Secure data storage device
First Claim
1. A secure storage system for protecting data exchanged between a first and second computer both capable of requesting the reading of data and the writing of data, the secure storage system comprising:
- an active connector capable of receiving data or sending data, coupled to the first computer;
a passive connector capable of receiving data or sending data, coupled to the second computer;
a disk controller coupled to the passive connector;
a disk electronics unit coupled to the disk controller;
a storage media having stored data written from the first computer capable of processing simultaneous requests from the first and second computers, the storage media coupled to the disk electronics unit and allowing the second computer to read the stored data and ignores any command received from the passive connector to write data on the storage media.
4 Assignments
0 Petitions
Accused Products
Abstract
A data storage/transmission hardware device (or multiple devices physically linked together) with two (or more) access channels is disclosed. One of the access channels allows for reading and writing of information (referred to as the “active channel”) while the other access channel(s) (referred to as “passive channels”) allow solely for the reading of information. The actual limitation of “write” access of the passive access channels is brought about by a combination of hardware and firmware. The information stored/or transmitted through the device may be (but is not limited to) data such as digital, graphical, image, multi-media, stream or any other type of computing information. This methodology spans multiple media and computing device types. This method can be physically implemented through the use of a shared media between the dynamic and passive channel(s) or it can be implemented with separate media for each primary/passive channel with added software/firmware that relays information from the primary channel media to the passive channel media.
48 Citations
29 Claims
-
1. A secure storage system for protecting data exchanged between a first and second computer both capable of requesting the reading of data and the writing of data, the secure storage system comprising:
-
an active connector capable of receiving data or sending data, coupled to the first computer;
a passive connector capable of receiving data or sending data, coupled to the second computer;
a disk controller coupled to the passive connector;
a disk electronics unit coupled to the disk controller;
a storage media having stored data written from the first computer capable of processing simultaneous requests from the first and second computers, the storage media coupled to the disk electronics unit and allowing the second computer to read the stored data and ignores any command received from the passive connector to write data on the storage media. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
a second disk controller coupled to the active connector;
a second disk electronics unit coupled to the active connector;
wherein the disk controller and disk electronics unit control the storage media when the second computer requests data to be read or written and wherein the second disk controller and second disk electronics unit control the storage media when the first computer requests data to be read or written.
-
-
12. The system in claim 1 wherein the storage media is a hard disk.
-
13. The system in claim 1 wherein the storage media includes:
-
a magnetic platter storing data;
a read only head coupled to an actuator arm controlled by the disk electronics which reads data requested by the second computer; and
a read/write head coupled to a second actuator arm controlled by the disk electronics which reads data requested by the first computer and writes data received from the first computer.
-
-
14. The system in claim 1 wherein the active and passive connections are Ethernet connections.
-
15. The system in claim 1 wherein the active and passive connections are fiber optics.
-
16. A method of making data from a first computer available to a second computer while preventing alteration of the data, the method comprising:
-
establishing an active data connection to the first computer;
establishing a passive data connection for the second computer;
writing data on a storage device from the first computer;
examining requests from the second computer and restricting access to the storage device from the second computer by ignoring all requests for writing data from the second computer to the storage device; and
allowing the processing of simultaneous requests to the storage device from the first and second computers. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25)
assigning a first unique identification address to the passive connector; and
assigning a second unique identification address to the active connector.
-
-
18. The method in claim 17 further comprising:
-
reading data received from the first and second computer and assigning the data the first or second unique identification address;
identifying whether the data is from the active and passive connection by the first and second unique identification address; and
processing commands in response based on whether the data is from the passive or active connection.
-
-
19. The method in claim 17 further comprising:
-
determining the unique identifier for the active connection;
determining the unique identifier for the passive connection;
modifying firmware for hardware controlling the storage media to store the unique identifiers for the active and passive connection;
modifying firmware to control the storage media to write data having only the unique identifier for the active connection;
loading the modified firmware into the secure storage device.
-
-
20. The method in claim 19 wherein the storage device is a hard drive and the firmware is part of a disk controller coupled to a disk electronics unit for controlling the storage device.
-
21. The method in claim 19 wherein the storage device is a hard drive and the firmware is part of a disk electronics unit which controls the storage device.
-
22. The method in claim 18 further comprising rejecting data received from the passive connection and sending an error message to the passive connection.
-
23. The method in claim 16 wherein the passive connection is an Internet connection.
-
24. The method in claim 16 wherein the passive and active connections are Ethernet connections.
-
25. The method in claim 21 wherein the passive and active connections are fiber optics.
-
26. A computing system for the secure exchange of data and prevent data tampering, the system comprising:
-
a first computing source having protectable data and an external data conduit;
a second computing source having an external data conduit; and
a secure storage device having an active connector coupled to the external data conduit of the first computing source and a passive connector coupled to the external data conduit of the second computing source, the secure storage device including a storage media which stores the protectable data and accepts requests to write the protectable data from the first computing source, allows reading of the protectable data by the second computing source, allows processing simultaneous requests from the first and second computers and ignores requests to write data on the secure storage device from the second computing source. - View Dependent Claims (27, 28, 29)
-
Specification