MANAGING SECURITY OPERATING MODES
First Claim
Patent Images
1. A method comprising:
- managing security of a storage device that is provisioned using a first security protocol via security management of a second security protocol.
2 Assignments
0 Petitions
Accused Products
Abstract
A storage device that supports Trusted Computer Group (TCG) security allows management of TCG security features by a Basic Input/Output System (BIOS) using non-TCG security commands supported by the BIOS. In one implementation, a BIOS that does not support TCG security but does support ATA security can use ATA drive unlock to invoke TCG drive unlock on the storage device. Further, the storage device can be transitioned among multiple security operating modes (e.g., Undeclared, ATA security or TCG security).
-
Citations
20 Claims
-
1. A method comprising:
managing security of a storage device that is provisioned using a first security protocol via security management of a second security protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A storage device configured to:
manage security of a storage device that is provisioned using a first security protocol via security management of a second security protocol. - View Dependent Claims (10, 11, 12, 13, 14)
-
15. A storage device configured to:
support two or more storage security protocols using defined transitions between different security operating modes that determine which storage security protocol is managing security for the security device. - View Dependent Claims (16, 17, 18, 19, 20)
Specification