Methods and systems for promoting security in a computer system employing attached storage devices
First Claim
1. A data storage device comprising:
- a data storage medium;
a secure area defined on the data storage medium, the secure area containing at least one record for determining access to associated data and the associated data; and
a controller within the data storage device adapted to control access to the associated data based on the at least one record.
6 Assignments
0 Petitions
Accused Products
Abstract
The present methods and systems use specially isolated techniques for promoting security in a computer system. In one embodiment of these methods and systems, a simple file system is concealed in the storage of the computer system and is managed with a processor and simple non-writeable code operating on the storage device. Strong cryptographic design permits the present computer security methods and systems to secure data on the storage device. In one method embodiment, a computer system is provided with an operating system in operative association with at least one storage device, wherein the storage device includes firmware and a processor for processing data and instructions stored on the storage device. The method includes creating at least one security partition in, and restricting access to, at least a portion of the storage device by the operating system. The method also includes creating at least one security partition in the storage device. The method also includes providing at least one authority record and data associated with the authority record in the storage device. System and computer-readable medium embodiments structured in accordance with the method embodiments discussed herein are also provided.
78 Citations
29 Claims
-
1. A data storage device comprising:
-
a data storage medium;
a secure area defined on the data storage medium, the secure area containing at least one record for determining access to associated data and the associated data; and
a controller within the data storage device adapted to control access to the associated data based on the at least one record. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
- 15. based on established procedure calls within the data storage device and security features built into one or more user applications.
-
15-1. A method for securing data in a data storage device comprising:
-
storing one or more records for determining access to associated data and the associated data in one or more secure partitions formed on a data storage medium of the data storage device; and
controlling with a controller in the data storage device access to the associated data by an operating system of an attached computer system based upon the at least one record.
-
-
22. A data storage device comprising:
-
a data storage medium;
a secure area defined on the data storage medium, the secure area containing at least one record for determining access to associated data and the associated data; and
a controller within the data storage device adapted to control access to any data stored within the secure area based on the at least one record. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
Specification