Browse Prior Art Database

Controlling the access permission of storage system

IP.com Disclosure Number: IPCOM000015461D
Original Publication Date: 2002-Jan-26
Included in the Prior Art Database: 2003-Jun-20
Document File: 2 page(s) / 54K

Publishing Venue

IBM

Abstract

Disclosed is a system for the storage device which is able to disable the subsequent read access by a command and re-enable the read access when all user data in the storage device is overwritten from the time the command is processed.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 70% of the total text.

Page 1 of 2

Controlling the access permission of storage system

Disclosed is a system for the storage device which is able to disable the subsequent read access by a command and re-enable the read access when all user data in the storage device is overwritten from the time the command is processed.

The data in a storage device needs to be wiped out for the information security when the device is disposed or replaced. This operation requires a certain amount of time to complete, and it occupies the resources (such as the storage interface, host processor, physical space) until the information is erased. The storage device with disclosed function is to allow the user to free up the resources immediately when the storage device is no longer dispensable while it protects the information from reading.

The storage device with this function consists of a storage media with integrated controller circuit, and the firmware on the controller circuit. The firmware handles a set of commands from host processor through the storage interface as in the figure below.

Disclosed function is achieved by the firmware which handles the access permission flag as following steps;

1. Initially, the access permission flag is set to ALLOWED so that the user data is allowed to be read by the host processor. The permission flag is stored in the non-user data area and not accessible from the host processor.
2. When the firmware receives the command which changes the access permission flag, the flag is set...