throbber
Page 1 of 10
`
`Unified Patents Exhibit 1009
`
`

`
`
`U.S. Patent
`
`
`
`Jan. 4,2000
`
`
`
`
`
`Sheet 1 of4
`
`
`
`
`
`
`6,012,145
`
`
`
`
`
`
`
`
`
`
`
`
`
`0000000000000000000000000000002200 |
`
`]|][|[|[l|]l][||]l][l|][l[l|][l|]|][l[l|]|]|][||][J|]|]|][||][l[|[lfl
`
`
`
`
`
`Page 2 of 10
`
`Page 2 of 10
`
`

`
`
`U.S. Patent
`
`
`
`Jan. 4,2000
`
`
`
`
`
`Sheet 2 of4
`
`
`
`
`
`
`6,012,145
`
`
`
`, _ _ _ _ _ . . _ _ . . _ . . . . _ _ . . _ _ _ _ _ . _ _ _ _ _ _ _ _ _l
`
`
`SPINDLE MOTOR
`
`
`
`VCM
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` FUNCTION
`
`
`
`PRE-AMPLIFIER
`
`
`DATA CHANNEL
`
`
`MIXED SIGNAL ASIC
`
`MICRO-PRO(ESSOR
`
`
`
`FLASH EEPROM
`
`INTERFACE
`
`
`
`
`
`MOTOR CMDRIVE (DNTRDLLER
`
`
`INTERFACE PCMCIA
`
`
`IEO ELASTOMERIC common
`
`
`
`
`
`
`lij 68 WAY CONNECTOR
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 3 of 10
`
`
`FIG. 3.
`
`
`
`Page 3 of 10
`
`

`
`
`U.S. Patent
`
`
`
`Jan. 4,2000
`
`
`
`
`
`Sheet 3 of4
`
`
`
`
`
`
`6,012,145
`
`
`
`
`
`PASSWORD PROTECTION EXAMPLE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`THE USER REQUIRES TO SET THE HARD DISK INTO NO DATA PROTECTION MODE
`
`
`
`
`
`
`
`
`
`
`THE USER RUNS A PASSWORD PROTECTION UTILITY PROGRAM
`
`
`
`
`
`
`
`
`
`
`THE UTILITY PROGRAM DISPLAYS A MENU OF OPTIONS:
`
`
`
`
`
`
`N — NO DATA PROTECTION
`
`
`
`P - PARTIAL DATA PROTECTION
`
`
`
`
`E - FULL DATA PROTECTION
`
`
`
`
`L - CHANGE LOW-LEVEL PASSWORD
`
`
`
`Ig - ‘SHATNGE MASTER-KEY PASSWORD
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`THE USER SELECTS THE NO DATA PROTECTION OPTION ‘N’
`
`
`
`
`
`THE UTILITY D|SPLAYS:-
`
`
`
`
`
`
`
`
`NO DATA PROTECTION OPTION SELECTED - ENTER PASSWORD:-
`
`
`
`
`
`THE USER ENTERS THE PASSWORD
`
`
`
`
`
`
`
`
`
`
`
`THE UTILITY EXECUTES THE NO DATA PROTECTION MODE COMMAND
`
`
`
`
`
`
`
`
`
`
`
`THE DRIVE IS NOW IN NO DATA PROTECTION MODE
`
`
`
`
`
`
`
`
`
`
`
`
`THE USER EXITS THE UTILITY BY SELECTING THE QUIT OPTION
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`TTHE OTHER COMMANDS ARE EXECUTED IN A SIMILAR FASHION EXCEPT THAT
`
`
`
`
`
`
`
`
`
`
`CHANGING THE PASSWORDS OPTIONS WOULD PROMPT THE USER FOR BOTH THE
`
`
`
`
`
`OLD AND THE NEW PASSWORDS.
`
`
`
`
`H6. 4.
`
`
`
`Page 4 of 10
`
`Page 4 of 10
`
`

`
`
`U.S. Patent
`
`
`
`Jan. 4,2000
`
`
`
`
`
`Sheet 4 of4
`
`
`
`
`
`
`6,012,145
`
`
`
`
`
`
`
`
`
`PASSWORD PROTECTION HARD DRIVE COMMAND HANDLING SEQUENCE
`
`
`
`
`
`
`
`
`
`THE DRIVE RECEIVES A DATA PROTECTION COMMAND
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`PASSWORD DATA IS SENT TO THE DRIVE
`
`
`
`
`
`
`
`THE MICROPROCESSOR COMPARES EACH OF THE I28
`
`
`
`
`
`
`
`
`
`BYTES OF PASSWORD WITH THAT STORED IN THE FLASH ROM
`
`
`
`
`
`
`
`
`
`
`
`
`?
`
`
`
`YES
`
`
`
`
`
`
`
`
`
`
`
`I28 BYTES OF NEW PASSWORD DATA IS SENT TO THE
`
`
`
`
`
`
`
`DRIVE AND IS TEMPORARILY STORED IN RAM
`
`
`
`
`
`
`
`
`
`
`THE NEW PASSWORD IS WRITTEN TO FLASH ROM
`
`
`
`I
`
`
`
`
`
`
`
`
`THE WRITE AND READ INHIBIT FLAGS IN ONE OF
`
`
`
`
`
`THE M|CROPROCESSOR’S REGISTERS ARE SET
`
`
`
`
`
`
`
`
`
`
`
`
`
`THE WRITE AND READ INHIBIT FLAGS HELD IN ONE OF THE
`
`
`
`
`
`
`M|CROPROCESSOR’S REGISTERS ARE SET ACCORDING TO
`
`
`
`
`
`THE DATA PROTECTION COMMAND SENT
`
`
`
`
`
`
`
`
`
`
`
`THE DRIVE ENTERS A LOCK UP MODE ONLY
`
`
`
`
`
`
`RECOVERABLE BY A POWER ON RESET
`
`
`H6. 5.
`
`
`
`Page 5 of 10
`
`Page 5 of 10
`
`

`
`1
`SECURITY SYSTEM FOR HARD DISK
`
`
`
`
`
`DRIVE
`
`
`
`6,012,145
`
`2
`
`
`
`
`password is stored), on the disk drive electronics board, so
`
`
`
`
`
`
`
`
`
`
`that the main part of the security system is largely contained
`
`
`
`
`
`
`
`
`
`
`
`in the portable disk drive itself. In one possible form of the
`
`
`
`
`
`
`
`
`
`
`
`
`invention though the utility software may be formed and
`
`
`
`
`
`
`
`
`
`arranged to read in a computer system identification number
`
`
`
`
`
`
`
`
`(the BIOS Serial No) and use this as a “user input” password
`
`
`
`
`
`
`
`
`
`
`
`to be compared against a stored password so that the drive
`
`
`
`
`
`
`
`
`
`
`
`is “protected” for automatic access only (possibly subject to
`
`
`
`
`
`
`
`
`
`use of a master password) from a particular computer.
`
`
`
`
`
`
`
`
`
`The user may advantageously have the option of setting
`
`
`
`
`
`
`
`
`two or more different levels of security required, such as “no
`
`
`
`
`
`
`
`
`
`
`protection”, “read only” or “full protection”.
`
`
`
`
`
`
`In “no protection” mode the drive password defaults to a
`
`
`
`
`
`
`
`
`
`free access condition. In “read only” mode, files can be read
`
`
`
`
`
`
`
`
`
`
`
`but not altered and new files may not be added to the drive.
`
`
`
`
`
`
`
`
`
`
`
`
`
`In “no access” mode the drive will not allow any access.
`
`
`
`
`
`
`
`
`
`
`
`A Master Password is desirably provided which is stored
`
`
`
`
`
`
`
`
`
`in a different location in the flash memory. This can only be
`
`
`
`
`
`
`
`
`
`
`
`
`used by suitable authorised personnel to over-ride any user
`
`
`
`
`
`
`
`
`
`selected password, for example in the event of a regular
`
`
`
`
`
`
`
`
`
`
`password being forgotten. The Master Password could be set
`
`
`
`
`
`
`
`
`
`during the manufacture of the drive, but more conveniently
`
`
`
`
`
`
`
`
`
`is set by a purchaser of the disk drive.
`
`
`
`
`
`
`
`
`
`The system advantageously has means which prevent the
`
`
`
`
`
`
`
`
`use of special computer programs to decode the password
`
`
`
`
`
`
`
`
`
`and thereby gain access to the protected files so that if an
`
`
`
`
`
`
`
`
`
`
`
`
`illegal password is attempted, the drive “hangs” and requires
`
`
`
`
`
`
`
`
`
`a power-on reset before the password can be re-entered.
`
`
`
`
`
`
`
`
`
`Preferably, said first memory means is a non-volatile
`
`
`
`
`
`
`
`
`read-only-memory (ROM). Where a volatile memory is
`
`
`
`
`
`
`
`used then the system should of course be provided with
`
`
`
`
`
`
`
`
`
`
`power supply means or at
`least back-up power supply
`
`
`
`
`
`
`
`
`
`means, though this is generally less convenient. Preferably,
`
`
`
`
`
`
`
`
`said second memory means is a random access memory.
`
`
`
`
`
`
`
`
`
`Conveniently, said comparison means is a microprocessor
`
`
`
`
`
`
`which is formed and arranged to fetch a code corresponding
`
`
`
`
`
`
`
`
`
`
`to said stored password from the first memory, fetch a code
`
`
`
`
`
`
`
`
`
`
`
`corresponding to the “user-entered” password, and store the
`
`
`
`
`
`
`
`
`codes in first and second registers, and then compare the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`contents of the registers and only if there is a valid match,
`
`
`
`
`
`
`
`
`
`access to the disk drive is permitted. Advantageously the
`
`
`
`
`
`
`
`
`
`microprocessor is further formed and arranged so that if
`
`
`
`
`
`
`
`
`
`
`
`there is no valid match then the drive “hangs” and requires
`
`
`
`
`
`
`
`
`
`a power-on reset before a new password is entered.
`The first memory (e.g. non-volatile ROM), second
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`memory (e.g.
`random access memory) and comparison
`
`
`
`
`
`
`
`
`means (e. g. microprocessor) are all conveniently provided in
`solid state device means on a printed circuit board used for
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`controlling the disk drive (e.g. a PCMCIA Type III hard disk
`
`drive).
`According to a second aspect of the present invention,
`
`
`
`
`
`
`
`
`there is provided a method of controlling access to a portable
`
`
`
`
`
`
`
`
`
`hard disk drive comprising the steps of:
`
`
`
`
`
`
`
`storing a first password in a first, usually non-volatile
`
`
`
`
`
`
`
`
`memory;
`
`storing a user-entered password in a second memory;
`
`
`
`
`
`
`
`
`comparing the first password with the user-entered pass-
`
`
`
`
`
`
`
`word; and
`
`
`if a valid match is found, allowing the user access to the
`
`
`
`
`
`
`
`
`
`
`
`disk drive.
`
`
`Preferably, the method includes the step of allowing the
`
`
`
`
`
`
`
`
`
`user selectively to access one of a plurality of different
`
`
`
`
`
`
`
`
`
`
`protection levels by entering a code corresponding to the
`
`
`
`
`
`
`
`
`
`protection level together with the password.
`
`
`
`
`
`
`Preferably also, the method includes the step of altering
`
`
`
`
`
`
`
`
`the password stored in the non-volatile memory by entering
`
`
`
`
`
`
`
`
`a code corresponding to a password change, together with
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`10
`
`
`15
`
`
`20
`
`
`25
`
`
`30
`
`
`
`35
`
`
`40
`
`
`45
`
`
`50
`
`
`
`55
`
`
`
`60
`
`
`
`65
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`invention relates to a security system
`The present
`
`
`
`
`
`
`
`
`intended for the protection of information recorded on
`
`
`
`
`
`
`
`
`miniature portable hard disk drives for use typically in small
`
`
`
`
`
`
`
`
`
`
`portable computers.
`
`
`The advent of the PCMCIA interface and accompanying
`
`
`
`
`
`
`
`plug-compatible memory products means that truly portable
`
`
`
`
`
`
`mass storage devices will soon become commonplace and
`
`
`
`
`
`
`
`easily interchangeable between computer systems and simi-
`
`
`
`
`
`
`lar devices.
`
`
`The need for protection of confidential data files is of
`
`
`
`
`
`
`
`
`
`
`prime importance in these small disk drives as they can
`
`
`
`
`
`
`
`
`
`
`easily be lost or stolen and thus become available to unau-
`
`
`
`
`
`
`
`
`
`
`
`thorised users. A method of protection and the protection
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`apparatus must exist in the drive itself to ensure that it is
`
`
`
`
`
`
`
`
`secure wherever it is plugged in and run.
`Current methods of file protection such as those included
`
`
`
`
`
`
`
`
`
`within application software or those using separate utility
`
`
`
`
`
`
`
`
`software packages are not particularly suited to portable
`
`
`
`
`
`
`
`
`devices as they can either be easily decoded by someone
`
`
`
`
`
`
`
`
`
`
`skilled in the art or form part of the host system memory.
`
`
`
`
`
`
`
`
`
`
`
`
`A first object of the present invention is to provide a
`
`
`
`
`
`
`
`
`
`
`method of securing the files on a hard disk drive by means
`
`
`
`
`
`
`
`
`
`
`
`of user password protection.
`
`
`
`
`A second object of the present invention is to provide a
`
`
`
`
`
`
`
`
`
`
`system and method of securing the files on a hard disk drive
`
`
`
`
`
`
`
`
`
`
`
`for “read only” operation.
`
`
`
`
`A third object of the present invention is to provide a
`
`
`
`
`
`
`
`
`
`
`
`method of securing the files on a hard disk drive such that
`
`
`
`
`
`
`
`
`
`
`
`
`“no access” is permitted.
`
`
`
`
`A fourth object of the present invention is to provide a
`
`
`
`
`
`
`
`
`
`
`
`method of providing a Master Key password for authorised
`
`
`
`
`
`
`
`
`
`secondary access in the event that the user password is lost.
`
`
`
`
`
`
`
`
`
`
`
`A fifth object of the present invention is to provide a
`
`
`
`
`
`
`
`
`
`
`
`method of protecting the password from discovery by enci-
`
`
`
`
`
`
`
`
`phering software programs.
`
`
`
`Asixth object of the invention is to provide a system and
`
`
`
`
`
`
`
`
`
`
`
`apparatus to enable the method to be implemented.
`
`
`
`
`
`
`
`
`In accordance with the present invention there is pro-
`
`
`
`
`
`
`
`
`vided a memory and comparison means with a special utility
`
`
`
`
`
`
`
`program to enable the owner or user of a hard disk drive to
`
`
`
`
`
`
`
`
`
`
`
`
`protect the data files by setting an access password.
`
`
`
`
`
`
`
`
`
`According to a first aspect of the present invention there
`
`
`
`
`
`
`
`
`
`is provided a security system for a portable hard disk drive,
`
`
`
`
`
`
`
`
`
`
`said system comprising:
`
`
`
`first memory means for storing a password for allowing a
`
`
`
`
`
`
`
`
`
`user to have access to information on the disk;
`
`
`
`
`
`
`
`
`
`second memory means for storing a user-entered pass-
`
`
`
`
`
`
`
`word; and
`
`
`comparison means coupled to said first memory means
`
`
`
`
`
`
`
`
`and to said second memory means for comparing the
`
`
`
`
`
`
`
`
`
`stored password with the user-entered password and for
`
`
`
`
`
`
`
`
`permitting access to information on the disk if the
`
`
`
`
`
`
`
`
`
`passwords match and preventing access when there is
`
`
`
`
`
`
`
`
`no match.
`
`
`
`
`
`
`
`
`
`
`
`
`The password is conveniently stored in flash or other solid
`
`
`
`
`
`
`
`
`state non-volatile memory on the disk drive electronics
`board and it controls unauthorised access of the drive
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`depending on the level of protection selected. Code used to
`
`
`
`
`
`
`
`
`
`
`
`interact with an utility program which is run on a commuter
`
`
`
`
`
`
`
`
`
`
`
`
`
`in which the disk drive is being used in order to provide a
`
`
`
`
`
`
`reasonably user-friendly interface for entry and/or amend-
`
`
`
`
`
`
`
`
`
`ment of passwords, setting of protection mode etc, is also
`
`
`
`
`
`
`
`
`conveniently stored in flash or other solid state memory
`
`
`
`
`
`
`
`
`
`
`(which may be the same device as that
`in which the
`
`
`
`
`
`Page 6 of 10
`
`Page 6 of 10
`
`

`
`
`6,012,145
`
`4
`
`
`
`
`
`
`a) No data protection (write and read access permitted);
`
`
`
`
`
`
`
`
`b) Partial data protection (read access only permitted);
`
`
`
`
`
`
`
`
`c) Full data protection (no data access permitted);
`
`
`
`
`
`
`
`
`d) Low-level password alteration; and
`
`
`
`
`
`e) Master key password alteration.
`
`
`
`
`
`It will be appreciated that the passwords are entered from
`
`
`
`
`
`
`
`
`
`the keyboard of a computer in which the disk drive has been
`
`
`
`
`
`
`
`
`
`
`
`installed, via a menu-driven utility. The low-level and mas-
`
`
`
`
`
`
`
`
`ter key passwords each consist of a 127 bytes of data (the
`
`
`
`
`
`
`
`
`
`
`
`
`128th byte being conveniently used to set a flag indicating
`
`
`
`
`
`
`
`
`
`
`current access mode whereby this can be “remembered” by
`
`
`
`
`
`
`
`
`
`the system for a subsequent access). The low-level password
`
`
`
`
`
`
`
`
`
`default is all ‘FFh’s which serves as the only means of
`
`
`
`
`
`
`
`
`
`
`
`permanently disabling the drive’s Data Protection system.
`
`
`
`
`
`
`
`Master key Password support is also provided as a means for
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`over-riding the Low-Level Password.
`Once a valid Low-Level Password has been set (i.e. at
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`least one of its 127 bytes is non FFh) the drive will default
`on a subsequent power up to Full Data Protection Mode.
`
`
`
`
`
`
`
`
`
`
`In the preferred embodiment of the invention, as noted
`
`
`
`
`
`
`
`
`
`above, re-powering up is arranged to restore the protection
`
`
`
`
`
`
`
`
`
`mode last set. This is particularly useful where for example
`
`
`
`
`
`
`
`
`
`
`it is desired to provide read-only access to one or more users
`
`
`
`
`
`
`
`
`
`
`
`
`who are not password holders to allow such users readily to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`access data whilst preventing any unauthorized tampering
`
`
`
`
`
`
`
`
`
`with the data—for example, where portable hard disk drives
`
`
`
`
`
`
`
`
`
`
`are used to supply spare part, product and/or pricing data
`
`
`
`
`
`
`
`
`
`
`which requires to be updated more or less frequently,
`to
`
`
`
`
`
`
`
`
`service centres, supermarkets or the like which use comput-
`erized files, manufacturers etc.
`
`
`
`
`The particular protection levels are as follows:
`
`
`
`
`
`
`
`
`
`
`
`a) No Data Protection Mode
`This function allows the drive to operate in a mode where
`
`
`
`
`
`
`
`
`
`
`both Write and Read operations are permissible.
`It
`is
`
`
`
`
`
`
`
`
`
`executed internally under the control of the microprocessor
`
`
`
`
`
`
`
`
`IC4 via the following sequence:
`
`
`
`
`
`
`
`
`Set the Sector Count Register to
`
`
`
`
`
`
`Set the Sector Number Register to
`
`
`
`
`
`Set the Cylinder Low Register to
`
`
`
`
`
`
`Set the Cylinder High Register to
`
`
`
`
`
`
`Set the Drive/Head Register to
`
`
`
`
`
`
`
`
`Set the Command Register to
`
`
`
`
`
`
`
`93h
`42h
`69h
`26h
`00h (No data
`
`
`
`protection
`
`function)
`
`82h (Data
`
`
`protection
`
`command)Wait
`
`until the Status Register has Busy (Bit 7) = 0 and DRQ
`
`
`
`
`
`
`
`
`
`
`
`
`(Bit 3) = 1 Password loop:
`
`
`
`
`
`
`
`
`
`
`
`
`
`Wait until the Drive/Head Register Bits 0—3=Fh
`
`
`
`
`
`
`
`Set the Sector Count Register with the first (or next)
`
`
`
`
`
`
`
`
`
`Password byte
`
`
`Set the Drive/Head Register to 00h
`
`
`
`
`
`
`Repeat Password loop until all 127 bytes of the Password
`
`
`
`
`
`
`
`
`
`
`have been transferred.
`
`
`
`Wait for the Status Register DRQ (Bit3)=0 An Interrupt
`
`
`
`
`
`
`
`
`
`shall also be generated by the drive upon command comple-
`
`
`
`
`
`
`
`
`
`tion.
`
`Read and Write Data access of the drive shall now be
`
`
`
`
`
`
`
`
`
`
`permitted. The above is best seen with reference to the
`
`
`
`
`
`
`
`
`
`flowchart in FIGS. 4 and 5 of the drawings. Similar flow-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`charts are used for protection levels b) and c) and the
`flowchart in FIG. 5 is also applicable to password changing
`
`
`
`
`
`
`
`
`
`as will be described.
`
`
`
`
`
`
`
`
`
`b) Partial Data Protection Mode
`This function is implemented in exactly the same way as
`
`
`
`
`
`
`
`
`
`
`that of the No Data Protection Mode with the exception of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`3
`the existing password stored in said volatile memory and the
`
`
`
`
`
`
`
`
`
`
`new password to be stored, so that said new password
`
`
`
`
`
`
`
`
`
`
`replaces said existing password.
`
`
`
`
`Conveniently, said codes corresponding to different levels
`
`
`
`
`
`
`of data protection and said passwords are entered from a
`
`
`
`
`
`
`
`
`
`keyboard of a computer in which the disk drive has been
`
`
`
`
`
`
`
`
`
`
`installed via a software utility run on that computer.
`
`
`
`
`
`
`
`
`
`According to another aspect of the present
`invention,
`
`
`
`
`
`
`
`
`there is provided a circuit board for use with a portable disk
`
`
`
`
`
`
`
`
`
`
`
`
`drive for controlling access to information on the disk, said
`
`
`
`
`
`
`
`
`
`
`circuit board comprising disk drive control means for con-
`trolling the rotation of the disk and for writing and reading
`
`
`
`
`
`
`
`
`information to and from the disk, first memory means
`
`
`
`
`
`
`
`
`
`
`
`disposed on said circuit board for storing first password for
`
`
`
`
`
`
`
`
`
`allowing a user access to the disk, second memory means
`
`
`
`
`
`
`
`
`
`
`disposed on the circuit board for storing a password entered
`
`
`
`
`
`
`
`
`
`
`by a user, comparison means mounted on the circuit board
`
`
`
`
`
`
`
`
`
`
`and coupled to the first and to the second memory means for
`
`
`
`
`
`
`
`
`
`
`comparing the stored first password with the user-entered
`
`
`
`
`
`
`
`
`
`
`
`
`password and for generating an access control signal to
`
`
`
`
`
`
`
`
`allow the user access to the disk if a valid match is found and
`
`
`
`
`
`
`
`
`
`to prohibit access if there is no match.
`
`
`
`
`
`
`
`
`
`
`
`
`
`These and other aspects of the invention will become
`
`
`
`
`
`
`
`
`apparent from the following description when taken in
`
`
`
`
`
`
`
`
`combination with the accompanying drawings in which:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`FIGS. 1 and 2 are top and bottom views of a PCB layout
`
`
`
`
`
`
`
`
`
`
`
`
`
`for a PCMCIA type III disk drive;
`
`
`
`
`
`
`
`FIG. 3 is a circuit block diagram representing the elec-
`
`
`
`
`
`
`
`
`
`tronic circuitry shown in FIGS. 1 and 2
`
`
`
`
`
`
`
`
`FIG. 4 is a flowchart of the sequence of operation which
`
`
`
`
`
`
`
`
`
`
`
`takes place when a user requires to set a hard disk into ‘No
`
`
`
`
`
`
`
`
`
`
`
`
`
`Data Protection Model’; and
`
`
`
`
`FIG. 5 is a flowchart of the sequence of operations which
`
`
`
`
`
`
`
`
`
`takes place when the disk drive receives a ‘Data Protection
`Command’.
`
`
`
`
`
`
`
`
`
`
`Reference is first made to FIGS. 1 and 2 of the drawings
`
`
`
`
`
`
`
`
`
`
`
`
`which depict a printed circuit board generally indicated by
`
`
`
`
`
`
`
`
`
`reference numeral 10 which has a plurality of electronic
`
`
`
`
`
`
`
`
`
`components (IC2—IC9) thereon, as indicated in FIG. 1, and
`
`
`
`
`
`
`
`
`
`which has a central aperture 12 for receiving the protruding
`
`
`
`
`
`
`
`
`
`
`flange of a spindle motor (not shown in the interests of
`
`
`
`
`
`
`
`
`
`
`
`clarity).
`
`The general principles of operation of a PCMCIA disk
`
`
`
`
`
`
`
`
`
`drive are well known and will not be discussed further, as
`
`
`
`
`
`
`
`
`
`
`
`these are disclosed in applicants’ copending U.K. Applica-
`
`
`
`
`
`
`
`tion No. 9224176.9 and corresponding patent publication
`
`
`
`
`
`
`
`No. WO94/11877. As can be seen from FIGS. 1, 2 and 3, IC5
`
`
`
`
`
`
`
`
`
`
`
`
`is a non-volatile flash EPROM (e.g. ATMEL AT29C512
`
`
`
`
`
`
`
`
`(64K bytes) in a 32 pin TSOP package) constituting a first
`
`
`
`
`
`
`
`
`
`
`
`memory means. Auser-defined password is stored in IC5. A
`
`
`
`
`
`
`
`
`
`
`software utility is run on the computer for setting the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`password and subsequent entry and/or editing of the pass-
`
`
`
`
`
`
`
`
`
`
`
`word for access to the drive data. The user’s password is
`
`
`
`
`
`
`
`
`stored in IC7 STATIC RAM (e.g. Sony CXK5827ATM
`
`
`
`
`
`
`
`
`(32K bytes) in a 28 pin TSOP package).
`The code for interacting with the software utility is also
`
`
`
`
`
`
`
`
`
`
`stored in the flash EEPROM IC5 and is read into the DSP
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`RAM in the disk drive microprocessor IC4 (preferably a
`
`
`
`
`
`
`
`
`
`
`Zilog 286C95 in 100 pin VQFP package) prior to rewriting
`
`
`
`
`
`
`
`a new password in the DSP RAM.
`As described above there are various levels of data
`
`
`
`
`
`
`
`
`
`protection which can be implemented with this system. A
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`vendor unique interface command 82h is used to control the
`
`
`
`
`
`
`
`
`
`data protection mechanism in the drive. This is transparent
`
`
`
`
`
`
`
`
`
`
`
`
`to the user: it is not menu driven, and software recognises the
`
`
`
`
`
`
`
`
`
`
`
`input code (a to c) to determine the level of protection
`
`
`
`
`
`
`
`
`
`required. Five different levels of protection are provided as
`follows:
`
`
`
`
`10
`
`
`
`15
`
`
`
`20
`
`
`
`
`
`
`
`
`
`25
`
`30
`
`35
`
`40
`
`
`
`45
`
`
`
`50
`
`
`
`55
`
`
`
`60
`
`
`
`65
`
`
`
`Page 7 of 10
`
`Page 7 of 10
`
`

`
`
`6,012,145
`
`
`
`
`
`
`5
`the Drive/Head Register being set to 01h prior to setting the
`
`
`
`
`
`
`
`
`
`
`Command Register.
`
`
`Once the command is completed, Read Data access only
`
`
`
`
`
`
`
`
`shall be permitted. Attempts at sending write commands
`
`
`
`
`
`
`
`shall result in Aborted Command Errors.
`
`
`
`
`
`
`c) Full Data Protection Mode
`
`
`
`
`
`This function is implemented in exactly the same way as
`
`
`
`
`
`
`
`
`
`
`that of the No Data Protection Mode with the exception of
`
`
`
`
`
`
`
`
`
`
`
`the Drive/Head Register being set to 02h prior to setting the
`
`
`
`
`
`
`
`
`
`
`
`Command Register.
`
`
`Once the command is completed, No Data access shall be
`
`
`
`
`
`
`
`
`
`permitted. Attempts at sending Write or Read commands
`
`
`
`
`
`
`
`shall result in Aborted Command Errors.
`
`
`
`
`
`
`d) Low-Level Password Alteration
`
`
`
`
`The Low-Level Data Protection Password can be changed
`
`
`
`
`
`
`
`
`by sending the old Low-Level Password along with the new
`
`
`
`
`
`
`
`
`
`
`one in the following command sequence:
`
`
`
`
`
`
`
`
`
`
`
`
`Set the Sector Count Register to
`
`
`
`
`
`
`Set the Sector Number Register to
`
`
`
`
`
`Set the Cylinder Low Register to
`
`
`
`
`
`
`Set the Cylinder High Register to
`
`
`
`
`
`
`Set the Drive/Head Register to
`
`
`
`
`
`(Password Alteration Function)
`
`
`
`Set the Command Register to
`
`
`
`
`
`(Data Protection Command)
`
`
`
`
`93 h
`
`42 h
`
`69 h
`
`26 h
`
`03 h
`
`82 h
`
`
`
`
`
`
`
`
`
`
`
`
`Wait until the Status Register has Busy (bit 7)=0 and DRQ
`
`
`
`
`
`
`
`
`
`
`(bit 3)=1
`
`
`Password_loop_1:
`
`
`
`Wait until the Drive/Head Register Bits 0—3=Fh
`
`
`
`
`
`
`
`Set the Sector Count Register with the first (or next) Old
`
`
`
`
`
`
`
`
`
`
`
`Password byte
`
`
`Set the Drive/Head Register to 00h
`
`
`
`
`
`
`Repeat Password_loop_1 until all 128 bytes of the Old
`
`
`
`
`
`
`
`
`
`
`
`Password have been transferred.
`
`
`
`
`Wait for the Status Register DRQ (bit 3)=0
`
`
`
`
`
`
`
`Password,loop,2:
`
`
`
`Wait until the Drive/Head Register Bits 0—3=Fh
`
`
`
`
`
`
`
`Set the Sector Count Register with the first (or next) New
`
`
`
`
`
`
`
`
`
`
`Password byte
`
`
`Set the Drive/Head Register to 00h
`
`
`
`
`
`
`Repeat Password_loop_2 until all 127 bytes of the Old
`
`
`
`
`
`
`
`
`
`
`
`Password have been transferred.
`
`
`
`
`Wait until the Sector Count Register=01h.
`
`
`
`
`
`
`An Interrupt shall also be generated by the drive upon
`
`
`
`
`
`
`
`
`
`command completion.
`
`
`e) Master Key Password Alteration
`
`
`
`
`
`The Master Key Protection Password can be changed by
`
`
`
`
`
`
`
`
`
`sending the old Master Key Password along with the new
`
`
`
`
`
`
`
`
`
`
`one in a sequence identical to that of altering the Low-Level
`
`
`
`
`
`
`
`
`
`
`Password with the exception of setting the Drive/Head
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Register to 04h prior to writing the Command Register.
`The setting of a new Master Key Password ordinarily has
`
`
`
`
`
`
`
`
`
`
`no effect on the existing Low-Level Password. However,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`knowledge and unplementatin of the Master Key Password
`
`
`
`
`
`
`
`
`
`allows a user to change a Low-Level Password. This pro-
`
`
`
`
`
`
`
`
`
`vides a means for recovering a drive whereby data protec-
`
`
`
`
`
`
`
`
`
`
`tion has been invoked but the password has been forgotten.
`
`
`
`
`
`
`
`
`
`
`The intention of implementing the Master Key option is for
`
`
`
`
`
`use by restricted personnel only.
`Any incorrect attempt at executing a Data Protection
`
`
`
`
`
`
`
`
`Command Function shall result in the drive being disabled
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`where only a power-on reset shall re-enable the interface.
`
`
`
`
`
`
`
`This prevents the use of a systematic ‘Guess-the-Password-
`
`
`
`
`
`
`
`
`Utility’ being used which sends an incrementing password to
`
`
`
`
`
`
`
`the drive until it gets it correct.
`It will be understood that various modifications may be
`
`
`
`
`
`
`
`
`
`made to the invention hereinbefore described without
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`6
`departing from the scope of the invention. For example, one
`
`
`
`
`
`
`
`
`
`
`or more of the memory chips may be combined with the
`
`
`
`
`
`
`
`
`
`
`
`microprocessor in a single chip instead of separate chips as
`
`
`
`
`
`
`
`
`
`
`disclosed in the embodiment. The system is applicable to all
`
`
`
`
`
`
`
`
`
`
`sizes of portable hard disk drive, not necessarily PCMCIA
`
`
`
`
`
`
`
`
`
`
`
`type interfaces.
`Aprincipal advantage of the invention is that the security
`
`
`
`
`
`
`
`
`
`
`system is actually present in the disk drive itself. This means
`
`
`
`
`
`
`
`
`
`
`
`that both the hardware and software is present so that if the
`
`
`
`
`
`
`
`
`
`
`
`
`disk drive is moved between different machines, the security
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`system will remain in place. A further advantage is that the
`
`
`
`
`
`
`
`
`
`security system is readily implemented on the disk drive
`
`
`
`
`
`
`
`
`
`
`PCB using the existing chip already necessary to control the
`
`
`
`
`
`
`
`
`
`
`operation of the disk drive. In addition, the control software
`
`
`
`
`
`
`
`
`is readily loaded into the disk drive circuit.
`Afurther advantage is that various levels of protection can
`
`
`
`
`
`
`
`
`
`
`be readily set and passwords can be undated to reflect a
`
`
`
`
`
`
`
`
`
`
`
`variety of changing circumstances.
`
`
`
`
`We claim:
`
`
`1. A security system for a portable hard disk drive, the
`
`
`
`
`
`
`
`
`
`
`system comprising:
`
`
`first, non-volatile, memory means (IC5) within the disk
`
`
`
`
`
`
`
`
`drive comprising memory for storing a first password;
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`second memory means (IC7) within the disk drive for
`
`
`
`
`
`
`
`
`transiently storing a second password which may be
`
`
`
`
`
`
`
`
`
`
`
`entered by a user after powering-up of the disk drive in
`a computer; and
`
`
`
`
`
`
`
`
`
`
`comparison means (IC4) coupled to said first memory
`
`
`
`
`
`
`
`
`means and to said second memory means for compar-
`
`
`
`
`
`
`
`
`ing the stored first password with the second password,
`characterized in that:
`
`
`
`
`
`
`
`
`
`
`
`software utility program means is provided externally of
`
`
`
`
`
`
`
`
`
`
`
`the disk drive for running on a computer in which the
`
`
`
`
`
`disk drive is used; and
`
`
`
`
`
`
`
`said first, non-volatile, memory means (IC5) within the
`
`
`
`
`
`
`
`disk drive also includes memory for storing software
`code for:
`
`
`(a) interacting with the software utility program means so
`
`
`
`
`
`
`
`
`
`as to enable the disk drive to be set by a user, in a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`chosen one of at least two disk protection modes from
`
`
`
`
`
`
`
`
`
`
`which the user may choose, in which the set mode of
`
`
`
`
`
`
`
`
`
`
`
`the disk drive is retained after powering off and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`re-powering up such that the drive is usable in the same
`
`
`
`
`
`
`
`
`set mode following re-powering up without having to
`
`
`
`
`
`
`
`
`
`
`
`input a password to the drive, said at least two disk
`
`
`
`
`
`protection modes being selected from:
`a full data protection mode in which a user is prohibited
`
`
`
`
`
`
`
`
`
`
`
`from reading data from, and writing data to, a disk
`
`
`
`
`
`
`
`
`
`
`means of the disk drive,
`
`
`
`
`
`a partial data protection mode in which a user is prohib-
`
`
`
`
`
`
`
`
`
`
`ited from writing data to and is permitted only to read
`
`
`
`
`
`
`
`
`
`
`
`data from the disk means, and
`
`
`
`
`
`
`a no data protection mode in which a user is permitted to
`
`
`
`
`
`
`
`
`
`
`
`read data from, and write data to, the disk means;
`
`
`
`
`
`
`
`
`
`
`provided that one of said at
`least
`two selected disk
`
`
`
`
`
`
`
`
`
`
`protection modes is the partial data protection mode;
`
`
`
`
`
`
`
`
`and
`
`(b) controlling the disk drive when it has been set in the
`
`
`
`
`
`
`
`
`
`
`
`
`partial data protection mode so as to allow it to be used
`
`
`
`
`
`
`
`
`
`
`
`
`for reading only, without said software utility program
`
`
`
`
`
`
`
`
`means and without password entry after powering off
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`and re-powering up, said comparison means (IC4)
`
`
`
`
`
`
`
`
`
`
`
`
`operating, when the disk drive has been set in one of the
`
`
`
`
`
`
`
`
`
`full and partial data protection modes and the user
`
`
`
`
`
`
`
`
`
`
`enters the second password, to: permit a user to obtain
`
`
`
`10
`
`15
`
`20
`
`25
`
`30
`
`
`
`35
`
`
`
`40
`
`
`
`45
`
`
`
`50
`
`
`
`55
`
`
`
`60
`
`
`
`65
`
`
`
`Page 8 of 10
`
`Page 8 of 10
`
`

`
`
`6,012,145
`
`
`8
`5. Asystem or a circuit board according to claim 4, which
`
`
`
`
`
`
`
`
`
`
`
`includes an EEPROM, which EEPROM requires a voltage
`
`
`
`
`
`
`
`
`to both write data to and erase data from the EEPROM,
`
`
`
`
`
`
`
`
`
`
`
`which voltage is in the range from 4.5 to 5.5 volts so that
`
`
`
`
`
`
`
`
`
`
`
`
`
`data can be erased from the EEPROM by a microcontroller.
`
`
`
`
`
`
`
`
`
`
`6. A system or a circuit board according to claim 1 or 2,
`
`
`
`
`
`
`
`
`
`
`
`
`
`wherein the second memory means is random access
`
`
`
`
`
`
`
`
`
`
`memory
`7. A system or a circuit board according to claim 1 or 2,
`
`
`
`
`
`
`
`
`
`
`
`
`
`wherein the comparison means is a microprocessor arranged
`
`
`
`
`
`
`
`to fetch a code corresponding to said first password from the
`
`
`
`
`
`
`
`
`
`
`
`first memory means and to fetch a code corresponding to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`second password from the second memory means and to
`
`
`
`
`
`
`
`
`
`
`store these codes in first and second registers prior to
`
`
`
`
`carrying out said comparison.
`8. A system or a circuit board according to claim 1 or 2
`
`
`
`
`
`
`
`
`
`
`
`
`which includes means for disabling the portable disk drive
`
`
`
`
`
`
`
`
`in the event that the second password does not match the first
`
`
`
`
`
`
`
`
`
`
`
`password so that a power-on reset is required before a new
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`password can be entered by the user.
`9. A system or a circuit board according to claim 1 or 2,
`
`
`
`
`
`
`
`
`
`
`
`
`
`wherein the first memory means comprises two solid state
`
`
`
`
`
`
`
`
`
`memory devices, one device being arranged to store said
`
`
`
`
`
`
`
`
`
`first password and the other device being arranged to store
`
`
`
`
`
`
`
`
`
`
`said software code.
`
`
`
`10. A system, or a circuit board according to claim 1 or 2,
`
`
`
`
`
`
`
`
`
`
`
`
`
`wherein the first memory means is arranged to store a
`
`
`
`
`
`
`
`
`
`
`further, master key, password which, if successfully matched
`
`
`
`
`
`
`
`
`by a user-entered password, enables a user to obtain full
`
`
`
`
`
`
`
`
`
`
`access to the disk means, thus over-riding said first pass-
`
`
`
`
`
`
`
`
`
`word.
`
`
`
`
`
`
`11. A system or circuit board according to claim 10,
`
`
`
`
`
`
`
`
`
`wherein said comparison means is arranged to compare said
`
`
`
`
`
`
`
`
`
`second password with each of said stored first password and
`
`
`
`
`
`
`
`
`
`
`further, master key, password and to permit the user to obtain
`
`
`
`
`
`
`
`
`
`
`
`full access to the disk means if the second password matches
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`either one of the stored passwords.
`12. Amethod of controlling access to a portable hard disk
`
`
`
`
`
`
`
`
`
`
`drive

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket