Managing access to an address range in a storage device
First Claim
1. A method for managing access to an addressable memory location in a storage device, the method comprising:
- in a storage device with a storage media that has addressable memory locations, a set of one or more of which being identified by an address range of contiguous addresses associated with a first characteristic and a second characteristic, managing access to such addressable memory locations by;
receiving a request from a requesting entity to access an addressable memory location in the storage media;
applying the first characteristic if the addressable memory location is within the set of addressable memory locations and at that time any entity is currently authenticated to and authorized to access the set of addressable memory locations, wherein an entity that is currently authenticated to and authorized to access the set of addressable memory locations has successfully completed an authentication and authorization process and wherein the requesting entity may access the set of addressable memory locations without having to perform an authentication and authorization process; and
applying the second characteristic if the addressable memory location is within the set of addressable memory locations and at that time no entity is authenticated to and authorized to access the set of addressable memory locations.
4 Assignments
0 Petitions
Accused Products
Abstract
Enhanced configuration of security and access control for data in a storage device is disclosed. A request is received to access an addressable memory location in a storage media within the storage device. A set of addressable memory locations with contiguous addresses identified by an address range is associated with first and second characteristics. The first characteristic is applied if the addressable memory location is within the set of addressable memory locations, and an entity is currently authenticated to and authorized to access the set of addressable memory locations. The second characteristic is applied if the addressable memory location is within the set of addressable memory locations, and no entity is currently authenticated to and authorized to access the set of addressable memory locations. The set of addressable memory locations can also be a logical partition, where the first and second characteristics are stored in a logical partition table.
-
Citations
38 Claims
-
1. A method for managing access to an addressable memory location in a storage device, the method comprising:
-
in a storage device with a storage media that has addressable memory locations, a set of one or more of which being identified by an address range of contiguous addresses associated with a first characteristic and a second characteristic, managing access to such addressable memory locations by; receiving a request from a requesting entity to access an addressable memory location in the storage media; applying the first characteristic if the addressable memory location is within the set of addressable memory locations and at that time any entity is currently authenticated to and authorized to access the set of addressable memory locations, wherein an entity that is currently authenticated to and authorized to access the set of addressable memory locations has successfully completed an authentication and authorization process and wherein the requesting entity may access the set of addressable memory locations without having to perform an authentication and authorization process; and applying the second characteristic if the addressable memory location is within the set of addressable memory locations and at that time no entity is authenticated to and authorized to access the set of addressable memory locations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A storage device, comprising:
-
a storage media that has addressable memory locations, a set of one or more of which being identified by an address range of contiguous addresses associated with a first characteristic and a second characteristic; and a controller operable to; receive a request from a requesting entity to access an addressable memory location in the storage media; apply the first characteristic if the addressable memory location is within the set of addressable memory locations and at that time any entity is currently authenticated to and authorized to access the set of addressable memory locations, wherein an entity that is currently authenticated to and authorized to access the set of addressable memory locations has successfully completed an authentication and authorization process and wherein the requesting entity may access the set of addressable memory locations without having to perform an authentication and authorization process; and apply the second characteristic if the addressable memory location is within the set of addressable memory locations and at that time no entity is authenticated to and authorized to access the set of addressable memory locations. - View Dependent Claims (34, 35, 36, 37, 38)
-
Specification