CN109522738A - 数据储存装置 - Google Patents
数据储存装置 Download PDFInfo
- Publication number
- CN109522738A CN109522738A CN201810010082.6A CN201810010082A CN109522738A CN 109522738 A CN109522738 A CN 109522738A CN 201810010082 A CN201810010082 A CN 201810010082A CN 109522738 A CN109522738 A CN 109522738A
- Authority
- CN
- China
- Prior art keywords
- state
- mode
- instruction
- memory device
- enterprise
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (14)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2017-180715 | 2017-09-20 | ||
JP2017180715A JP6789906B2 (ja) | 2017-09-20 | 2017-09-20 | データ蓄積装置 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109522738A true CN109522738A (zh) | 2019-03-26 |
CN109522738B CN109522738B (zh) | 2023-07-18 |
Family
ID=65720328
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810010082.6A Active CN109522738B (zh) | 2017-09-20 | 2018-01-05 | 数据储存装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US10698838B2 (zh) |
JP (1) | JP6789906B2 (zh) |
CN (1) | CN109522738B (zh) |
TW (1) | TWI669609B (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10732889B2 (en) * | 2018-03-12 | 2020-08-04 | Dell Products, L.P. | Information handling system with multi-key secure erase of distributed namespace |
US11595204B2 (en) * | 2019-06-04 | 2023-02-28 | EMC IP Holding Company LLC | Adaptive re-keying in a storage system |
CN115859395A (zh) * | 2023-03-02 | 2023-03-28 | 北京神州慧安科技有限公司 | 一种具有防盗功能的硬盘及其应用的方法 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005352962A (ja) * | 2004-06-14 | 2005-12-22 | Sony Corp | 情報管理装置及び情報管理方法 |
US20110087890A1 (en) * | 2009-10-09 | 2011-04-14 | Lsi Corporation | Interlocking plain text passwords to data encryption keys |
JP2012191511A (ja) * | 2011-03-11 | 2012-10-04 | Nec Corp | 記憶装置制御システム及び記憶装置制御システムの記憶装置管理方法 |
CN104240758A (zh) * | 2013-06-11 | 2014-12-24 | 慧荣科技股份有限公司 | 数据储存装置及其管理方法 |
JP2017076413A (ja) * | 2016-11-24 | 2017-04-20 | 株式会社リコー | 情報処理装置、情報処理方法及びプログラム |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002278838A (ja) * | 2001-03-15 | 2002-09-27 | Sony Corp | メモリアクセス制御システム、デバイス管理装置、パーティション管理装置、メモリ搭載デバイス、およびメモリアクセス制御方法、並びにプログラム記憶媒体 |
US20030225962A1 (en) * | 2002-05-31 | 2003-12-04 | Hitachi, Ltd. | Memory card and memory card system |
JP2004178337A (ja) * | 2002-11-28 | 2004-06-24 | Hitachi Ltd | 記憶装置システム、記憶装置、計算機およびプログラム |
CN1595517A (zh) * | 2003-09-10 | 2005-03-16 | 西安三茗科技有限责任公司 | 一种硬盘分区安全锁定的方法 |
JP2007528542A (ja) * | 2004-03-05 | 2007-10-11 | セキュアー システムズ リミテッド | パーティションアクセスコントロールシステムおよびパーティションアクセスを制御するための方法 |
US8230235B2 (en) | 2006-09-07 | 2012-07-24 | International Business Machines Corporation | Selective encryption of data stored on removable media in an automated data storage library |
WO2008046101A2 (en) * | 2006-10-13 | 2008-04-17 | Ariel Silverstone | Client authentication and data management system |
JP2009110428A (ja) * | 2007-10-31 | 2009-05-21 | Toshiba Corp | 情報処理装置および制御方法 |
WO2010019593A1 (en) * | 2008-08-11 | 2010-02-18 | Assa Abloy Ab | Secure wiegand communications |
US8230238B2 (en) * | 2008-08-25 | 2012-07-24 | International Business Machines Corporation | Estimating power consumption in a computing environment |
EP2702592A4 (en) * | 2011-04-29 | 2014-11-19 | Lsi Corp | ENCRYPTED TRANSPORTATION PANEL CONTROL |
CN103797492B (zh) * | 2011-07-27 | 2016-09-21 | 希捷科技有限公司 | 用于安全存储劫持保护的方法和装置 |
KR101271996B1 (ko) * | 2011-09-02 | 2013-06-05 | 엘지전자 주식회사 | 외부기기 리스트 제공방법 및 그를 이용한 영상 표시 기기 |
US9772875B2 (en) * | 2011-11-29 | 2017-09-26 | Dell Products L.P. | Multiple framework level modes |
WO2013095565A1 (en) * | 2011-12-22 | 2013-06-27 | Intel Corporation | Systems and methods for providing anti-malware protection on storage devices |
CA2903807C (en) * | 2013-03-04 | 2019-09-03 | Docusign, Inc. | Systems and methods for cloud data security |
MY181303A (en) * | 2013-10-07 | 2020-12-21 | Fornetix Llc | System and method for encryption key management, federation and distribution |
CN105989299A (zh) * | 2014-11-13 | 2016-10-05 | 株式会社东芝 | 存储装置的管理方法及计算机系统 |
US9659170B2 (en) * | 2015-01-02 | 2017-05-23 | Senteon LLC | Securing data on untrusted devices |
JP2017010347A (ja) * | 2015-06-24 | 2017-01-12 | 株式会社東芝 | 情報処理装置 |
-
2017
- 2017-09-20 JP JP2017180715A patent/JP6789906B2/ja active Active
- 2017-12-11 TW TW106143297A patent/TWI669609B/zh active
-
2018
- 2018-01-05 CN CN201810010082.6A patent/CN109522738B/zh active Active
- 2018-03-07 US US15/913,963 patent/US10698838B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005352962A (ja) * | 2004-06-14 | 2005-12-22 | Sony Corp | 情報管理装置及び情報管理方法 |
US20110087890A1 (en) * | 2009-10-09 | 2011-04-14 | Lsi Corporation | Interlocking plain text passwords to data encryption keys |
JP2012191511A (ja) * | 2011-03-11 | 2012-10-04 | Nec Corp | 記憶装置制御システム及び記憶装置制御システムの記憶装置管理方法 |
CN104240758A (zh) * | 2013-06-11 | 2014-12-24 | 慧荣科技股份有限公司 | 数据储存装置及其管理方法 |
JP2017076413A (ja) * | 2016-11-24 | 2017-04-20 | 株式会社リコー | 情報処理装置、情報処理方法及びプログラム |
Also Published As
Publication number | Publication date |
---|---|
JP2019057811A (ja) | 2019-04-11 |
TW201915753A (zh) | 2019-04-16 |
CN109522738B (zh) | 2023-07-18 |
TWI669609B (zh) | 2019-08-21 |
US10698838B2 (en) | 2020-06-30 |
JP6789906B2 (ja) | 2020-11-25 |
US20190087353A1 (en) | 2019-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104823207B (zh) | 通过与随机成分组合来保护用于移动支付应用程序的个人识别号码 | |
JP6640320B1 (ja) | トークン管理システムおよびトークン管理方法 | |
US9626302B2 (en) | Encrypting and decrypting a virtual disc | |
CN107454958B (zh) | 使用多个嵌套页表隔离客户机代码和数据 | |
CN105830082B (zh) | 虚拟机保证 | |
CN109522738A (zh) | 数据储存装置 | |
CN109542334A (zh) | 存储器装置 | |
CN105612715A (zh) | 具有可配置访问控制的安全处理单元 | |
JP2004272400A (ja) | メモリカード | |
CN104380652A (zh) | 用于nfc使能设备的多发行商安全元件分区架构 | |
CN108139984A (zh) | 安全子系统 | |
US10635820B1 (en) | Update policy-based anti-rollback techniques | |
US11436367B2 (en) | Pre-operating system environment-based sanitization of storage devices | |
JP2021534485A (ja) | 自己規制トークンを引き出すために、ホワイトリストに登録されたトランザクションアドレスを必要とする自己規制トークンの、トランザクションアドレスへの転送を許可する前に、トランザクションアドレスがホワイトリストに登録されていることを確認すること | |
US9749374B2 (en) | Systems and methods for digital fulfillment of streaming applications | |
TW201913494A (zh) | 基於區塊鏈智能合約的去中心化kyc系統及其方法 | |
KR20210151172A (ko) | 기한 관리 서버, 에이전트·프로그램 및 단말 대출 시스템 | |
CN107077571A (zh) | 在可信平台模块中的操作系统上下文的表示 | |
CN105324774B (zh) | 许可程序的装置、程序交易装置及其许可程序的方法 | |
US20150242617A1 (en) | Information processing device, information processing method, and computer program | |
Wright | Turing Complete Bitcoin Script White Paper | |
US20150310230A1 (en) | Cryptographic processing apparatus, cryptographic processing system, and cryptographic processing method | |
US20210357891A1 (en) | Systems and methods for creating and activating a license | |
CN104737173B (zh) | 基于开发者简档的许可证信息访问 | |
CN105893830B (zh) | 学生ic卡业务管理方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Tokyo Applicant after: Kaixia Co.,Ltd. Address before: Tokyo Applicant before: TOSHIBA MEMORY Corp. Address after: Tokyo Applicant after: TOSHIBA MEMORY Corp. Address before: Tokyo Applicant before: Pangea Co.,Ltd. |
|
CB02 | Change of applicant information | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220127 Address after: Tokyo Applicant after: Pangea Co.,Ltd. Address before: Tokyo Applicant before: TOSHIBA MEMORY Corp. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |