×

Enabling access to removable hard disk drives

  • US 8,924,733 B2
  • Filed: 06/14/2010
  • Issued: 12/30/2014
  • Est. Priority Date: 06/14/2010
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for accessing a device, the method comprising:

  • storing, by the device, a set of keys in a data structure in the device;

    responsive to the device in a locked state being connected to a data processing system after an operating system running on the data processing system is running, receiving, by the device, a first key from the operating system, wherein the device may not be accessed or used by the data processing system while in a locked state, wherein the device is selected from one of a storage device, a peripheral device, a hard disk drive, a solid state drive, a universal serial bus drive, and a printer;

    comparing, by the device, the first key received from the operating system for the data processing system with the set of keys stored in the device, wherein the first key is based on a system identifier for the data processing system and a first password;

    determining, by the device, whether a match is present between the first key and the set of keys;

    responsive to a determination that the match is present, changing, by the device, the device from the locked state to an unlocked state;

    responsive to an absence of the determination that the match is present, waiting, by the device, for an administrative password for the device;

    responsive determining that the administrative password is valid, determining, by the device, whether space is available within the data structure to add additional keys;

    responsive to determining that space is available within the data structure, retrieving, by the device, the system identifier from the data processing system, and receiving the password;

    responsive to retrieving the system identifier and receiving the password, generating a second key, wherein the key is based on a system identifier for the data processing system and a second password; and

    responsive to generating the second key, storing the second key in the data structure.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×