Method for creating control structure for versatile content control
First Claim
1. A secure storage method for use in a storage system, comprising a non-volatile memory;
- and a controller controlling access to the memory, said method comprising;
creating, by means of a system agent stored in the controller or the memory, at least one hierarchical tree comprising nodes at different levels for controlling access to data stored in the memory by corresponding entities, wherein each node of the at least one tree specifies permission(s) of a corresponding entity or entities for accessing memory data, wherein permission(s) at a node of each of the trees has a predetermined relationship to permission(s) at another node at a higher or lower level in the same tree; and
using the at least one hierarchical tree to control access to memory data.
3 Assignments
0 Petitions
Accused Products
Abstract
The mobile storage device may be provided with a system agent that is able to create at least one hierarchical tree comprising nodes at different levels for controlling access to data stored in the memory by corresponding entities. Each node of the tree specifies permission or permissions of a corresponding entity or entities for accessing memory data. The permission or permissions at the node of each of the trees has a predetermined relationship to permission or permissions at nodes at a higher or lower or the same level in the same tree. Thus, the mobile storage devices may be issued without any trees already created so that the purchaser of the devices has a free hand in creating hierarchical trees adapted to the applications the purchaser has in mind. Alternatively, the mobile storage devices may also be issued with the trees already created so that a purchaser does not have to go through the trouble of creating the trees. In both situations, preferably certain functionalities of the trees can become fixed after the devices are made so that they cannot be further changed or altered. This provides greater control over access to the content in the device by the content owner. Thus, in one embodiment, the system agent can preferably be disabled so that no additional trees can be created.
-
Citations
13 Claims
-
1. A secure storage method for use in a storage system, comprising a non-volatile memory;
- and a controller controlling access to the memory, said method comprising;
creating, by means of a system agent stored in the controller or the memory, at least one hierarchical tree comprising nodes at different levels for controlling access to data stored in the memory by corresponding entities, wherein each node of the at least one tree specifies permission(s) of a corresponding entity or entities for accessing memory data, wherein permission(s) at a node of each of the trees has a predetermined relationship to permission(s) at another node at a higher or lower level in the same tree; and
using the at least one hierarchical tree to control access to memory data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
- and a controller controlling access to the memory, said method comprising;
Specification