JP5837208B2 - 記憶装置のロック解除 - Google Patents
記憶装置のロック解除 Download PDFInfo
- Publication number
- JP5837208B2 JP5837208B2 JP2014531783A JP2014531783A JP5837208B2 JP 5837208 B2 JP5837208 B2 JP 5837208B2 JP 2014531783 A JP2014531783 A JP 2014531783A JP 2014531783 A JP2014531783 A JP 2014531783A JP 5837208 B2 JP5837208 B2 JP 5837208B2
- Authority
- JP
- Japan
- Prior art keywords
- storage device
- power state
- information
- authentication information
- electronic device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/81—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/10—Providing a specific technical effect
- G06F2212/1052—Security improvement
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2212/00—Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
- G06F2212/40—Specific encoding of data in memory or cache
- G06F2212/402—Encrypted data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Lock And Its Accessories (AREA)
- Storage Device Security (AREA)
- Power Sources (AREA)
Description
K=SHA−1(P XOR C)
演算P XOR CはP及びCの排他的ORを表す。暗号ハッシュ関数(SHA−1)はP XOR Cに基づくハッシュ値(K)を生成する。他の例では、Kを作成する他の関数を用いることができる。
K’=HOTP(K,C)
HOTP(K,C)=Truncate(HMAC−SHA−1(K,C))
H(・)は暗号ハッシュ関数であり、
‖は連結を表し、
opadは外側パディング(0x5c5c5c...5c5c、1ブロック長の16進定数)であり
ipadは内側パディング(0x363636...3636、1ブロック長の16進定数)である。
このとき、HMAC(K,C)は以下のように数学的に定義される。
P’=Encrypt(P with K’)
P=Decrypt(P’ with K’)
P’=Encrypt(P with R)
P=Decrypt(P’ with R)
P’=Encrypt(P with R2)
Claims (9)
- 電子装置をより低い電力状態からより高い電力状態に遷移させる手順を実行するステップ(202)であって、前記のより低い電力状態において、前記電子装置の記憶装置はロックされ、前記記憶装置への電力が停止されている、実行するステップと、
前記電子装置を前記のより低い電力状態から前記のより高い電力状態に遷移させる前記手順の一部として、前記ロックされた記憶装置をロック解除する認証情報の生成を可能にするロック解除情報を前記記憶装置に提供するステップ(204)であって、前記提供されるロック解除情報は、前記電子装置を前記のより低い電力状態にする前にメモリ内に記憶されていた所定の情報に基づき、該所定の情報は前記認証情報と異なる、提供するステップと、
前記電子装置を前記のより低い電力状態から前記のより高い電力状態に遷移させる前記手順の一部として、前記メモリ内に記憶されている前記所定の情報に基づいて暗号化鍵を計算するステップと
を含み、
前記ロック解除情報を提供するステップは、前記計算された暗号化鍵を前記記憶装置に提供するステップを含み、前記計算された暗号化鍵は、前記記憶装置によって前記ロックされた記憶装置をロック解除する認証情報を生成するのに使用可能である、方法。 - 前記暗号化鍵を計算するステップは、前記電子装置を前記のより低い電力状態にする前に前記メモリ内に記憶されていた、シード鍵及びカウンタ値に基づいて前記暗号化鍵を計算するステップを含み、前記所定の情報は前記シード鍵及び前記カウンタ値を含む、請求項1に記載の方法。
- 前記暗号化鍵を計算するステップは、ハッシュに基づくメッセージ認証コードに基づくワンタイムパスワード技法を用いて前記暗号化鍵を計算するステップを含む、請求項2に記載の方法。
- 前記ロック解除情報を提供するステップは、前記記憶装置が該記憶装置をロック解除する前記認証情報を計算するのに使用可能な乱数を提供するステップを含み、前記所定の情報は前記乱数を含む、請求項1に記載の方法。
- 前記のより低い電力状態から前記のより高い電力状態への次の遷移において前記記憶装置に提供されるロック解除情報を生成するのに用いるように前記所定の情報を更新するステップを更に含む、請求項1に記載の方法。
- コールドブート手順の一部として、前記記憶装置をロック解除する認証情報を入力するようにユーザにプロンプトを提供するステップと、
前記プロンプトに応答して前記認証情報を取得した後、前記所定の情報を前記メモリに記憶するステップと、
を更に含む、請求項1に記載の方法。 - 前記認証情報に基づいて秘密を計算するステップを更に含み、前記所定の情報は前記秘密を含む、請求項6に記載の方法。
- 前記認証情報を取得した後、乱数を計算するステップを更に含み、前記所定の情報は前記乱数を含む、請求項6に記載の方法。
- メモリ(104)と、
記憶装置(112)であって、ロックされた該記憶装置のロック解除が認証情報に基づいて実行されることを指定するオートロック機能を有する、記憶装置と、
少なくとも1つのプロセッサ(102)であって、
電子装置をより低い電力状態からより高い電力状態に遷移させる手順を実行し、なお、前記のより低い電力状態において、前記記憶装置への電力が停止されており、
前記電子装置を前記のより低い電力状態から前記のより高い電力状態に遷移させる前記手順の一部として、前記認証情報を用いた前記記憶装置のロック解除を可能にするロック解除情報を前記記憶装置に提供し、なお、前記提供されるロック解除情報は、前記電子装置を前記のより低い電力状態にする前に前記メモリ内に記憶されていた所定の情報に基づき、該所定の情報は前記認証情報と異なる、
前記電子装置を前記のより低い電力状態から前記のより高い電力状態に遷移させる前記手順の一部として、前記メモリ内に記憶されている前記所定の情報に基づいて暗号化鍵を計算し、
前記ロック解除情報の提供は、前記計算された暗号化鍵を前記記憶装置に提供することを含み、前記計算された暗号化鍵は、前記記憶装置によって前記記憶装置をロック解除する認証情報を生成するのに使用可能である、
少なくとも1つのプロセッサと、
を備える、電子装置。
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2011/053587 WO2013048380A1 (en) | 2011-09-28 | 2011-09-28 | Unlocking a storage device |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2014530562A JP2014530562A (ja) | 2014-11-17 |
JP5837208B2 true JP5837208B2 (ja) | 2015-12-24 |
Family
ID=47996127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2014531783A Expired - Fee Related JP5837208B2 (ja) | 2011-09-28 | 2011-09-28 | 記憶装置のロック解除 |
Country Status (8)
Country | Link |
---|---|
US (3) | US9342713B2 (ja) |
JP (1) | JP5837208B2 (ja) |
CN (1) | CN103797491B (ja) |
BR (1) | BR112014007398B1 (ja) |
DE (1) | DE112011105678T5 (ja) |
GB (1) | GB2508532B (ja) |
TW (1) | TWI480762B (ja) |
WO (1) | WO2013048380A1 (ja) |
Families Citing this family (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11190936B2 (en) | 2007-09-27 | 2021-11-30 | Clevx, Llc | Wireless authentication system |
US10778417B2 (en) | 2007-09-27 | 2020-09-15 | Clevx, Llc | Self-encrypting module with embedded wireless user authentication |
US10181055B2 (en) | 2007-09-27 | 2019-01-15 | Clevx, Llc | Data security system with encryption |
KR101160681B1 (ko) | 2011-10-19 | 2012-06-28 | 배경덕 | 이동 통신 단말기의 활성화 시에 특정 동작이 수행되도록 하기 위한 방법, 이동 통신 단말기 및 컴퓨터 판독 가능 기록 매체 |
US9530461B2 (en) * | 2012-06-29 | 2016-12-27 | Intel Corporation | Architectures and techniques for providing low-power storage mechanisms |
JP2015001800A (ja) * | 2013-06-14 | 2015-01-05 | レノボ・シンガポール・プライベート・リミテッド | スリープ状態からレジュームする方法、携帯式電子機器およびコンピュータ・プログラム |
CN104798029B (zh) * | 2014-05-22 | 2019-02-12 | 华为技术有限公司 | 显示时间的方法和装置 |
US10652240B2 (en) | 2014-05-29 | 2020-05-12 | Entersekt International Limited | Method and system for determining a compromise risk associated with a unique device identifier |
US20150350894A1 (en) * | 2014-05-29 | 2015-12-03 | Entersekt, LLC | Method and System for Establishing a Secure Communication Channel |
JP6205343B2 (ja) * | 2014-12-22 | 2017-09-27 | 東芝テック株式会社 | 情報処理装置、及び復帰制御プログラム |
US10021213B2 (en) * | 2015-02-09 | 2018-07-10 | Google Llc | Systems and methods for adaptive cloning of mobile devices |
JP2017042962A (ja) * | 2015-08-25 | 2017-03-02 | キヤノン株式会社 | 着脱される記録媒体のデータを消去する情報処理装置およびその制御方法 |
CN112054892A (zh) * | 2016-01-04 | 2020-12-08 | 克莱夫公司 | 数据存储设备、方法和系统 |
WO2017155516A1 (en) * | 2016-03-08 | 2017-09-14 | Hewlett-Packard Development Company, L.P. | Securing data |
TWI648741B (zh) | 2017-06-05 | 2019-01-21 | 慧榮科技股份有限公司 | 資料儲存裝置之控制器以及進階資料抹除的方法 |
US11030346B2 (en) | 2018-07-13 | 2021-06-08 | Ememory Technology Inc. | Integrated circuit and data processing method for enhancing security of the integrated circuit |
JP2020030527A (ja) * | 2018-08-21 | 2020-02-27 | キオクシア株式会社 | 記憶装置及びプログラム |
CN109710323A (zh) * | 2018-12-28 | 2019-05-03 | 联想(北京)有限公司 | 一种控制方法和电子设备 |
US11429541B2 (en) * | 2019-01-07 | 2022-08-30 | Dell Products L.P. | Unlocking of computer storage devices |
US11496299B2 (en) * | 2019-06-18 | 2022-11-08 | Thales Dis Cpl Usa, Inc. | Method and chip for authenticating to a device and corresponding authentication device and system |
US10769873B1 (en) | 2019-06-28 | 2020-09-08 | Alibaba Group Holding Limited | Secure smart unlocking |
CN110473318B (zh) * | 2019-06-28 | 2021-06-22 | 创新先进技术有限公司 | 解锁方法、实现解锁的设备及计算机可读介质 |
US11301558B2 (en) * | 2019-08-21 | 2022-04-12 | Red Hat Inc. | Automatic secure storage of credentials within a managed configuration model |
US10608819B1 (en) | 2019-09-24 | 2020-03-31 | Apricorn | Portable storage device with internal secure controller that performs self-verification and self-generates encryption key(s) without using host or memory controller and that securely sends encryption key(s) via side channel |
US10656854B1 (en) | 2019-10-22 | 2020-05-19 | Apricorn | Method and portable storage device with internal controller that can self-verify the device and self-convert the device from current mode to renewed mode without communicating with host |
US11829612B2 (en) | 2020-08-20 | 2023-11-28 | Micron Technology, Inc. | Security techniques for low power mode of memory device |
CN114978689A (zh) * | 2022-05-23 | 2022-08-30 | 江苏芯盛智能科技有限公司 | 存储设备远程管理方法、系统和存储设备 |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6064297A (en) * | 1997-06-12 | 2000-05-16 | Microsoft Corporation | Message authentication and key synchronization in home control systems |
US7103909B1 (en) * | 1999-02-25 | 2006-09-05 | Fujitsu Limited | Method of unlocking password lock of storage device, information processor, computer-readable recording medium storing unlocking program, and control device |
KR100889099B1 (ko) * | 2001-08-28 | 2009-03-17 | 시게이트 테크놀로지 엘엘씨 | 데이터 저장 장치의 보안 방법 및 장치 |
JP3979194B2 (ja) | 2002-06-25 | 2007-09-19 | ソニー株式会社 | 情報記憶装置、およびメモリアクセス制御方法、並びにコンピュータ・プログラム |
US7424740B2 (en) * | 2003-05-05 | 2008-09-09 | Microsoft Corporation | Method and system for activating a computer system |
US7743241B1 (en) * | 2003-09-12 | 2010-06-22 | American Megatrends, Inc. | Securing the contents of data storage devices within a computer |
WO2007001329A2 (en) * | 2004-07-29 | 2007-01-04 | Infoassure, Inc. | Cryptographic key management |
US7685634B2 (en) * | 2005-01-12 | 2010-03-23 | Dell Products L.P. | System and method for managing access to a storage drive in a computer system |
US7797707B2 (en) | 2005-03-02 | 2010-09-14 | Hewlett-Packard Development Company, L.P. | System and method for attributing to a corresponding virtual machine CPU usage of a domain in which a shared resource's device driver resides |
US8799891B2 (en) | 2005-03-02 | 2014-08-05 | Hewlett-Packard Development Company, L.P. | System and method for attributing CPU usage of a virtual machine monitor to a corresponding virtual machine |
US7542980B2 (en) | 2005-04-22 | 2009-06-02 | Sap Ag | Methods of comparing and merging business process configurations |
CN101375259B (zh) * | 2006-01-24 | 2011-10-19 | 克莱夫公司 | 数据保全系统 |
US7676666B2 (en) | 2006-02-02 | 2010-03-09 | Dell Products L.P. | Virtual BIOS firmware hub |
JP4459946B2 (ja) * | 2006-11-21 | 2010-04-28 | レノボ・シンガポール・プライベート・リミテッド | 携帯式コンピュータおよび動作モードの制御方法 |
US20080222423A1 (en) * | 2007-03-06 | 2008-09-11 | Secude International | System and method for providing secure authentication of devices awakened from powered sleep state |
JP4867760B2 (ja) * | 2007-03-30 | 2012-02-01 | ソニー株式会社 | 情報処理装置および方法、並びに情報処理システム |
US7925802B2 (en) | 2007-06-21 | 2011-04-12 | Seamicro Corp. | Hardware-based virtualization of BIOS, disks, network-interfaces, and consoles using a direct interconnect fabric |
US20090006857A1 (en) * | 2007-06-29 | 2009-01-01 | Anton Cheng | Method and apparatus for starting up a computing system |
TW200907804A (en) | 2007-08-15 | 2009-02-16 | Inventec Corp | Method for updating BIOS and computer and system using the same |
JP2009048346A (ja) * | 2007-08-17 | 2009-03-05 | Seiko Epson Corp | 情報表示装置およびプログラム |
US20090193106A1 (en) | 2008-01-24 | 2009-07-30 | Christophe Bouten | System and method for managing message transport in a virtual environment |
WO2010037022A1 (en) | 2008-09-26 | 2010-04-01 | Fuhu, Inc. | Hypervisor and webtop in a set top box environment |
US9026824B2 (en) | 2008-11-04 | 2015-05-05 | Lenovo (Singapore) Pte. Ltd. | Establishing power save mode in hypervisor system |
JP4425321B1 (ja) * | 2008-12-10 | 2010-03-03 | キヤノンItソリューションズ株式会社 | 情報処理装置、情報処理方法、及びプログラム |
US20100161844A1 (en) | 2008-12-23 | 2010-06-24 | Phoenix Technologies Ltd | DMA compliance by remapping in virtualization |
US8166288B2 (en) | 2009-01-30 | 2012-04-24 | Hewlett-Packard Development Company, L.P. | Managing requests of operating systems executing in virtual machines |
US20100205420A1 (en) | 2009-02-09 | 2010-08-12 | Inventec Corporation | System and method for realizing remote test on computer apparatus without storage device |
US8918779B2 (en) | 2009-08-27 | 2014-12-23 | Microsoft Corporation | Logical migration of applications and data |
US8831228B1 (en) * | 2009-08-28 | 2014-09-09 | Adobe Systems Incorporated | System and method for decentralized management of keys and policies |
CN103329095B (zh) | 2011-01-28 | 2017-03-22 | 惠普发展公司,有限责任合伙企业 | 用编码的信息验证管理程序 |
-
2011
- 2011-09-28 CN CN201180073453.1A patent/CN103797491B/zh not_active Expired - Fee Related
- 2011-09-28 JP JP2014531783A patent/JP5837208B2/ja not_active Expired - Fee Related
- 2011-09-28 US US14/344,369 patent/US9342713B2/en active Active
- 2011-09-28 WO PCT/US2011/053587 patent/WO2013048380A1/en active Application Filing
- 2011-09-28 DE DE112011105678.8T patent/DE112011105678T5/de active Pending
- 2011-09-28 GB GB1402295.8A patent/GB2508532B/en not_active Expired - Fee Related
- 2011-09-28 BR BR112014007398-8A patent/BR112014007398B1/pt not_active IP Right Cessation
-
2012
- 2012-09-27 TW TW101135619A patent/TWI480762B/zh not_active IP Right Cessation
-
2016
- 2016-04-04 US US15/090,140 patent/US9652638B2/en active Active
-
2017
- 2017-04-05 US US15/480,127 patent/US10318750B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
GB2508532B (en) | 2020-05-06 |
US20140310532A1 (en) | 2014-10-16 |
CN103797491B (zh) | 2017-06-23 |
GB2508532A (en) | 2014-06-04 |
GB201402295D0 (en) | 2014-03-26 |
WO2013048380A1 (en) | 2013-04-04 |
US9652638B2 (en) | 2017-05-16 |
BR112014007398A2 (pt) | 2017-04-04 |
US10318750B2 (en) | 2019-06-11 |
BR112014007398B1 (pt) | 2022-04-05 |
TWI480762B (zh) | 2015-04-11 |
TW201329781A (zh) | 2013-07-16 |
US20170206373A1 (en) | 2017-07-20 |
US20160217304A1 (en) | 2016-07-28 |
DE112011105678T5 (de) | 2014-07-17 |
CN103797491A (zh) | 2014-05-14 |
JP2014530562A (ja) | 2014-11-17 |
US9342713B2 (en) | 2016-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5837208B2 (ja) | 記憶装置のロック解除 | |
TWI497338B (zh) | 暫時秘密之保全儲存 | |
US9100173B2 (en) | Security USB storage medium generation and decryption method, and medium recorded with program for generating security USB storage medium | |
JP5024709B2 (ja) | 暗号化記憶装置内での鍵復元 | |
US10615967B2 (en) | Rapid data protection for storage devices | |
US8379846B2 (en) | Encryption apparatus and method therefor | |
US20080065905A1 (en) | Method and system for secure data storage | |
CN113545006A (zh) | 远程授权访问锁定的数据存储设备 | |
JP2008187718A (ja) | ハードウェア鍵を介したストレージデバイスのデータ暗号化およびストレージデバイスのデータアクセスのシステムおよび方法 | |
KR20060090167A (ko) | 파일 암호화 및 복호화를 위한 다수의 키를 관리하는시스템 및 방법 | |
US20130166869A1 (en) | Unlock a storage device | |
JP2024500732A (ja) | 内部動作を介してキー・パーio対応デバイス中に記憶されたデータの暗号消去 | |
CN113383510A (zh) | 数据存储设备的多角色解锁 | |
CN116594567A (zh) | 信息管理方法、装置和电子设备 | |
US11231988B1 (en) | Systems and methods for secure deletion of information on self correcting secure computer systems | |
US11720717B2 (en) | System memory information protection with a controller | |
US11418335B2 (en) | Security credential derivation | |
CN113383335A (zh) | 数据存储设备事件的安全日志记录 | |
CN111695122A (zh) | 拷贝文件的方法及其系统 | |
US11669389B1 (en) | Systems and methods for secure deletion of information on self correcting secure computer systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20150324 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20150327 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20150602 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20151030 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20151104 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 5837208 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
S531 | Written request for registration of change of domicile |
Free format text: JAPANESE INTERMEDIATE CODE: R313531 |
|
R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
LAPS | Cancellation because of no payment of annual fees |