Enabling access to removable hard disk drives
First Claim
1. A method for accessing a device, the method comprising:
- storing, by the device, a set of keys in a data structure in the device;
responsive to the device in a locked state being connected to a data processing system after an operating system running on the data processing system is running, receiving, by the device, a first key from the operating system, wherein the device may not be accessed or used by the data processing system while in a locked state, wherein the device is selected from one of a storage device, a peripheral device, a hard disk drive, a solid state drive, a universal serial bus drive, and a printer;
comparing, by the device, the first key received from the operating system for the data processing system with the set of keys stored in the device, wherein the first key is based on a system identifier for the data processing system and a first password;
determining, by the device, whether a match is present between the first key and the set of keys;
responsive to a determination that the match is present, changing, by the device, the device from the locked state to an unlocked state;
responsive to an absence of the determination that the match is present, waiting, by the device, for an administrative password for the device;
responsive determining that the administrative password is valid, determining, by the device, whether space is available within the data structure to add additional keys;
responsive to determining that space is available within the data structure, retrieving, by the device, the system identifier from the data processing system, and receiving the password;
responsive to retrieving the system identifier and receiving the password, generating a second key, wherein the key is based on a system identifier for the data processing system and a second password; and
responsive to generating the second key, storing the second key in the data structure.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, apparatus, and computer program product for accessing a device. The device receives a key from an operating system in response to the device in a locked state being connected to a data processing system after the operating system for the data processing system is running. The device compares the key received from the operating system with a set of keys stored in the device. The key is based on a system identifier for the data processing system and a password. The device determines whether a match is present between the key and the set of keys. The device changes the device from the locked state to an unlocked state in response to a determination that the match is present.
-
Citations
17 Claims
-
1. A method for accessing a device, the method comprising:
-
storing, by the device, a set of keys in a data structure in the device; responsive to the device in a locked state being connected to a data processing system after an operating system running on the data processing system is running, receiving, by the device, a first key from the operating system, wherein the device may not be accessed or used by the data processing system while in a locked state, wherein the device is selected from one of a storage device, a peripheral device, a hard disk drive, a solid state drive, a universal serial bus drive, and a printer; comparing, by the device, the first key received from the operating system for the data processing system with the set of keys stored in the device, wherein the first key is based on a system identifier for the data processing system and a first password; determining, by the device, whether a match is present between the first key and the set of keys; responsive to a determination that the match is present, changing, by the device, the device from the locked state to an unlocked state; responsive to an absence of the determination that the match is present, waiting, by the device, for an administrative password for the device; responsive determining that the administrative password is valid, determining, by the device, whether space is available within the data structure to add additional keys; responsive to determining that space is available within the data structure, retrieving, by the device, the system identifier from the data processing system, and receiving the password; responsive to retrieving the system identifier and receiving the password, generating a second key, wherein the key is based on a system identifier for the data processing system and a second password; and responsive to generating the second key, storing the second key in the data structure. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus comprising:
-
a device having a set of keys stored thereon, wherein the device has a locked state and an unlocked state; and an access system located in the device, wherein the access system is configured to receive a first key from an operating system in response to the device in the locked state being connected to a data processing system after the operating system running on the data processing system is running, wherein the device may not be accessed or used by the data processing system while in a locked state, wherein the device is selected from one of a storage device, a peripheral device, a hard disk drive, a solid state drive, a universal serial bus drive, and a printer;
compare the first key received from the operating system for the data processing system with the set of keys stored in the device, wherein the first key is based on a system identifier for the data processing system and a first password;
determine whether a match is present between the first key and the set of keys; and
change the device from the locked state to an unlocked state in response to a determination that the match is present;
wait for an administrative password for the device in response to an absence of the determination that the match is present;
determine whether space is available within the data structure to add additional keys in response to determining that the administrative password is valid;
retrieve a system identifier for the data processing system and receive a password in response to determining that space is available within the data structure;
generate a second key, wherein the second key is based on a system identifier for the data processing system and a second password, in response to retrieving the system identifier and receiving the password; and
store the second key in the data structure in response to generating a second key. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A computer program product for accessing a device comprising:
-
a non-transitory computer readable storage medium; program code, stored on the computer readable storage medium, for storing a set of keys in a data structure in the device; program code, stored on the computer readable storage medium, for receiving a first key from an operating system in response to the device in a locked state being connected to a data processing system after the operating system running on the data processing system is running, wherein the device may not be accessed or used by the data processing system while in a locked state, wherein the device is selected from one of a storage device, a peripheral device, a hard disk drive, a solid state drive, a universal serial bus drive, and a printer; program code, stored on the computer readable storage medium, for comparing the first key received from the operating system for the data processing system with a set of keys stored in the device, wherein the first key is based on a system identifier for the data processing system and a first password; program code, stored on the computer readable storage medium, for determining whether a match is present between the first key and the set of keys; program code, stored on the computer readable storage medium, for changing the device from the locked state to an unlocked state in response to a determination that the match is present; program code, stored on the computer readable storage medium, for waiting for an administrative password for the device in response to an absence of the determination that the match is present; program code, stored on the computer readable storage medium, for determining whether space is available within the data structure to add additional keys in response to determining that the administrative password is valid; program code, stored on the computer readable storage medium, for retrieving a system identifier for the data processing system and for receiving a password in response to determining that space is available within the data structure; program code, stored on the computer readable storage medium, for generating a second key, wherein the second key is based on a system identifier for the data processing system and a second password, in response to retrieving the system identifier and receiving the password; and program code, stored on the computer readable storage medium, for storing the second key in the data structure in response to generating a second key. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification