SELF-PROTECTING STORAGE DEVICE
First Claim
1. A self-protecting storage device comprising:
- a data storage module; and
a verification module in communication with the data storage module and adapted to receive access commands from a host system, the verification module configured to detect a watermark inserted into the access commands by the host system and to determine if the watermark is associated with an authorized attempt to access the data storage module, the verification module enabling access to the data storage module when the watermark is determined to be associated with an authorized attempt to access the data storage module.
1 Assignment
0 Petitions
Accused Products
Abstract
Described are a self-protecting storage device and method that can be used to monitor attempts to access protected information. Access is allowed for authorized host systems and devices while unauthorized access is prevented. Authorization use includes inserting a watermark into access commands, such as I/O requests, sent to the storage device. The access commands are verified before access is permitted. In one embodiment, block addresses in I/O requests are encrypted at the host device and decrypted at the self-protecting storage device. Decrypted block addresses are compared to an expected referencing pattern. If a sufficient match is determined, access to the stored information is provided. Self-protection can be provided to a range of storage devices including, for example, SD flash memory, USB thumb drives, computer hard drives and network storage devices. A variety of host devices can be used with the self-protecting storage devices, such as cell phones and digital cameras.
-
Citations
32 Claims
-
1. A self-protecting storage device comprising:
-
a data storage module; and a verification module in communication with the data storage module and adapted to receive access commands from a host system, the verification module configured to detect a watermark inserted into the access commands by the host system and to determine if the watermark is associated with an authorized attempt to access the data storage module, the verification module enabling access to the data storage module when the watermark is determined to be associated with an authorized attempt to access the data storage module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for accessing a protected storage device, the method comprising:
-
generating a plurality of access commands for the protected storage device; inserting a watermark into the access commands; sending the access commands with the inserted watermark to the protected storage device; and providing access to the protected storage device if the watermark is determined to be associated with an authorized attempt to access the protected storage device. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
Specification