STORAGE DEVICE HAVING AN ANTI-MALWARE PROTECTION
First Claim
1. A method of protecting a storage device when interfacing with a host device, the method comprising:
- operatively interfacing a storage device with a host device, the storage device including a storage area for storing data, a storage controller for managing the storage area, and a security processor;
upon interfacing the storage device with the host device, operating the security processor in a “
security”
mode in which the security processor filters commands that are received from the host device and are targeted to the storage controller; and
upon determining by the security processor that the “
security”
mode is no longer required, operating the security processor in a “
safe”
mode in which the security processor (i) does not filter commands it receives from the host device and (ii) forwards to the storage controller such unfiltered commands.
2 Assignments
0 Petitions
Accused Products
Abstract
A storage device is protected, when interfaced with a host device, by operating a security processor of the storage device in a “security” mode in which the security processor filters commands that are received from the host device and are targeted to the storage controller, and upon determining by the security processor that the “security” mode is no longer required, by operating the security processor in a “safe” mode in which the security processor (i) does not filter commands it receives from the host device and (ii) forwards to a storage controller of the storage device such unfiltered commands.
27 Citations
11 Claims
-
1. A method of protecting a storage device when interfacing with a host device, the method comprising:
-
operatively interfacing a storage device with a host device, the storage device including a storage area for storing data, a storage controller for managing the storage area, and a security processor; upon interfacing the storage device with the host device, operating the security processor in a “
security”
mode in which the security processor filters commands that are received from the host device and are targeted to the storage controller; andupon determining by the security processor that the “
security”
mode is no longer required, operating the security processor in a “
safe”
mode in which the security processor (i) does not filter commands it receives from the host device and (ii) forwards to the storage controller such unfiltered commands. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification