Unlock instant, AI-driven research and patent intelligence for your innovation.

Remote access control of storage devices

A technology for storage devices and access control devices, applied in the direction of memory systems, data processing input/output processes, instruments, etc., which can solve problems such as a large number of hardware components, development and subsequent troubleshooting costs, and complexity

Active Publication Date: 2012-05-16
MICROSOFT TECH LICENSING LLC
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unfortunately, forms of provisioning access control to storage devices can be complex and can result in substantial additional hardware components, development and subsequent troubleshooting costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote access control of storage devices
  • Remote access control of storage devices
  • Remote access control of storage devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following description relates to a storage system that includes a storage device and a physically and communicatively separable access control device, wherein the access control device comprises a device that can be utilized by the access control device to control when data stored on the storage device is made available to entities seeking to access it access control information. An access control device can prevent a storage device from communicating with an unauthorized entity, for example, by indicating that the storage device does not meaningfully respond to data storage-related communications from such unauthorized entities, where data storage-related communications include requests for data already stored on the storage device. The communication of data and the communication of requests that the provided data be stored on storage devices. The access control device can also include cryptographic information selectively supplied to a hardware cryptosystem of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An access control device can be communicationally coupled to a storage device and can control access thereto. The access control device can comprise information, such as identities of authorized entities, to enable the access control device to independently determine whether to provide access to an associated storage device. Alternatively, the access control device can comprise information to establish a secure connection to an authorization computing device and the access control device can implement the decisions of the authorization computing device. The access control device can control access by instructing a storage device to execute specific firmware instructions to prevent meaningful responses to data storage related requests. The access control device can also comprise storage-related cryptographic information utilized by the storage device to encrypt and decrypt data.; In such a case, the access control device can control access by not releasing the storage-related cryptographic information to the storage device.

Description

Background technique [0001] Increasingly, computing devices are being used to manipulate and store data and information intended to be kept private. Such data and information can include government secrets, but are more likely to include commercial and personal information, which, if obtained by a malicious party or adversary, could harm one or more individuals. As such, various security mechanisms have been implemented in association with the hardware of the computing device and in association with the software of the computing device. Examples of such hardware security mechanisms include peripherals designed to generate secure passwords based on biometric information such as fingerprints, and physical access barriers to computing devices such as keypad locks, communication port locks, and the like. Examples of security mechanisms associated with software of a computing device include various encryption techniques and various access control techniques. [0002] However, pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/20G06F12/00
CPCH04L2209/80H04L9/32H04L63/101H04L2209/34H04L9/3271G06F21/77G06F3/0622H04L63/0853G06F3/0605G06F3/0659G06F3/067G06F21/604
Inventor V.萨多夫斯基S.P.奥拉里格C.寥内蒂J.R.哈米尔顿
Owner MICROSOFT TECH LICENSING LLC