Hidden plug-in storage drive for data integrity
First Claim
1. A storage device for storing data, the storage device comprising:
- a secure storage drive including a flash memory storage area;
a first portion of firmware instructions pertaining to access to the secure storage drive, the first portion of firmware instructions having access to unhide information stored on the secure storage drive, the unhide information pertaining to unhiding the secure storage drive;
a second portion of firmware instructions pertaining to access to the flash memory storage area; and
a data access controller configured to utilize the first and second portions of firmware instructions to control access to the secure storage drive and the flash memory storage area;
wherein the first portion of firmware instructions comprise instructions that initiate execution upon connection of the secure storage drive to a computer device, and prevent completion of an enumeration process of the secure storage drive with the computer device unless the computer device provides proper authentication information upon a start of the enumeration process of the secure storage drive with the computer device, the proper authentication information corresponding to the unhide information, andwherein upon receipt of the proper authentication information, the first portion of firmware instructions allows completion of the enumeration process of the secure storage drive with the computer device and allow the second portion of firmware instructions to control access requests from the computer device to the flash memory storage area.
5 Assignments
0 Petitions
Accused Products
Abstract
A secure (e.g., protected) storage drive for use with an associated computer device is disclosed. The secure storage drive allows access only when properly authenticated to the computer device attempting to access the secure storage drive. Additionally, other levels of authentication may be required prior to allowing access. For example, access may only be allowed if both the computer device and a user authenticated to the computer device are recognized by the secure storage drive. If access to the secure storage drive is not permitted, then the secure storage drive may remain hidden and not accessible to the operating system of the computer device. Accordingly, if hidden, no command of the operating system of the computer device can access, alter, or erase data on the secure storage drive.
209 Citations
23 Claims
-
1. A storage device for storing data, the storage device comprising:
-
a secure storage drive including a flash memory storage area; a first portion of firmware instructions pertaining to access to the secure storage drive, the first portion of firmware instructions having access to unhide information stored on the secure storage drive, the unhide information pertaining to unhiding the secure storage drive; a second portion of firmware instructions pertaining to access to the flash memory storage area; and a data access controller configured to utilize the first and second portions of firmware instructions to control access to the secure storage drive and the flash memory storage area; wherein the first portion of firmware instructions comprise instructions that initiate execution upon connection of the secure storage drive to a computer device, and prevent completion of an enumeration process of the secure storage drive with the computer device unless the computer device provides proper authentication information upon a start of the enumeration process of the secure storage drive with the computer device, the proper authentication information corresponding to the unhide information, and wherein upon receipt of the proper authentication information, the first portion of firmware instructions allows completion of the enumeration process of the secure storage drive with the computer device and allow the second portion of firmware instructions to control access requests from the computer device to the flash memory storage area. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer system configured to access a secure storage drive, the computer system comprising:
-
an operating system; a memory for loading the operating system thereto; a processor for executing the operating system; and one or more device drivers, the one or more device drivers providing an interface between physical hardware and the operating system; wherein a first of the one or more device drivers comprises instructions to interface with a secure storage drive, the instructions to interface comprising instructions to cause the first device driver to; initiate execution on the processor upon detection of connection of a device that may later be determined to be the secure storage drive; determine whether or not the device is the secure storage drive; provide, upon a start of an enumeration process of the secure storage drive with the computer system, unhide information to the secure storage drive based on a determination that the device is the secure storage drive; receive a response at the processor from the secure storage drive after providing the unhide information; and provide an interface between the operating system and the secure storage drive if the received response passes one or more authentication criteria, the interface allowing access to a data storage area on the secure storage drive, wherein completion of the enumeration process of the secure storage drive with the computer system is prevented unless the received response passes the one or more authentication criteria. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A non-transitory computer readable medium comprising instructions stored thereon that when executed by a processor cause the processor to configure one or more device drivers on a computer system or computer device, the one or more device drivers providing an interface between physical hardware and an operating system;
wherein a first of the one or more device drivers comprises instructions to interface with a secure storage drive, the instructions to interface comprising instructions to cause the first device driver to; initiate execution upon detection of connection of a device that may later be determined to be the secure storage drive; determine whether or not the device is the secure storage drive; provide, upon a start of an enumeration process of the secure storage drive with the operating system, unhide information to the secure storage drive based on a determination that the device is the secure storage drive; receive a response from the secure storage drive after providing the unhide information; and provide an interface between the operating system and the secure storage drive if the received response passes one or more authentication criteria, the interface allowing access to a data storage area on the secure storage drive, wherein completion of the enumeration process of the secure storage drive with the operating system is prevented unless the received response passes the one or more authentication criteria. - View Dependent Claims (23)
Specification