×

Methods, systems, and apparatuses for managing a hard drive security system

  • US 10,181,041 B2
  • Filed: 10/29/2015
  • Issued: 01/15/2019
  • Est. Priority Date: 03/01/2011
  • Status: Active Grant
First Claim
Patent Images

1. A system for use with an electronic device, the electronic device comprising a self-encrypting drive (SED), the SED comprising a nominal space and a pre-boot region, wherein the nominal space can be locked to prevent access to the nominal space, the system comprising:

  • a SED management component configured to be loaded in the pre-boot region of the SED, the SED management component comprising;

    a pre-boot operating system (OS); and

    an access management functionality,wherein the access management functionality comprises an authentication mapping utility operable to provide mapping between a nominal credential of a user and a SED credential of the user,wherein the SED management component is configured to generate a driver session key (DSK), to encrypt an SED credential with the DSK, and to encrypt the DSK with a hash made of the nominal credentials of a given user,wherein the encrypting of the SED credential with the DSK comprises encrypting a SED credential of an authorized user with the DSK, and storing the encrypted SED credential in the pre-boot region,wherein the encrypting of the DSK with a hash made of the nominal credentials of a given user comprises, for each of one or more additional users, creating a hash of the respective additional user'"'"'s nominal credentials, creating a respective encrypted version of the DSK using the respective hash, and storing the respective one or more encrypted versions of the DSK in the pre-boot region, andwherein the SED management component is further configured to;

    with the nominal space locked, upon entry of a nominal credential of a given one of the one or more additional users, hash the entered nominal credential to create a hash, and use the hash to attempt to decrypt the encrypted version of the DSK created for the given one of the one or more additional users;

    if the attempt to decrypt is successful, use the decrypted version of the DSK created for the given one of the one or more additional users to decrypt the encrypted SED credential, and use the decrypted SED credential to unlock the nominal space, andif the attempt to decrypt fails a predetermined number of times, lock the electronic device.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×