TW454175B - System and method for protecting and securing a media verifier - Google Patents

System and method for protecting and securing a media verifier Download PDF

Info

Publication number
TW454175B
TW454175B TW088118036A TW88118036A TW454175B TW 454175 B TW454175 B TW 454175B TW 088118036 A TW088118036 A TW 088118036A TW 88118036 A TW88118036 A TW 88118036A TW 454175 B TW454175 B TW 454175B
Authority
TW
Taiwan
Prior art keywords
memory
verifier
driver
read
authorization code
Prior art date
Application number
TW088118036A
Other languages
Chinese (zh)
Inventor
James Henry Schwartz
Dai Feng
Daniel Alfonsi
Refael Bar
Original Assignee
Iomega Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iomega Corp filed Critical Iomega Corp
Application granted granted Critical
Publication of TW454175B publication Critical patent/TW454175B/en

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00137Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to contents recorded on or reproduced from a record carrier to authorised users
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B27/00Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
    • G11B27/36Monitoring, i.e. supervising the progress of recording or reproducing
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B2220/00Record carriers by type
    • G11B2220/20Disc-shaped record carriers
    • G11B2220/25Disc-shaped record carriers characterised in that the disc is based on a specific recording technology
    • G11B2220/2508Magnetic discs
    • G11B2220/2516Hard disks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

A system for protecting a verification process of a storage media comprises a verifier drive and a verifier host computer. The verifier drive includes drive mechanics, a keypad for entering a user authorization code, a microcontroller connected to the drive mechanics and the keypad for validating the authorization code, and a memory. The verifier host computer has a secured memory containing verification code to be used by the verifier drive. The verification code is provided to the memory responsive to a valid authorization code. The memory is cleared after the verification process is completed, thereby preventing unauthorized users from using the verifier drive.

Description

454175 A7 B7 五、發明說明( 發明領域 本發明一般係有關一種驗證利用伺服寫入器寫入磁碟 之磁碟格式的驗證器。更特別的是,本發明係有關於保護 驗證器用來驗證磁碟之資訊的方法及系統0 發明背景 磁碟被普遍用於電腦系統中做爲資料的儲存媒體。然 而,在磁碟被磁碟機使用之前,磁碟必須被格式化。一般 磁碟可被格式化’以容納數千個資料的,,磁軌,,,其以磁碟 表面上之同心圓外沿方式被組織。這些磁軌於磁碟操作期 間必須精確地遵循磁碟機讀/寫電子裝置,以儲存資訊至磁 碟表面及從磁碟表面讀取資訊。在典型之磁軌遵循技術中 ’讀/寫電子裝置經由延磁軌固定間隔被嵌住之伺服扇區來 遵循磁軌。 在高磁軌密度磁碟的案例中,磁軌在磁碟被適用於磁 碟機中之前’預先在製造環境中被記錄在磁碟表面上。每 個空白磁碟可藉由通常被稱爲”伺服寫入器”的裝置而達到 使用的準備。伺服寫入器爲將伺服訊號嵌入磁碟表面的機 器。在伺服寫入器將伺服資訊記錄於伺服扇區之後,藉由 驗證伺服資訊之正確性來檢查磁碟的品質。在某些案例中 ,例如磁碟被用於可移動式媒體驅動機,驗證過程是從有 時被稱爲”驗證器”之裝置之伺服寫入過程中於不同時間及 位置發生的。 典型的驗證器包含用來驗證媒體品質及伺服資訊之正 3 張尺度適用1Γ國國家標準(CNS)A4規格(210 X 297孓爱) --------- J— n I n n I ϋ n ^1. I I (請先閱讀背面之注意事項再填寫本頁) .SJ· ;線· 經濟部智慧財產局員工消費合作社印製 經濟部智慧財產局員工消費合作社印製 454 1 7 5 A7 ---- B7 五、發明說明(少) 確性的碼。此碼爲高敏感性且專有的。傳統之驗證器擁有 儲存於驗證器本身的碼。因此,碼很容易被折衷處理。再 者’不論使用者是否被授權使用驗證器,任何進入驗證器 的人均可勝任磁碟上之媒體及伺服資訊。 雖然現行驗證器的技術水準發展良好,然而在此技術 中仍有許多問題,特別是維持驗證碼的專有性。因此,有 必要克服現行驗證器技術水準的缺點,且較佳的是於驗證 器外永久儲存驗證碼,或於驗證器內以密碼型式儲存,且 僅於適當授權下將碼帶入驗證器,及於完成驗證過程與切 斷驗證器電源下將碼從驗證器局部儲存中消除。 發明槪要 本發明係指可保護儲存媒體之驗證處理的系統,包含 一個驗證器驅動機及一個驗證器主電腦。該驗證器驅動機 包含:(1)一個驅動機機構,其包含可將資料傳入及傳出儲 存媒體之讀/寫電子裝置;一個可將資料讀寫入及出儲存媒 體之讀/寫磁頭;一個可懸掛及移動儲存媒體上之讀/寫磁 頭的手臂;一個可反應從讀/寫電子裝置出來之指令來移動 手臂的致動器;及一個可以事先決定之速度來旋轉儲存媒 體的轉軸;(2)可接收授權碼的授權碼輸入裝置;(3)—個被 連接至驅動機機構及授權碼輸入裝置用以核准授權碼的微 控制器;(4)被連接至微控制器裝置的記憶體裝置;(5)被連 接至微控制器裝置的電腦網路介面。驗證器主電腦被連接 至電腦網路介面’且擁有包含由驗證器驅動機所使用之驗 4 ---------^---- ---- ϋ ^eJ n I -I n I I I (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 464175 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(4) 證碼之被保密的記憶體’驗證碼被提供至該記憶體裝置, 以反應被核准之授權碼。 根據本發明之一個觀點,記憶體裝置包含一個第一記 憶體(較佳的是非依電性’如可抹除可程式化唯讀記憶體) 及一個第二記憶體(較佳的是依電性,如靜態隨機存取記憶 體)。 根據本發明之一個觀點,授權碼輸入裝置包含一個小 型鍵盤,一個符記,一個鍵卡,或一個磁碟。 在本發明範圍內之更進一步實施例中,提供了一種可 驗證儲存媒體之格式化的方法。此方法包含的步驟爲:將 驗證器驅動機連接至擁有包含由驗證器驅動機所使用之驗 證碼之被保密記憶體的驗證器主電腦;從驗證器主電腦之 被保密記憶體中恢復驗證碼;於驗證器驅動機接收使用者 授權碼;核准使用者授權碼;將核准碼轉換至可反應核准 使用者授權碼的驗證器驅動機;將驗證碼儲存於驗證器驅 動機中之記憶體;及實施儲存媒體的驗證過程。 根據本發明之更進一步觀點,提供了可於驗證過程後 從記憶體將驗證碼抹除的步驟。 本發明範圍內之另一實施例包含一個可驗證儲存媒體 的驗證器驅動機。驗證器驅動機包含(1)一個驅動機機構’ 其包含可將資料傳入及傳出儲存媒體之讀/寫電子裝置;一 個可將資料讀寫入及出儲存媒體之讀/寫磁頭;一個可懸掛 及移動儲存媒體上之讀/寫磁頭的手臂;一個可反應從讀/ 寫電子裝置出來之指令來移動手臂的致動器;及一個可以 5 (請先閱讀背面之注意事項再填寫本頁)454175 A7 B7 V. INTRODUCTION TO THE INVENTION Field of the Invention The present invention relates generally to a verifier for verifying the disk format of a disk written by a servo writer. More specifically, the present invention relates to a protect verifier for verifying magnetic Disk information method and system 0 BACKGROUND OF THE INVENTION Disks are commonly used as storage media for data in computer systems. However, before a disk can be used by a drive, the disk must be formatted. Generally a disk can be Formatting 'to accommodate thousands of data, magnetic tracks, which are organized in concentric circles on the surface of the disk. These tracks must exactly follow the drive read / write during disk operation Electronic device to store information on and read information from the surface of the disk. In a typical track following technology, 'read / write electronic devices follow a magnetic track via servo sectors embedded at fixed intervals of the track In the case of high-track-density disks, the tracks are 'pre-recorded' on the surface of the disk in the manufacturing environment before the disk is used in the drive. Each blank disk can be referred to as "Servo writer" device is ready for use. The servo writer is a machine that embeds servo signals on the surface of the disk. After the servo writer records the servo information in the servo sector, the servo information is verified by Correctness to check the quality of the disk. In some cases, such as when a disk is used in a removable media drive, the verification process is performed during the servo writing process of a device sometimes called a "verifier" Occurs at different times and locations. Typical verifiers include 3 positive scales used to verify media quality and servo information. Applicable to 1 National Standard (CNS) A4 specifications (210 X 297). -------- -J— n I nn I ϋ n ^ 1. II (Please read the precautions on the back before filling out this page) .SJ ·; line · Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs and Consumer Cooperatives, printed by the Ministry of Economic Affairs Printed 454 1 7 5 A7 ---- B7 V. Description code of the invention (less). This code is highly sensitive and proprietary. Traditional verifiers have codes stored in the verifier itself. Therefore, the code It's easy to be compromised. Also 'no Whether the user is authorized to use the authenticator, anyone who enters the authenticator can be competent for the media and servo information on the disk. Although the technical level of the current authenticator is well developed, there are still many problems in this technology, especially the maintenance The proprietary nature of the verification code. Therefore, it is necessary to overcome the shortcomings of the current technical level of the validator, and it is better to store the verification code permanently outside the validator, or to store it in a password in the validator, and only under proper authorization Bring the code into the verifier, and eliminate the code from the local storage of the verifier after completing the verification process and cutting off the power of the verifier. SUMMARY OF THE INVENTION The present invention refers to a system that can protect the verification processing of a storage medium and includes a verifier Driver and a validator host computer. The validator driver includes: (1) a driver mechanism including a read / write electronic device capable of transferring data to and from a storage medium; and a device capable of reading and writing data A read / write head for accessing the storage medium; an arm that can suspend and move the read / write head on the storage medium; Instructions to move the actuator of the arm; and a shaft that can rotate the storage medium in advance at a predetermined speed; (2) an authorization code input device that can receive an authorization code; (3) a device connected to the drive mechanism and The authorization code input device is used to approve the microcontroller of the authorization code; (4) a memory device connected to the microcontroller device; (5) a computer network interface connected to the microcontroller device. The authenticator host computer is connected to the computer network interface 'and has a certificate containing the verification used by the authenticator driver 4 --------- ^ ---- ---- ϋ ^ eJ n I -I n III (Please read the precautions on the back before filling out this page) This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 464175 A7 B7 Printed by the Consumers ’Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs Explanation (4) The security code of the security code is provided to the memory device to reflect the authorized authorization code. According to an aspect of the present invention, the memory device includes a first memory (preferably non-electrically dependent) such as a erasable programmable read-only memory and a second memory (preferably electrically dependent) (Such as static random access memory). According to an aspect of the present invention, the authorization code input device includes a keypad, a token, a key card, or a magnetic disk. In a further embodiment within the scope of the present invention, a method for verifying the formatting of a storage medium is provided. This method includes the steps of: connecting the verifier driver to a verifier host computer having a secured memory containing a verification code used by the verifier driver; restoring verification from the secret memory of the verifier host computer Receive the user authorization code on the verifier driver; approve the user authorization code; convert the approval code to a verifier driver that reflects the approved user authorization code; store the verification code in the memory of the verifier driver ; And implement the verification process for storage media. According to a further aspect of the present invention, a step of erasing the verification code from the memory after the verification process is provided. Another embodiment within the scope of the present invention includes a verifier driver that can authenticate a storage medium. The verifier driver includes (1) a driver mechanism, which includes a read / write electronic device that can transfer data to and from the storage medium; a read / write head that can read data to and from the storage medium; a An arm that can suspend and move the read / write head on the storage medium; an actuator that can move the arm in response to instructions from the read / write electronics; and an 5 (please read the precautions on the back before filling out this page)

../(V . --線. 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 4 54175 A7 B7 五、發明說明(ψ) 事先決定之速度來旋轉儲存媒體的轉軸;(2)可接收授權碼 的授權碼輸入裝置;(3)—個被連接至驅動機及授權碼輸入 裝置用以核准授權碼的微控制器;(4)被連接至微控制器裝 置的記憶體裝置;(5) —個擁有包含由驗證器驅動機所使用 之驗證碼之被保密的記憶體’驗證碼被提供至可反應被核 准之授權碼的記憶體裝置。 在本發明範圍內之更進一步實施例中,提供了一種可 驗證儲存媒體之格式化的方法且包含的步驟爲: 將鍵卡插入驗證器驅動機中;決定鍵卡是否有效;將 被保密驗證碼予以解密,以反應有效之鍵卡;將被解密之 驗證碼儲存於記憶體中;及利用被解密之驗證碼將驗證實 施於儲存媒體上。較佳的是,此方法更進一步包含可於驗 證過程完成後從記憶體將驗證碼抹除的步驟。 從本發明以下之詳細說明與附圖可更明白本發明之上 述及其他觀點。 圖式簡單說明 , 圖1描述一個磁碟且顯示格式化資訊的位置; 圖2爲一個伺服寫入器及驗證器磁碟格式輪廓的方塊 圖, 圖3爲根據本發明實施例之驗證器網路的例示方塊圖 圖4爲根據本發明實施例之附於網路主電腦之驗證器 的詳細例示方塊圖; (請先閱讀背面之注意事項再填寫本頁) ίΛ^ ,//ν\ •線. 經濟部智慧財產局員工消費合作社印製../(V. --- line. This paper size is in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) 4 54175 A7 B7 V. Description of the invention (ψ) Rotation axis of storage medium (2) an authorization code input device that can receive the authorization code; (3) a microcontroller connected to the driver and the authorization code input device to approve the authorization code; (4) a microcontroller connected to the microcontroller device Memory device; (5)-a secret memory with a verification code containing a verification code used by the verifier driver is provided to a memory device that can reflect the authorized authorization code. Within the scope of the present invention In a further embodiment, a method for verifying the formatting of a storage medium is provided and includes the steps of: inserting a key card into a verifier driver; determining whether the key card is valid; decrypting the secret verification code to Responsive key cards; store the decrypted verification code in memory; and use the decrypted verification code to implement verification on the storage medium. Preferably, this method further includes a method that can be completed at the end of the verification process. The step of erasing the verification code from the memory later. The above and other aspects of the present invention will be more clearly understood from the following detailed description of the present invention and the accompanying drawings. The diagram is briefly explained, FIG. 1 depicts a magnetic disk and displays formatted information. Position; Figure 2 is a block diagram of a servo writer and validator disk format outline, Figure 3 is an exemplary block diagram of a validator network according to an embodiment of the present invention, and Figure 4 is an attached network according to an embodiment of the present invention Detailed illustration block diagram of the authenticator of the road host computer; (Please read the precautions on the back before filling this page) ίΛ ^, // ν \ • Line. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs

454175 A7 B7 五、發明說明(<) 圖5爲根據本發明之例示過程的流程圖; 圖6爲根據本發明之另一個例示驗證器的方塊圖;及 圖7爲根據本發明之另一例示過程的流程圖; 元件符號說明 10 :磁碟 11 :磁軌 12a :最外側磁軌 12b :最內側磁軌 16 :伺服扇區 50 :伺服寫入器 51、 61 :轉軸 52、 62 :讀/寫磁頭 54、 64 :手臂 55、 65 :致動器 56、 66 :讀/寫電子裝置 57 :輸入裝置 58、68 :控制器 經濟部智慧財產局員工消費合作社印製 (請先閱讀背面之注意事項再填寫本頁) .線· 00 :驗證器 100 :驗證器主電腦 102、104、106 :驗證器 110 :驅動機 114 : 80C32微控制器單位 116 :可抹除可程式唯讀記憶體 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 454175 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(t) 118 :靜態隨機存取記憶體 119:小型鍵盤 12〇 :先進技術附接分封介面 125 :小電腦系統介面至先進技術附接分封介面轉換 器 實施例及最佳模式的說明 根據本發明,現在將參考這些圖式來說明驗證過程期 間驗證磁碟上之資訊。熟習本項技術人士可了解,在此有 關這些圖式之說明僅爲舉例用途,且並不預期以任何方式 來限制本發明的範圍。舉例而言,在磁軌設計之較佳實施 例的說明期間’每個磁碟的磁軌數,每個磁軌的扇區數及 類似物被用來說明本發明。然而,此例子之目的僅用來淸 楚地說明本發明的方法且並不預期會限制本發明。再者, 應用例子是經由與特殊磁碟驅動系統一起被運用之本發明 的說明來使用的》當本發明可同樣應用於其他系統時,此 磁碟驅動系統應用並不預期會限制本發明。 本發明係針對可避免製造廠格式驗證器及其驗證碼之 未授權操作及複製的格式及過程。 參考附圖,圖1描述一個可用於本發明所實施之磁碟 驅動系統(未示)的磁碟10。磁碟10可顯示爲許多不同類型 之一。舉例而言’本發明與磁碟10可針對本發明受讓人之 IOMEGA公司所製造之ZIP驅動機或JAZ驅動機匣來實施 。爲使磁碟驅動系統可進入磁碟10及從磁碟1〇讀取及寫 ___ 8 本紙張尺度適用中國國家標準(CNS)^4規格(21G X 297公餐) ---- (請先閱讀背面之注意事項再填寫本頁) *SJ· --線. IS4 1 75 A7 — B7 五、發明說明(g ) 入,磁碟10必須被格式化。特別是,眾多同心圓磁軌u 必須於磁碟10表面上被界定。這些磁軌11是利用伺服扇 區16來界定的。每個磁軌11擁有固定數量的伺服扇區16 。舉例而言,JAZ磁碟於每磁軌11或每六度擁有六十個伺 服扇區16。此後’當磁碟10被磁碟機使用時,磁碟機讀/ 寫電子裝置可讀取伺服扇區16,且使用此資訊精確地經由 伺服迴路來遵循磁軌11。因此,熟習本項技術人士可知, 伺服扇區16包含被寫於磁碟10上之伺服叢發或磁場(如被 標示爲A及B的方塊)而有助於操作期間維護磁軌上之讀/ 寫磁頭。 經濟部智慧財產局員工消費合作社印製 其他資訊也必須在被用於磁碟機之前被寫入磁碟10中 。舉例而言,磁碟10必須被再分爲良好的扇區與磁軌及不 良的扇區與磁軌,亦即這些操作期間內不能被可靠地使用 的扇區與磁軌必須被定位及用標記標明。在ZIP及JAZ磁 碟匣的案例中,此資訊被放置於被稱爲Z磁軌的特殊磁軌 上。同時,磁碟10於最內處12b及最外處磁軌12a亦包含 護帶磁軌12。通常,這些護帶磁軌12相同於磁碟上的所 有其他磁軌11。然而,磁碟機電子裝置可藉由被指定至磁 軌Π之格雷碼數目來決定特殊磁軌11是否爲護帶磁軌12 的一部份。在此方式中,這些護帶磁軌12保護磁碟機讀/ 寫子系統,使其不致於操作期間運行太進去或太出去。 在ZIP及JAZ驅動磁碟的案例中,當擁有許多可移動 式媒體磁碟匣時,格式化過程可被實施爲兩個主要步驟。 如圖2所示,格式化過程的第一步驟可藉由伺服寫入器50 9 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐 454175 A7 B7 五、發明說明(2 ) 來呈現。伺服寫入器50爲可以磁碟1〇表面上之精確間隔 來放置伺服扇區16的精確校準格式化裝置。伺服寫入器 (請先閱讀背面之注意事項再填寫本頁) 50的主要組件包含了一個可固定磁碟10且將其旋轉至操 作速度的轉軸51 ; —個可將伺服資訊寫及讀出入磁碟1〇 的讀/寫磁頭52 ; —個可將磁頭52移動、整個磁碟表面的手 臂54 ; —個可控制手臂54之移動的致動器55 ; —個可執 行及控制伺服撰寫過程的控制器58 ; —個可將磁碟表面之 電磁訊號轉換爲控制器58所了解之數位格式及從其轉換的 讀/寫電子裝置56。同時’伺服寫入器50包含一個如鍵盤 的輸入裝置57使得寫入器之操作者可輸入資料以控制伺服 寫入器處理。熟練的電子技師將可了解被用來執行本發明 之伺服寫入器50可爲如Phase Metric/Helios MS5000之被 適當修正以接受磁碟10之特殊變化的許多商業性單位之一 〇 -·線· 經濟部智慧財產局員工消費合作社印製 每個磁碟10的操作資料可於伺服寫入器處理期間藉由 伺服寫入器50來插入磁碟10。伺服寫入器50將操作資料 嵌入護帶磁軌12的伺服扇區16中。將操作資料記錄至位 於伺服寫入器50之磁碟10的過程是藉由將磁碟1〇裝置於 伺服寫入器50上,將磁碟10旋轉至操作之每分鐘旋轉數 及將磁頭52載入磁碟表面上。在磁頭52載入磁碟表面上 之後,其開始經由伺服扇區16移越整個表面撰寫磁軌且於 每磁軌11之每伺服扇區16內嵌入磁軌識別器。磁頭52繼 續此移越整個磁碟表面之過程直到所有之磁軌11被寫入爲 止。做爲應用例之伺服撰寫站識別器可被寫入每個磁碟 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱) 154 t 75 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(f) 且被用來監控每個伺服寫入器50之品質。此後,驗證器 60藉由伺服寫入器50恢復被寫在磁碟10之操作資料。因 此,伺服寫入器50將被驗證器60恢復之資料寫入磁碟1〇 之伺渾扇區16 〇 伺服撰寫過程持續直到所有磁軌11被格式化爲止。當 處理完成時,磁頭52被卸下,轉軸51停止且磁碟10被鬆 開。被格式化的磁碟10接著被傳送至測試其品質的驗證器 60 ° 在磁碟以伺服寫入器50格式化之後,其被傳送至如虛 線70所指示之驗證器60以承受驗證步驟。驗證器60藉由 將資料寫入磁碟10及將資料讀回來檢查每個磁碟10。在 現在較佳實施例中,驗證器60僅是如ZIP或JAZ磁碟機 的可移動式媒體磁碟機。磁碟機被修正以擁有被設計藉由 將資料寫入磁碟10及將測試資料讀回來執行磁碟10的特 殊軟體碼。較佳的是,軟體碼是具有專利性且未授權之使 用者無法進入。 圖2呈現驗證器60之主要組件的方塊圖。基本上,驗 證器60包含一個可控制被執行於驗證器60上之驗證程序 的控制器68 ;可將資料傳入及傳出被嵌入磁碟表面之磁性 訊號的讀/寫電子裝置66 ; —個可將磁性訊號讀及寫入或出 磁碟表面的讀/寫磁頭62 ; —個可將磁碟表面上之讀/寫磁 頭62懸掛及移動的手臂64 ; —個可移動手臂64之致動器 65以反應從讀寫電子裝置66出來之指令;及一個可以操 作速度旋轉磁碟1〇之轉軸61。驗證過程中,檢查了伺服 11 (請先閱讀背面之注意事項再填寫本頁> _.c · -丨線· 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公髮) 454175 A7 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(、0) 寫入器50所呈現之格式化過程且任何無法被讀出或寫入之 扇區或磁軌均被標記標明。 在典型磁碟格式製造安排中,多重伺服寫入器50瞬間 將磁碟10組格式化。接著這些磁碟被傳送至多重驗證器 60來驗證。 根據本發明之一實施例,可控制驗證程序之碼並不永 久被儲存於驗證器60中,而是被儲存於諸如網路主電腦之 更安全的環境中。根據另一實施例,驗證碼以加密之型式 被儲存於驗證器中,且需要符記或鍵卡來將驗證碼解密及 允許使用者來使用驗證器。本發明避免了未授權之使用者 使用驗證器及進入驗證碼》 在本發明之一實施例中,如圖3所示,多重驗證器 102,104及106以網路安排方式被連接至主電腦100。更 特別的是,如圖4所示,每個驗證器(代表性驗證器102顯 示於圖4)包含驅動機110(有關以上圖2說明爲組件61_66) ,一個微控制器114(類似圖2之控制器68),較佳的是 80C32微控制器,一個記憶體118,一個授權碼輸入裝置 119,及一個可連接至包含驗證器主電腦100之網路的介面 120。較佳實施例中,提供了第二記憶體116。 較佳的是記憶體116, 118分別爲可抹除可程式唯讀 記憶體(EPROM)及靜態隨機存取記憶體(SRAM)。較佳的是 輸入裝置119爲鍵卡,但可爲如符記,鍵卡或磁碟之任何 可提供授權碼的裝置。介面120爲可連接網路的適當介面 ,且被顯示爲ATAPI(先進技術附接分封介面)介面。介面 12 本i張尺度適用中國國家標準(CNS)aI^格(210 X 297公釐) ' (請先閱讀背面之注意事項再填寫本頁) ci 訂 --線. 454 1 75 A7 B7 五、發明說明(d) 120連接至網路內之適當轉換器125(顯示了小電腦系統介 面(SCSI)至先進技術附接分封介面(ATAPI)轉換器),其依 序被連接至驗證器主電腦1〇〇。主電腦被連接至包含 了驗證碼之網路上的被保密儲存區域130。此方式中’驗 證碼並不永久被儲存於驗證器102中’且因而阻絕了可進 入驗證器102但卻沒有被授權經由網路進入主電腦100的 未授權使用者。 較佳的是如以下說明’靜態隨機存取記憶體118接收 從主電腦100出來之驗證碼’且於驗證過程中暫時地儲存 了驗證碼。驗證碼於驗證過程結束後從靜態隨機存取記憶 體118中被抹除,。較佳的是,可抹除可程式唯讀記憶體 116儲存了被驗證器用來執行基本且非驗證性指令及功能 的額外碼。 爲符合上述實施例’圖5說明了一種驗證磁碟的方法 圖例。於步驟200之打開驗證器102基礎下’使用者經由 網路將驗證器102連接至主電腦100。於步驟205,主電腦 100從保密網路檔130來恢復驗證碼。於步驟210,此碼預 定被傳送至驗證器1〇2。於步驟215 ’若使用者未擁有進入 輸入裝置119及檢查的有效授權’則驗證於步驟220時被 放棄且碼不會被傳送至驗證器102。 於步驟215,若使用者被授權’則驗證器1〇2於步驟 2M時接收驗證碼,且將該碼儲存於諸如靜態隨機存取記 憶體118的記億體中。接著於步驟23〇 ’包含驗證碼的靜 態隨機存取記憶體U8成爲伴隨固定記憶體之諸如可抹除 13 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ---------- I---· I I (請先閱讀背面之注意事項再填寫本頁) tSJ· -線 .經濟部智慧財產局員工消費合作社印製 454 1 7 5 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(I,) 可程式唯讀記憶體116之鄰近程式記憶體的一部份。接著 於步驟235,驗證器102接受所有驗證器指令且實施所需 的驗證。所有驗證完成後,驗證碼於於步驟240後,從驗 證器102之靜態隨機存取記憶體118中被抹除,使得未被 授權使用者無法使用或進入。 因此,當驗證器脫離網路時,其於授權基礎下接收驗 證資訊且將驗證資訊局部地儲存於記憶體中。當驗證器被 關掉時,包含驗證資訊的記憶體被消除,且驗證器因而失 去資訊。此方式中,除非驗證器被連接至網路才可操作。 在本發明另一實施例中,符記或鍵卡被用來保護製造 處之驗證器驅動機以避免未被授權的使用。每個驗證器包 含驗證器內之記憶體之被加密的驗證碼。符記或鍵卡於開 始時被插入驗證器。符記或鍵卡若有效’則可解開驗證器 中之被加密的驗證碼’因而可使驗證器操作。 如圖6所示,包含加密鍵的符記或鍵卡305被放入驗 證器300中之讀取器302。驗證器300包含記億體315中 之被加密的驗證碼° ,驗證器300同時亦包含類似圖4描述 之驅動機U0 ’微控制器114,及記憶體116及U8的組件 (無圖示)。鍵卡305及讀取器302可爲現行技術水準中所 得知的傳統型。 圖7顯示符合此實施例之驗證磁碟的方法例。驗證器 300之電源於步驟400時被打開,且使用者於步驟4〇5時 將符記或鍵卡305插入驗證器300之讀取器302。加密鍵 305接著被使用者移除及保密。驗證器之微控制器於步驟 14 •I — — — — — — — — —— — — . · I I • 一 C (請先閱讀背面之注意事項再填寫本頁) 訂· 線· 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 4S4 1 75 A7 _— B7 五、發明說明(\々) 410時決定符記或鍵卡305是否有效。若符記或鍵卡305 無效,所有處理均停止且驗證器300亦不動。 若符記或鍵卡305有效,則驗證器300於步驟"ο時 解開被儲存於記憶體315中之被加密的驗證碼,且較佳的 是將其儲存於類似以上圖4所述之靜態隨機存取記億體 118的第二記億體中。預期中的驗證於於步驟425時發生 。預期中的驗證完成後,於步驟430時,被解密之碼於驗 證器300電源打開基礎下從驗證器300之靜態隨機存取記 憶體II8中被抹除。此方式中,沒有進入有效之符記或鍵 卡的使用者就無法進入被解密之驗證碼,且因此無法使用 驗證器。 雖然在此已描述及說明有關一定特定的實施例,然而 本發明卻並不受限於在此顯示的細節。更正確的說,可於 申請專利範圍同等之範圍內,且不偏離本發明而詳細說明 可以做各種修正。 (請先閱讀背面之注意事項再填寫本頁) 訂·- -•線· 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱)454175 A7 B7 V. Description of the invention (<) Fig. 5 is a flowchart of an exemplary process according to the present invention; Fig. 6 is a block diagram of another exemplary verifier according to the present invention; and Fig. 7 is another according to the present invention. Flowchart of an exemplified process; component symbol description 10: magnetic disk 11: magnetic track 12a: outermost magnetic track 12b: innermost magnetic track 16: servo sector 50: servo writer 51, 61: rotary shaft 52, 62: read / Write heads 54, 64: arms 55, 65: actuators 56, 66: read / write electronic devices 57: input devices 58, 68: printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economy (please read the first Please fill in this page again.) Line 00: Verifier 100: Verifier host computer 102, 104, 106: Verifier 110: Driver 114: 80C32 Microcontroller unit 116: Programmable read-only memory can be erased This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 454175 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Invention Description (t) 118: Static Random Access Memory 119: Small Keyboard 12〇: Advanced Technology Attach Packaging Interface 125 : Small Computer System Interface to Advanced Technology Attach Sub-Interface Converter Description of Embodiments and Best Modes According to the present invention, the information on the verification disk during the verification process will now be described with reference to these drawings. Those skilled in the art will appreciate that the descriptions of these drawings are for illustrative purposes only and are not intended to limit the scope of the invention in any way. For example, during the description of the preferred embodiment of the track design, 'the number of tracks per disk, the number of sectors per track, and the like are used to illustrate the present invention. However, the purpose of this example is only to clearly illustrate the method of the present invention and is not intended to limit the present invention. Furthermore, the application examples are used through the description of the present invention applied together with a special disk drive system. "When the present invention is equally applicable to other systems, this disk drive system application is not expected to limit the present invention. The present invention is directed to formats and processes that can prevent unauthorized operation and copying of the format verifier and its verification code from the manufacturer. Referring to the drawings, Fig. 1 illustrates a magnetic disk 10 that can be used in a magnetic disk drive system (not shown) implemented in the present invention. The magnetic disk 10 may be displayed as one of many different types. For example, the present invention and the magnetic disk 10 can be implemented for a ZIP drive or a JAZ drive case manufactured by IOMEGA, the assignee of the present invention. In order to allow the disk drive system to enter disk 10 and read and write from disk 10 _ 8 This paper size applies to China National Standard (CNS) ^ 4 specifications (21G X 297 meals) ---- (Please Please read the notes on the back before filling in this page) * SJ · --line. IS4 1 75 A7 — B7 V. Description of Invention (g) Enter, the magnetic disk 10 must be formatted. In particular, many concentric circular tracks u must be defined on the surface of the magnetic disk 10. These tracks 11 are defined by servo sectors 16. Each track 11 has a fixed number of servo sectors 16. For example, a JAZ disk has sixty servo sectors 16 per track 11 or every six degrees. Thereafter, when the magnetic disk 10 is used by the magnetic disk drive, the magnetic disk read / write electronic device can read the servo sector 16 and use this information to precisely follow the magnetic track 11 via the servo loop. Therefore, those skilled in the art will know that the servo sector 16 contains a servo burst or magnetic field (such as the boxes labeled A and B) written on the magnetic disk 10, which helps to maintain the reading on the magnetic track during operation. / Write head. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs. Other information must also be written to disk 10 before it can be used on the disk drive. For example, the magnetic disk 10 must be subdivided into good sectors and tracks and bad sectors and tracks, that is, sectors and tracks that cannot be reliably used during these operations must be positioned and used Marked. In the case of ZIP and JAZ magazines, this information is placed on special tracks called Z tracks. At the same time, the innermost portion 12b and the outermost portion of the magnetic disk 10 of the magnetic disk 10 also include a guard track 12. In general, these guard tracks 12 are the same as all other tracks 11 on the disk. However, the drive electronics can determine whether the special track 11 is part of the guard track 12 by the number of Gray codes assigned to the track Π. In this manner, these guard tracks 12 protect the disk drive read / write subsystem from running in or out too much during operation. In the case of ZIP and JAZ drive disks, when there are many removable media magazines, the formatting process can be implemented in two main steps. As shown in Figure 2, the first step of the formatting process can be performed by the servo writer 50 9 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm 454 175 A7 B7 V. Description of the invention (2) The servo writer 50 is an accurate calibration formatting device that can place the servo sector 16 at precise intervals on the surface of the disk 10. The servo writer (please read the precautions on the back before filling this page) 50 The main components include a rotating shaft 51 that can fix the disk 10 and rotate it to the operating speed; a read / write head 52 that can write and read servo information into the disk 10; and a head 52 that can move Arms 54 on the entire surface of the disk;-An actuator 55 that controls the movement of the arm 54;-A controller 58 that can execute and control the servo writing process;-An electromagnetic signal that can convert the surface of the disk into a control The digital format understood by the reader 58 and the read / write electronic device 56 converted from it. At the same time, the 'servo writer 50 includes an input device 57 such as a keyboard so that the operator of the writer can input data to control the servo writer Processing. Skilled electricity The technician will understand that the servo writer 50 used to carry out the present invention may be one of many commercial units such as Phase Metric / Helios MS5000 that are appropriately modified to accept special changes to disk 10. 0-line · Ministry of Economy The Intellectual Property Bureau employee consumer cooperative prints the operating data of each magnetic disk 10 and can be inserted into the magnetic disk 10 by the servo writer 50 during the processing of the servo writer. The servo writer 50 embeds the operating data into the guard track 12 in the servo sector 16. The process of recording the operation data to the magnetic disk 10 located in the servo writer 50 is to mount the magnetic disk 10 on the servo writer 50 and rotate the magnetic disk 10 to the operating position. Rotations per minute and loading the magnetic head 52 on the surface of the disk. After the magnetic head 52 is loaded on the surface of the disk, it begins to move across the entire surface via the servo sector 16 to compose tracks and on each servo fan per track 11 The track identifier is embedded in the area 16. The magnetic head 52 continues this process of moving across the entire disk surface until all the tracks 11 are written. As an application example, a servo writing station identifier can be written to each disk This paper size applies to Chinese national standards (CNS) A4 specifications (210 X 297 public love) 154 t 75 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. Description of the invention (f) and used to monitor the quality of each servo writer 50. Since then The verifier 60 recovers the operation data written on the magnetic disk 10 by the servo writer 50. Therefore, the servo writer 50 writes the data recovered by the verifier 60 to the servo sector 16 of the magnetic disk 10. The servo writing process continues until all the tracks 11 are formatted. When the processing is completed, the magnetic head 52 is removed, the rotating shaft 51 is stopped and the magnetic disk 10 is released. The formatted disk 10 is then transferred to a verifier 60 which tests its quality. After the disk is formatted with the servo writer 50, it is transferred to the verifier 60 as indicated by the dashed line 70 to withstand the verification step. The validator 60 checks each disk 10 by writing data to it and reading it back. In the presently preferred embodiment, the validator 60 is only a removable media drive such as a ZIP or JAZ drive. The disk drive is modified to have special software code designed to execute disk 10 by writing data to disk 10 and reading back test data. Preferably, the software code is patented and inaccessible to unauthorized users. FIG. 2 presents a block diagram of the main components of the validator 60. Basically, the verifier 60 includes a controller 68 that can control the verification process performed on the verifier 60; a read / write electronic device 66 that can transfer data to and from magnetic signals embedded on the surface of the magnetic disk; A read / write head 62 that can read and write magnetic signals to and from the disk surface;-an arm 64 that can suspend and move the read / write head 62 on the disk surface;-a movable arm 64 The actuator 65 responds to instructions from the read / write electronic device 66; and a rotating shaft 61 which can rotate the magnetic disk 10 at an operating speed. During the verification process, the servo 11 was checked (please read the precautions on the back before filling in this page> _.c ·-丨 line · This paper size is applicable to China National Standard (CNS) A4 specification (210 X 297)) 454175 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs V. Invention Description (, 0) The formatting process presented by the writer 50 and any sectors or tracks that cannot be read or written are marked. In a typical magnetic disk format manufacturing arrangement, multiple servo writers 50 format 10 disks in an instant. These disks are then transmitted to a multiple validator 60 for verification. According to one embodiment of the present invention, the verification process can be controlled The code is not permanently stored in the authenticator 60, but is stored in a more secure environment such as a network host computer. According to another embodiment, the verification code is stored in the authenticator in an encrypted form, and A token or key card is needed to decrypt the verification code and allow the user to use the authenticator. The present invention prevents unauthorized users from using the authenticator and entering the verification code "In one embodiment of the present invention, as shown in Figure 3 Show The multiple validators 102, 104, and 106 are connected to the host computer 100 in a network arrangement. More specifically, as shown in FIG. 4, each validator (a representative validator 102 is shown in FIG. 4) includes a driver. 110 (illustrated as component 61_66 in Figure 2 above), a microcontroller 114 (similar to controller 68 in Figure 2), preferably an 80C32 microcontroller, a memory 118, an authorization code input device 119, and a Interface 120 that can be connected to the network containing the authenticator host computer 100. In a preferred embodiment, a second memory 116 is provided. Preferably, the memories 116 and 118 are erasable and programmable read-only memory (EPROM) and static random access memory (SRAM). It is preferable that the input device 119 is a key card, but it can be any device that can provide an authorization code such as a token, a key card or a magnetic disk. The interface 120 is a Appropriate interface for connecting to the Internet, and is shown as ATAPI (Advanced Technology Attach Sub-Interface) interface. Interface 12 This i-size applies to Chinese National Standard (CNS) aI ^ Grid (210 X 297 mm) '(Please read first (Notes on the back, please fill out this page) ci Order--line. 454 1 75 A7 B7 Description of the invention (d) 120 is connected to a suitable converter 125 in the network (showing a small computer system interface (SCSI) to an advanced technology attached sub-interface (ATAPI) converter), which are sequentially connected to the verifier host Computer 100. The host computer is connected to the secured storage area 130 on the network containing the verification code. In this way, 'the verification code is not permanently stored in the authenticator 102' and thus prevents access to the authenticator 102 However, there is no unauthorized user authorized to enter the host computer 100 via the network. Preferably, as described below, the 'static random access memory 118 receives the verification code from the host computer 100' and temporarily stores the verification code during the verification process. The verification code is erased from the static random access memory 118 after the verification process is completed. Preferably, the erasable programmable read-only memory 116 stores additional code used by the verifier to perform basic and non-verifiable instructions and functions. Fig. 5 illustrates a method for verifying a magnetic disk in accordance with the above embodiment '. After the authenticator 102 is turned on in step 200 ', the user connects the authenticator 102 to the host computer 100 via the network. In step 205, the host computer 100 recovers the verification code from the secure network file 130. In step 210, this code is scheduled to be transmitted to the verifier 102. At step 215 'if the user does not have a valid authorization to enter the input device 119 and check', the verification is abandoned at step 220 and the code is not transmitted to the verifier 102. At step 215, if the user is authorized ', the verifier 102 receives the verification code at step 2M, and stores the code in a memory such as a static random access memory 118. Then, in step 23 ′, the static random access memory U8 containing the verification code becomes a removable memory such as a removable 13 paper size that conforms to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) --- ------- I --- · II (Please read the notes on the back before filling out this page) tSJ · -line. Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs and Consumer Cooperatives 454 1 7 5 Intellectual Property Bureau of the Ministry of Economic Affairs Printed by employee consumer cooperative A7 B7 V. Invention description (I,) Part of the adjacent program memory of the programmable read-only memory 116. Following step 235, the validator 102 accepts all validator instructions and performs the required validation. After all verifications are completed, the verification code is erased from the static random access memory 118 of the verifier 102 after step 240, making it impossible for unauthorized users to use or enter. Therefore, when the authenticator is off the network, it receives the authentication information on an authorized basis and stores the authentication information locally in memory. When the verifier is turned off, the memory containing the verification information is erased and the verifier loses information. In this method, it can only operate unless the authenticator is connected to the network. In another embodiment of the invention, a token or key card is used to protect the authenticator driver at the manufacturing site from unauthorized use. Each verifier contains an encrypted verification code for the memory in the verifier. The token or key card is initially inserted into the validator. If the token or key card is valid ', the encrypted verification code in the authenticator can be unlocked' and the authenticator can be operated. As shown in FIG. 6, a token or key card 305 containing an encryption key is placed in a reader 302 in the verifier 300. The verifier 300 includes the encrypted verification code in the memory 315, and the verifier 300 also includes components similar to the driver U0 'microcontroller 114 described in FIG. 4 and the memory 116 and U8 (not shown). . The key card 305 and the reader 302 may be of a conventional type known in the state of the art. FIG. 7 shows an example of a method for verifying a magnetic disk according to this embodiment. The power of the verifier 300 is turned on in step 400, and the user inserts a token or key card 305 into the reader 302 of the verifier 300 in step 4505. The encryption key 305 is then removed and kept secret by the user. The microcontroller of the verifier is in step 14. • I — — — — — — — — — — —. · II • One C (Please read the precautions on the back before filling this page) Order · Line · This paper size applies China National Standard (CNS) A4 specification (210 X 297 mm) 4S4 1 75 A7 _ — B7 V. Description of the invention (\ 々) At 410, it is determined whether the token or key card 305 is valid. If the token or key card 305 is invalid, all processing is stopped and the verifier 300 does not move. If the token or key card 305 is valid, the verifier 300 unlocks the encrypted verification code stored in the memory 315 at step " ο, and preferably stores it in a manner similar to that described in FIG. 4 above. Of the static random access memory of the billionth body 118. The expected verification occurred at step 425. After the expected verification is completed, at step 430, the decrypted code is erased from the static random access memory II8 of the verifier 300 when the verifier 300 is powered on. In this way, users who have not entered a valid token or key card cannot access the decrypted verification code, and therefore cannot use the authenticator. Although certain specific embodiments have been described and illustrated herein, the invention is not limited to the details shown herein. More specifically, it can be described in detail without departing from the present invention, and various modifications can be made within the same scope as the scope of patent application. (Please read the precautions on the back before filling out this page) Order ·--· Thread · Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy

Claims (1)

δ 經濟部智慧財產局員工消費合作社印製 4 ϊί 75 Α8 Β8 C8 D8 六、申請專利範圍 1. 一種用來保護儲存媒體之驗證程序的系統,其包含 一個驗證器驅動機包含: 一個驅動機機構,其包含: 一個可將資料傳入及傳出儲存媒體之讀/寫電子裝置; 一個可將資料讀寫入及出儲存媒體之讀/寫磁頭: 一個可懸掛及移動儲存媒體上之該讀/寫磁頭的手臂; 一個可反應從該讀/寫電子裝置出來之指令來移動該手 臂的致動器; 一個可以事先決定之速度來旋轉儲存媒體的轉軸; 一個可接收授權碼的授權碼輸入裝置; 一個微控制器,其被連接至該驅動機及該授權碼輸入 裝置,用以核准該授權碼; 一個被連接至該微控制器裝置的記憶體裝置; 及被連接至該微控制器裝置的電腦網路介面,及 一個驗證器主電腦,其被連接至該電腦網路介面,且 擁有包含由該驗證器驅動機所使用之驗證碼之被保密的記 憶體,該驗證碼被提供至該記憶體裝置,以反應該被核准 之該授權碼。 2. 如申請專利範圍第1項之系統,其中,該記憶體裝 置包含一個第一記憶體及一個第二記憶體。 3·如申請專利範圍第2項之系統,其中,該第一記憶 體爲非依電性記憶體,且該第二記憶體爲依電性記憶體。 4·如申請專利範圍第3項之系統,其中,該第一記憶 I----— —- — ΙΊΙ — — - I I - ; ./(ν' <請先閱讀背面之注意事項再填寫本頁) 訂.· 線- 泰紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) A8 B8 C8 D8 54 1 75 六、申請專利範圍 體爲可抹除可程式唯讀記憶體(EPROM),且該第二記憶體 爲靜態隨機存取記憶體(SRAM)。 5·如申請專利範圍第1項之系統,其中,該授權碼輸 入裝置包含一個小型鍵盤。 6. 如申請專利範圍第1項之系統,其中,該授權碼輸 入裝置包含一個符記及一個鍵卡兩者之一。 7. —種可驗證儲存媒體之格式化的方法,包含的步驟 爲· 將驗證器驅動機連接至擁有包含由該驗證器驅動機所 使用之驗證碼之被保密之記憶體的驗證器主電腦; 從該驗證器主電腦之該被保密記憶體中恢復該驗證碼 > 於該驗證器驅動機接收使用者授權碼; 核准該使用者授權碼; 將該驗證碼轉換至該驗證器驅動機,以反應該有效使 用者授權碼的; 將該驗證碼儲存於該驗證器驅動機中之記憶體;及 實施儲存媒體的驗證過程。 8. 如申請專利範圍第7項之方法,更進一步包含該驗 證過程完成後將該驗證碼從該記憶體抹除的步驟。 9. 一個可驗證儲存媒體的驗證器驅動機,其包含: 一個驅動機機構,其包含 一個可將資料傳入及傳出儲存媒體之讀/寫電子裝置; 一個可將資料讀寫入及出儲存媒體之讀/寫磁頭; 2 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) — — — — — — —.1 I 1 I I I ·1111111 ^ « — — — — — — I— (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製δ Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 4 ϊί 75 Α8 Β8 C8 D8 VI. Application for Patent Scope 1. A system for protecting storage media verification procedures, which includes a verifier driver including: a driver mechanism , Which includes: a read / write electronic device that can transfer data into and out of the storage medium; a read / write head that can read data into and out of the storage medium: a suspendable and removable storage medium An arm that writes / writes a magnetic head; an actuator that moves the arm in response to instructions from the read / write electronic device; a shaft that can rotate a storage medium at a predetermined speed; an authorization code input that can receive an authorization code A device; a microcontroller connected to the driver and the authorization code input device to approve the authorization code; a memory device connected to the microcontroller device; and connected to the microcontroller The computer network interface of the device, and a verifier host computer that is connected to the computer network interface and has a driver that includes the verifier The codes used by the body to be memorized secret, the authentication code is provided to the memory device, to the inverse should be approved by the authorization code. 2. The system according to item 1 of the patent application scope, wherein the memory device comprises a first memory and a second memory. 3. The system according to item 2 of the scope of patent application, wherein the first memory is a non-electric memory and the second memory is an electric memory. 4. If the system of item 3 of the scope of patent application, where the first memory I ----—— —- — ΙΊΙ — —-II-; ./(ν '< Please read the notes on the back before filling (This page) Order. · Line-Thai paper size applies to Chinese National Standard (CNS) A4 (210 X 297 mm) A8 B8 C8 D8 54 1 75 6. The scope of patent application is erasable and programmable read-only memory (EPROM), and the second memory is a static random access memory (SRAM). 5. The system according to item 1 of the patent application scope, wherein the authorization code input device includes a small keyboard. 6. The system according to item 1 of the patent application scope, wherein the authorization code input device includes one of a token and a key card. 7. —A method for verifying the formatting of the storage medium, including the steps of connecting the verifier driver to a verifier host computer that has secured memory containing the verification code used by the verifier driver ; Recover the verification code from the secured memory of the verifier host computer > receive the user authorization code at the verifier driver; approve the user authorization code; convert the verification code to the verifier driver To reflect the valid user authorization code; store the verification code in the memory of the verifier driver; and implement the verification process of the storage medium. 8. If the method of claim 7 is applied, the method further includes the step of erasing the verification code from the memory after the verification process is completed. 9. A verifier driver capable of verifying a storage medium, comprising: a driver mechanism including a read / write electronic device capable of transferring data into and out of the storage medium; a device capable of reading, writing, and outputting data Read / write heads for storage media; 2 This paper size applies Chinese National Standard (CNS) A4 (210 X 297 mm) — — — — — — —. 1 I 1 III · 1111111 ^ «— — — — — — I— (Please read the notes on the back before filling out this page) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 經濟部智慧財產局員工消費合作社印製 六、申請專利範圍 —個可懸掛及移動儲存媒體上之該讀/寫磁頭的手臂; 一個可反應從該讀/寫電子裝置出來之指令來移動該手 臂的致動器;及 一個可以事先決定之速度來旋轉儲存媒體的轉軸; 一個可接收授權碼的授權碼輸入裝置; 一個被連接至該驅動機及該授權碼輸入裝置用以彳亥$ 該授權碼的微控制器; 一個被連接至該微控制器裝置的記憶體裝置; 一個擁有包含由該驗證器驅動機所使用之驗證碼之被 保密的記憶體,該驗證碼被提供至該記憶體裝置’以反應 該被核准之授權碼。 10. 如申請專利範圍第9項之驗證器驅動機,其中’該 記憶體裝置包含一個第一記憶體及一個第二記憶體。 11. 如申請專利範圍第10項之驗證器驅動機,其中’ 該第一記憶體爲非依電性記憶體,且該第二記憶體爲依電 性記憶體。 12. 如申請專利範圍第11項之驗證器驅動機,其中, 該第一記憶體爲可抹除可程式唯讀記憶體(EPROM),且該 第二記憶體爲靜態隨機存取記憶體(SRAM)。 13. 如申請專利範圍第9項之驗證器驅動機,其中,該 授權碼輸入裝置包含一個符記及一個鍵卡兩者之一。 14. 一種可驗證儲存媒體之格式化的方法,包含的步驟 爲· 將鍵卡插入驗證器驅動機; 3 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -----II.--------1/----I I--訂---------線 (請先閲讀背面之注意事項再填⑤本頁) 4 5 1 75 A8 B8 C8 D8 六、申請專利範圍 決定該鍵卡是否被核准; 解密該被保密的驗證碼,以回應該被核准之鍵卡; 將該被解密之驗證碼儲存於記憶體中; 利用被解密之驗證碼來實施驗證於儲存媒體上。 15.如申請專利範圍第14項之方法,更進一步包含該 驗證過程完成後將該驗證碼從該記憶體抹除的步驟。 (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作杜印製 4 ^紙尺度適用中國國家標準(CNS)A4規格(210 X 29f"i釐)Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 6. Scope of patent application-an arm that can suspend and move the read / write head on the storage medium; one that can move the arm in response to instructions from the read / write electronic device An actuator that can rotate the storage medium at a predetermined speed; an authorization code input device that can receive an authorization code; one that is connected to the driver and the authorization code input device to use the authorization Code microcontroller; a memory device connected to the microcontroller device; a secured memory having a verification code used by the verifier driver, the verification code being provided to the memory The device 'responds to the approved authorization code. 10. The validator driver according to item 9 of the patent application scope, wherein the memory device includes a first memory and a second memory. 11. For example, the validator driver of the scope of application for patent No. 10, wherein the first memory is a non-dependent memory, and the second memory is a dependent memory. 12. For example, the verifier driver of the scope of application for patent, wherein the first memory is an erasable and programmable read-only memory (EPROM), and the second memory is a static random access memory ( SRAM). 13. The validator driver of claim 9 in which the authorization code input device includes one of a token and a key card. 14. A method for verifying the formatting of storage media, including the steps of: · Inserting the key card into the verifier driver; 3 This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) --- --II .-------- 1 / ---- I I--order --------- line (please read the precautions on the back before filling in this page) 4 5 1 75 A8 B8 C8 D8 6. The scope of patent application determines whether the key card is approved; Decrypt the secret verification code in response to the approved key card; Store the decrypted verification code in memory; The decrypted verification code is used for verification on the storage medium. 15. The method according to item 14 of the scope of patent application, further comprising the step of erasing the verification code from the memory after the verification process is completed. (Please read the notes on the back before filling out this page) Printed by the consumer cooperation of the Intellectual Property Bureau of the Ministry of Economic Affairs 4 ^ The paper size applies the Chinese National Standard (CNS) A4 specification (210 X 29f " i%)
TW088118036A 1998-10-30 1999-10-19 System and method for protecting and securing a media verifier TW454175B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US18328798A 1998-10-30 1998-10-30

Publications (1)

Publication Number Publication Date
TW454175B true TW454175B (en) 2001-09-11

Family

ID=22672207

Family Applications (1)

Application Number Title Priority Date Filing Date
TW088118036A TW454175B (en) 1998-10-30 1999-10-19 System and method for protecting and securing a media verifier

Country Status (2)

Country Link
TW (1) TW454175B (en)
WO (1) WO2000026748A1 (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5333140A (en) * 1991-10-03 1994-07-26 Helios Incorporated Servowriter/certifier
US5917669A (en) * 1996-08-15 1999-06-29 Iomega Corporation Method for transferring operational data between stations during a disk format process
US5894425A (en) * 1997-02-28 1999-04-13 Quantum Corporation Wireless secondary interface for data storage device

Also Published As

Publication number Publication date
WO2000026748A1 (en) 2000-05-11

Similar Documents

Publication Publication Date Title
US5159182A (en) Smart data storage device
US7124301B1 (en) Data protection method for a removable storage medium and a storage device using the same
TW403898B (en) Method for detecting transient write errors in a disk drive
US6722570B1 (en) Smart data storage device
US5418852A (en) Unauthorized use prevention method for optical disks, optical disk having unauthorized use prevention function, and optical disk apparatus
US9195858B2 (en) Encrypted data storage device
JPS6242304B2 (en)
GB2131580A (en) Frustrating the unauthorized copying of recorded data
CN101477609A (en) Tamper resistant method and apparatus for a storage device
US6980387B2 (en) Magnetic disk medium, fixed magnetic disk drive unit, and method thereof
US6958883B2 (en) Apparatus for reading and writing cards having rotating memory
US20050219731A1 (en) Magnetic disk drive with a use time limiting function
TW454175B (en) System and method for protecting and securing a media verifier
US20060136989A1 (en) Method of authentication of memory device and device therefor
KR20040000345A (en) Information recording/reproducing system
JPH11203205A (en) Information storage system
JPH10293721A (en) Information recording method capable of preventing fraudulent alteration, information recorder and information recording medium
JP2010146127A (en) Data storage device and method for analyzing data storage device
US8073142B2 (en) Information recording/reproducing device and information recording medium
JPH07161172A (en) Data recording medium
JP2703957B2 (en) Recording device and recording method for portable medium
JP2003110552A (en) Card authentication system, information recording card, and card authenticating method
JP4246708B2 (en) Storage medium writing / reading device
JP3654965B2 (en) Information recording medium issue support device
TW513696B (en) Method for detecting transient write errors in a disk drive and for differentiating transient write errors from permanent media damage