System and method for delivering versatile security, digital rights management, and privacy services from storage controllers

a storage controller and digital rights management technology, applied in the field of methods and systems for securing computer systems, can solve the problems of not implementing an overall corresponding improvement in the client platform, limited security of traditional operating systems, and inability to test local or remote users

Inactive Publication Date: 2005-03-24
SEAGATE TECH LLC
View PDF42 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0018] In one embodiment, a storage media of a storage device is partitioned into a hidden partition and a storage partition. A base class is written to the hidden partition. A security provider base is instantiated from the base class. The security provider base class is adapted to control access to the storage media.
[0019] In another embodiment, the storage device has a processor and firmware adapted to access data stored on a storage media. Disc drive firmware is written to a controller of the storage device. The storage media of the storage device is partitioned into a hidden portion and a data portion. A security provider object template is written to the hidden partition. Security pro

Problems solved by technology

Unfortunately, traditional operating systems provide limited security.
However, no overall corresponding improvement in client platforms has been implemented, in part, because of the variety of client platforms and because of the cost.
However, current computing platform technologies do not allow a local or remote user to test whether a platform can be trusted with sensitive information.
For example, a host system can verify that a particular user is accessing the system, but it is difficult (if not impossible) to establish with certainty whether the particular user's computing platform is a corporate machine and whether it runs the required software and configurations.
With the advent and widespread deployment of the Internet, the deficiencies of conventional computer security systems have been exposed and sometimes exploited.
A disadvantage of the Internet is that it permits many ways to infiltrate the perimeter defenses of conventional computer systems.
Generally, infiltration of these perimeter defenses can compromise data and computer programs, which can impact derivative capabilities, such as digital rights management.
Virus detection software, however, can be susceptible to exploitation by, for example “spoofing” or “wrappering” strategies.
This highlights a fundamental problem with conventional computer security systems, namely that the security system operates within the same environment as the operating system.
Software security implementations (such as virus detection software) may be impacted by software that has already been executed on the software platform.
Even tightly controlled software cannot vouch for its own integrity.
For example, if malicious software, such as a virus, has bypassed the perimeter defenses or security features of the OS and has managed to corrupt its operation, the OS cannot be expected to recognize the security breach, reliably.
These

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for delivering versatile security, digital rights management, and privacy services from storage controllers
  • System and method for delivering versatile security, digital rights management, and privacy services from storage controllers
  • System and method for delivering versatile security, digital rights management, and privacy services from storage controllers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027]FIG. 1 is a perspective view of a disc drive 100 in which the present invention may be used. Disc drive 100 can be configured as a traditional magnetic disc drive, a magneto-optical disc drive or an optical disc drive, for example. Disc drive 100 includes a housing with a base 102 and a top cover (not shown). Disc drive 100 further includes a disc pack 106, which is mounted on a spindle motor (not shown) by a disc clamp 108. Disc pack 106 includes a plurality of individual discs 107, which are mounted for co-rotation about central axis 109. Each disc surface has an associated slider 110, which is mounted to disc drive 100 and carries a read / write head for communication with the disc surface.

[0028] In the example shown in FIG. 1, sliders 110 are supported by suspensions 112 which are in turn attached to track accessing arms 114 of an actuator 116. The actuator shown in FIG. 1 is of the type known as a rotary moving coil actuator and includes a voice coil motor (VCM), shown gen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for providing enhanced security features in a storage device involves partitioning a storage media in the storage device into a hidden partition and a storage partition in the storage media. A base class is written to the hidden partition. A security provider base class is instantiated from the base class. The security provider base class is adapted to control access to the storage media.

Description

CROSS REFERENCE TO RELATED APPLICATION(S) [0001] This application is a continuation in part of pending application Ser. No. 09 / 912,931, filed on Jul. 25, 2001, entitled “METHODS AND SYSTEMS FOR PROMOTING SECURITY IN A COMPUTER SYSTEM EMPLOYING ATTACHED STORAGE DEVICES,” which is incorporated herein by reference in its entirety.BACKGROUND OF THE INVENTION [0002] The present invention generally relates to methods and systems for securing computer systems. More particularly, the present invention relates to methods and devices containing a security partition and a disc drive architecture for securing information in a system, which may be connected to a networked environment. [0003] Computer operating systems or platforms play a central role in electronic commerce, as well as in day-to-day business operations for large and small companies alike. As more computer systems become connected to networks (private and public), the need to secure information has become critical. Unfortunately, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F3/06G06F21/62G06F12/14G06F21/60
CPCG06F3/0601G06F2003/0697G06F21/805G06F3/0644G06F3/0674G06F3/0622G06F3/0637
Inventor THIBADEAU, ROBERT HARWELL
Owner SEAGATE TECH LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products