WO2007118034A3 - System and method for write failure recovery - Google Patents
System and method for write failure recovery Download PDFInfo
- Publication number
- WO2007118034A3 WO2007118034A3 PCT/US2007/065679 US2007065679W WO2007118034A3 WO 2007118034 A3 WO2007118034 A3 WO 2007118034A3 US 2007065679 W US2007065679 W US 2007065679W WO 2007118034 A3 WO2007118034 A3 WO 2007118034A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- cipher block
- block chaining
- write failure
- failure recovery
- data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/1666—Error detection or correction of the data by redundancy in hardware where the redundant component is memory or memory area
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/16—Protection against loss of memory contents
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
When cipher block chaining encryption/decryption is employed, write fault recovery is accomplished by storing information useful for the writing of cipher block chaining processed data before it is written to storage cells. Hence when write failure is discovered, this information stored can be retrieved for rewriting the data to the cells. Preferably, the information stored includes security configuration information for cipher block chaining processing a unit of data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009504395A JP2009537026A (en) | 2006-04-03 | 2007-03-30 | System and method for write failure recovery |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/397,416 US7835518B2 (en) | 2006-04-03 | 2006-04-03 | System and method for write failure recovery |
US11/397,416 | 2006-04-03 | ||
US11/397,101 | 2006-04-03 | ||
US11/397,101 US20070230690A1 (en) | 2006-04-03 | 2006-04-03 | System for write failure recovery |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007118034A2 WO2007118034A2 (en) | 2007-10-18 |
WO2007118034A3 true WO2007118034A3 (en) | 2009-08-13 |
Family
ID=38581765
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2007/065679 WO2007118034A2 (en) | 2006-04-03 | 2007-03-30 | System and method for write failure recovery |
Country Status (4)
Country | Link |
---|---|
JP (1) | JP2009537026A (en) |
KR (1) | KR20080108119A (en) |
TW (1) | TW200817993A (en) |
WO (1) | WO2007118034A2 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020071553A1 (en) * | 2000-10-20 | 2002-06-13 | Taizo Shirai | Data storage device, data recording method, data playback method, and program providing medium |
WO2002101976A1 (en) * | 2001-06-13 | 2002-12-19 | Corrent Corporation | Security association data cache |
US20060015754A1 (en) * | 2004-07-15 | 2006-01-19 | International Business Machines Corporation | E-fuses for storing security version data |
US20060050564A1 (en) * | 2004-09-08 | 2006-03-09 | Kabushiki Kaisha Toshiba | Non-volatile semiconductor memory device |
-
2007
- 2007-03-30 JP JP2009504395A patent/JP2009537026A/en active Pending
- 2007-03-30 WO PCT/US2007/065679 patent/WO2007118034A2/en active Application Filing
- 2007-03-30 KR KR1020087024279A patent/KR20080108119A/en not_active Application Discontinuation
- 2007-04-03 TW TW096111847A patent/TW200817993A/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020071553A1 (en) * | 2000-10-20 | 2002-06-13 | Taizo Shirai | Data storage device, data recording method, data playback method, and program providing medium |
WO2002101976A1 (en) * | 2001-06-13 | 2002-12-19 | Corrent Corporation | Security association data cache |
US20060015754A1 (en) * | 2004-07-15 | 2006-01-19 | International Business Machines Corporation | E-fuses for storing security version data |
US20060050564A1 (en) * | 2004-09-08 | 2006-03-09 | Kabushiki Kaisha Toshiba | Non-volatile semiconductor memory device |
Also Published As
Publication number | Publication date |
---|---|
WO2007118034A2 (en) | 2007-10-18 |
TW200817993A (en) | 2008-04-16 |
KR20080108119A (en) | 2008-12-11 |
JP2009537026A (en) | 2009-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006074987A3 (en) | System and method for controlling acces to protected digital content by verification of a media key block | |
WO2009064631A3 (en) | Critical security parameter generation and exchange system and method for smart-card memory modules | |
WO2008127408A3 (en) | Method and system for encryption of information stored in an external nonvolatile memory | |
WO2011159918A3 (en) | Mass storage device memory encryption methods, systems, and apparatus | |
WO2010039667A3 (en) | External encryption and recovery management with hardware encrypted storage devices | |
WO2008061652A3 (en) | Coding method, decoding method, codec and data storage medium for holographic storage | |
WO2008063965A3 (en) | Method and system to provide security implementation for storage devices | |
GB2429308B (en) | Data transfer device | |
WO2007121035A3 (en) | Method and system for high throughput blockwise independent encryption/decryption | |
JP2008527816A5 (en) | ||
EP2645673A3 (en) | Storage device and its control method | |
WO2010127030A3 (en) | Selectively securing data and/or erasing secure data caches responsive to security compromising conditions | |
EP1637960A3 (en) | System and method for using address bits to signal security attributes of data in the address space | |
WO2007146763A3 (en) | Securing media content using interchangeable encryption key | |
TW200625900A (en) | Recovery of duplex data system after power failure | |
WO2009042820A3 (en) | Data security system with encryption | |
EP1970831A3 (en) | Storage apparatus | |
WO2011046731A3 (en) | Secure storage of temporary secrets | |
WO2012068286A3 (en) | System and method for providing a virtual secure element on a portable communication device | |
GB2445496A (en) | Method of manufacturing a limited use data storing device | |
WO2011005047A3 (en) | Information encoding method, information decoding method, recording/reproducing apparatus, and information storage medium | |
TW200733111A (en) | Storage medium for confidential information | |
JP2006079449A5 (en) | ||
WO2009120714A3 (en) | Method for securely storing a programmable identifier in a communication station | |
WO2008135996A3 (en) | Safe self-destruction of data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 1020087024279 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009504395 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07781076 Country of ref document: EP Kind code of ref document: A2 |