155276A1 (en) * | 2006-12-20 | 2008-06-26 | Ben Wei Chen | Secure storage system and method of use |
US20080181406A1 (en) * | 2007-01-30 | 2008-07-31 | Technology Properties Limited | System and Method of Storage Device Data Encryption and Data Access Via a Hardware Key |
US20080184035A1 (en) * | 2007-01-30 | 2008-07-31 | Technology Properties Limited | System and Method of Storage Device Data Encryption and Data Access |
US20090046858A1 (en) * | 2007-03-21 | 2009-02-19 | Technology Properties Limited | System and Method of Data Encryption and Data Access of a Set of Storage Devices via a Hardware Key |
US20080288702A1 (en) * | 2007-05-14 | 2008-11-20 | Wael Diab | Method and system for docking a laptop with ethernet a/v bridging to guarantee services |
US20080288703A1 (en) * | 2007-05-18 | 2008-11-20 | Technology Properties Limited | Method and Apparatus of Providing Power to an External Attachment Device via a Computing Device |
Cited By (65)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030172295A1 (en) * | 2002-03-01 | 2003-09-11 | Onspec Electronics, Inc. | Device and system for allowing secure identification of an individual when accessing information and a method of use |
US20070162626A1 (en) * | 2005-11-02 | 2007-07-12 | Iyer Sree M | System and method for enhancing external storage |
US7600069B2 (en) * | 2006-06-23 | 2009-10-06 | Genesys Logic, Inc. | Multi-interface conversion device |
US20070300006A1 (en) * | 2006-06-23 | 2007-12-27 | Genesys Logic, Inc. | Multi-interface conversion device |
US20090077284A1 (en) * | 2006-06-30 | 2009-03-19 | Mcm Portfolio Llc | System and Method for Enhancing External Storage |
US20080114994A1 (en) * | 2006-11-14 | 2008-05-15 | Sree Mambakkam Iyer | Method and system to provide security implementation for storage devices |
US7876894B2 (en) | 2006-11-14 | 2011-01-25 | Mcm Portfolio Llc | Method and system to provide security implementation for storage devices |
US20080181551A1 (en) * | 2007-01-29 | 2008-07-31 | Shih-Yuan Wang | Nanowire-based modulators |
US20080181406A1 (en) * | 2007-01-30 | 2008-07-31 | Technology Properties Limited | System and Method of Storage Device Data Encryption and Data Access Via a Hardware Key |
US20080184035A1 (en) * | 2007-01-30 | 2008-07-31 | Technology Properties Limited | System and Method of Storage Device Data Encryption and Data Access |
US20090046858A1 (en) * | 2007-03-21 | 2009-02-19 | Technology Properties Limited | System and Method of Data Encryption and Data Access of a Set of Storage Devices via a Hardware Key |
US20080288703A1 (en) * | 2007-05-18 | 2008-11-20 | Technology Properties Limited | Method and Apparatus of Providing Power to an External Attachment Device via a Computing Device |
US20090113128A1 (en) * | 2007-10-24 | 2009-04-30 | Sumwintek Corp. | Method and system for preventing virus infections via the use of a removable storage device |
US20090132556A1 (en) * | 2007-11-16 | 2009-05-21 | Nitin Gupta | Offline operations for online applications |
US20090210603A1 (en) * | 2008-02-19 | 2009-08-20 | Chao-Nan Chen | Flash memory circuit with combinational interface |
US8789137B2 (en) * | 2008-03-13 | 2014-07-22 | Canon Kabushiki Kaisha | Data processing device |
US20110307642A1 (en) * | 2008-03-13 | 2011-12-15 | Canon Kabushiki Kaisha | Data processing device |
US20100169590A1 (en) * | 2008-12-31 | 2010-07-01 | Clint Gordon-Carroll | Providing backups using a portable storage device |
US20100169668A1 (en) * | 2008-12-31 | 2010-07-01 | Clint Gordon-Carroll | Obtaining backups using a portable storage device |
US8266453B2 (en) | 2008-12-31 | 2012-09-11 | Decho Corporation | Obtaining backups using a portable storage device |
US8108636B2 (en) | 2008-12-31 | 2012-01-31 | Decho Corporation | Providing backups using a portable storage device |
WO2010077353A1 (en) * | 2008-12-31 | 2010-07-08 | Emc Corporation | Obtaining backups using a portable storage device |
US20100174835A1 (en) * | 2009-01-08 | 2010-07-08 | Chen-Yao Chung | Signal Converter for an All-In-One USB Connector |
US7921233B2 (en) * | 2009-01-08 | 2011-04-05 | Innostar Technology Corporation | Signal converter for an all-in-one USB connector that includes USB 2.0, USB 3.0 and eSATA |
US20110314094A1 (en) * | 2009-02-27 | 2011-12-22 | Manuel Fernando De Oliveira Antunes | School content management and filling system and methodology |
US20100250799A1 (en) * | 2009-03-24 | 2010-09-30 | Kabushiki Kaisha Toshiba | Information processing apparatus and power supply controlling method |
US8713222B2 (en) | 2009-03-24 | 2014-04-29 | Kabushiki Kaisha Toshiba | Information processing apparatus and power supply controlling method |
US20110081015A1 (en) * | 2009-10-06 | 2011-04-07 | Parker Jeffrey C | Encryption System And Method |
US9282083B2 (en) * | 2009-10-06 | 2016-03-08 | Hewlett-Packard Development Company, L.P. | Encryption system and method |
US9426147B2 (en) | 2009-12-21 | 2016-08-23 | Intel Corporation | Protected device management |
US20110154023A1 (en) * | 2009-12-21 | 2011-06-23 | Smith Ned M | Protected device management |
TWI497403B (en) * | 2010-02-12 | 2015-08-21 | Phison Electronics Corp | Partitionable management storage system and using method thereof and managing method thereof and controller thereof |
US20110202715A1 (en) * | 2010-02-12 | 2011-08-18 | Phison Electronics Corp. | Management-partitionable storage system, use method and management method thereof, and controller thereof |
US9159009B2 (en) * | 2010-03-24 | 2015-10-13 | Oki Data Corporation | Image forming apparatus and image output apparatus |
US20110235086A1 (en) * | 2010-03-24 | 2011-09-29 | Oki Data Corporation | Image forming apparatus and image output apparatus |
US20120017271A1 (en) * | 2010-07-14 | 2012-01-19 | Smith Ned M | Domain-authenticated control of platform resources |
US10482254B2 (en) * | 2010-07-14 | 2019-11-19 | Intel Corporation | Domain-authenticated control of platform resources |
US11366906B2 (en) | 2010-07-14 | 2022-06-21 | Intel Corporation | Domain-authenticated control of platform resources |
US10049234B2 (en) | 2012-09-28 | 2018-08-14 | Intel Corporation | Secure access management of devices |
US9336357B2 (en) | 2012-09-28 | 2016-05-10 | Intel Corporation | Secure access management of devices |
US10902155B2 (en) | 2013-03-29 | 2021-01-26 | Secturion Systems, Inc. | Multi-tenancy architecture |
US11783089B2 (en) | 2013-03-29 | 2023-10-10 | Secturion Systems, Inc. | Multi-tenancy architecture |
US9858442B1 (en) | 2013-03-29 | 2018-01-02 | Secturion Systems, Inc. | Multi-tenancy architecture |
US11921906B2 (en) | 2013-03-29 | 2024-03-05 | Secturion Systems, Inc. | Security device with programmable systolic-matrix cryptographic module and programmable input/output interface |
US11063914B1 (en) | 2013-03-29 | 2021-07-13 | Secturion Systems, Inc. | Secure end-to-end communication system |
US10013580B2 (en) | 2013-03-29 | 2018-07-03 | Secturion Systems, Inc. | Security device with programmable systolic-matrix cryptographic module and programmable input/output interface |
US11288402B2 (en) | 2013-03-29 | 2022-03-29 | Secturion Systems, Inc. | Security device with programmable systolic-matrix cryptographic module and programmable input/output interface |
US10114766B2 (en) | 2013-04-01 | 2018-10-30 | Secturion Systems, Inc. | Multi-level independent security architecture |
US11429540B2 (en) | 2013-04-01 | 2022-08-30 | Secturion Systems, Inc. | Multi-level independent security architecture |
US9705869B2 (en) | 2013-06-27 | 2017-07-11 | Intel Corporation | Continuous multi-factor authentication |
US10091184B2 (en) | 2013-06-27 | 2018-10-02 | Intel Corporation | Continuous multi-factor authentication |
US9912645B2 (en) | 2014-03-31 | 2018-03-06 | Intel Corporation | Methods and apparatus to securely share data |
US9411975B2 (en) | 2014-03-31 | 2016-08-09 | Intel Corporation | Methods and apparatus to securely share data |
US20160350132A1 (en) * | 2015-06-01 | 2016-12-01 | Dell Products, L.P. | Systems and methods for exporting diagnostic data and securing privileges in a service operating system |
US9959127B2 (en) * | 2015-06-01 | 2018-05-01 | Dell Products, L.P. | Systems and methods for exporting diagnostic data and securing privileges in a service operating system |
US20170063832A1 (en) * | 2015-08-28 | 2017-03-02 | Dell Products L.P. | System and method to redirect hardware secure usb storage devices in high latency vdi environments |
US10097534B2 (en) * | 2015-08-28 | 2018-10-09 | Dell Products L.P. | System and method to redirect hardware secure USB storage devices in high latency VDI environments |
US9760730B2 (en) * | 2015-08-28 | 2017-09-12 | Dell Products L.P. | System and method to redirect and unlock software secure disk devices in a high latency environment |
US20170061145A1 (en) * | 2015-08-28 | 2017-03-02 | Dell Products L.P. | System and method to redirect and unlock software secure disk devices in a high latency environment |
US11283774B2 (en) | 2015-09-17 | 2022-03-22 | Secturion Systems, Inc. | Cloud storage using encryption gateway with certificate authority identification |
US11792169B2 (en) | 2015-09-17 | 2023-10-17 | Secturion Systems, Inc. | Cloud storage using encryption gateway with certificate authority identification |
US10255425B2 (en) | 2015-09-25 | 2019-04-09 | Intel Corporation | Secure authentication protocol systems and methods |
US10073964B2 (en) | 2015-09-25 | 2018-09-11 | Intel Corporation | Secure authentication protocol systems and methods |
US10708236B2 (en) | 2015-10-26 | 2020-07-07 | Secturion Systems, Inc. | Multi-independent level secure (MILS) storage encryption |
US11750571B2 (en) | 2015-10-26 | 2023-09-05 | Secturion Systems, Inc. | Multi-independent level secure (MILS) storage encryption |
Also Published As
Publication number | Publication date |
---|---|
TW200846970A (en) | 2008-12-01 |
KR20080101799A (en) | 2008-11-21 |
US8230207B2 (en) | 2012-07-24 |
EP1993058A1 (en) | 2008-11-19 |
JP2009076045A (en) | 2009-04-09 |
US20110087889A1 (en) | 2011-04-14 |
WO2008144280A1 (en) | 2008-11-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080288782A1 (en) | Method and Apparatus of Providing Security to an External Attachment Device | |
US20210192090A1 (en) | Secure data storage device with security function implemented in a data security bridge | |
US7861015B2 (en) | USB apparatus and control method therein | |
US7818255B2 (en) | Logon and machine unlock integration | |
KR101231216B1 (en) | Removable storage device with fingerprint recognition and control method thereof | |
US9507964B2 (en) | Regulating access using information regarding a host machine of a portable storage drive | |
US8332604B2 (en) | Methods to securely bind an encryption key to a storage device | |
US20210216616A1 (en) | Memory controller and storage device including the same | |
US20050228993A1 (en) | Method and apparatus for authenticating a user of an electronic system | |
US20150324612A1 (en) | System and method for recovering from an interrupted encryption and decryption operation performed on a volume | |
US9495562B2 (en) | Removable storage device data protection | |
US8479011B2 (en) | Method and apparatus for using cryptographic mechanisms to provide access to a portable device using integrated authentication using another portable device | |
US20080195872A1 (en) | Method and Device for Protecting Data Stored in a Computing Device | |
US20100023650A1 (en) | System and method for using a smart card in conjunction with a flash memory controller to detect logon authentication | |
US9137244B2 (en) | System and method for generating one-time password for information handling resource | |
US8539246B2 (en) | Secure resume for encrypted drives | |
US6976172B2 (en) | System and method for protected messaging | |
US20100174902A1 (en) | Portable storage media with high security function | |
US20140325642A1 (en) | Storage device reader having security function and security method using thereof | |
CN110807186B (en) | Method, device, equipment and storage medium for safe storage of storage equipment | |
CN101419576A (en) | System and method of providing security to an external device | |
US11740806B2 (en) | Management controller based drive migration | |
WO2017054193A1 (en) | Unlocking method and terminal | |
US20130275745A1 (en) | System and Method for Secure Communication | |
US9230093B1 (en) | Protection method and system for computer security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ONSPEC ELECTRONIC, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:IYER, SREE M.;REEL/FRAME:019606/0540 Effective date: 20070724 |
|
AS | Assignment |
Owner name: TECHNOLOGY PROPERTIES LIMITED, CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNMENT RECORDAL SHEET PREVIOUSLY RECORDED ON REEL 019606 FRAME 0540;ASSIGNOR:IYER, SREE M.;REEL/FRAME:019802/0196 Effective date: 20070724 |
|
AS | Assignment |
Owner name: MCM PORTFOLIO LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TECHNOLOGY PROPERTIES LIMITED;REEL/FRAME:019914/0513 Effective date: 20070928 |
|
AS | Assignment |
Owner name: TECHNOLOGY PROPERTIES LIMITED, CALIFORNIA Free format text: LICENSE;ASSIGNOR:MCM PORTFOLIO LLC;REEL/FRAME:021890/0733 Effective date: 20061231 Owner name: TECHNOLOGY PROPERTIES LIMITED,CALIFORNIA Free format text: LICENSE;ASSIGNOR:MCM PORTFOLIO LLC;REEL/FRAME:021890/0733 Effective date: 20061231 |
|
STCB | Information on status: application discontinuation |
Free format text: EXPRESSLY ABANDONED -- DURING EXAMINATION |
|
AS | Assignment |
Owner name: TECHNOLOGY PROPERTIES LIMITED LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:TECHNOLOGY PROPERTIES LIMITED;REEL/FRAME:026616/0695 Effective date: 20081229 |