throbber
111111
`
`1111111111111111111111111111111111111111111111111111111111111
`US006968459Bl
`
`(12) United States Patent
`Morgan et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 6,968,459 Bl
`Nov. 22, 2005
`
`(54) COMPUTING ENVIRONMENT HAVING
`SECURE STORAGE DEVICE
`
`(75)
`
`Inventors: Jeffrey A. Morgan, Afton, MN (US);
`C. Thomas Jennings, Woodbury, MN
`(US); Larold L. Olson, Lindstrom, MN
`(US); Luiz S. Pires, St. Paul, MN (US);
`Daniel P. Stubbs, Marine on St. Croix,
`MN (US)
`
`(73) Assignee: Imation Corp., Oakdale, MN (US)
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(21) Appl. No.: 09/464,347
`
`(22) Filed:
`
`Dec. 15, 1999
`
`(51)
`
`Int. Cl? ........................ G06F 12/14; G06F 12/16;
`H04L 9/00
`(52) U.S. Cl. ....................... 713/189; 713/164; 713/165
`(58) Field of Search ................................. 713/164, 165
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5,412,718 A
`5,475,839 A *
`5,887,131 A *
`6,067,622 A *
`2002/0124176 A1 *
`
`5/1995 Narasimhalu et a!.
`12/1995 Watson et a!. .. ... ... ... ... ... 713/2
`3/1999 Angelo ....................... 713/202
`5!2000 Moore ........................ 713/200
`9/2002 Epstein ....................... 713/186
`
`2 00'1...
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`0 706 174 A1
`* cited by examiner
`
`4/1996
`
`Primary Examiner-Matthew Smithers
`(74) Attorney, Agent, or Firm-Eric D. Levinson
`
`(57)
`
`ABSTRACT
`
`A secure computing environment in which a computer
`automatically operates in a full-access data storage mode
`when it detects the presence of a secure removable storage
`device. In full-access mode all data written to removable
`storage device is encrypted with a cryptographic key and the
`user is given access to sensitive if authorized. Otherwise, the
`computer operates in a restricted-access mode in which the
`user is unable to write to the removable storage device and
`is unable to access sensitive data. The invention detects
`security information on the data storage device and gener(cid:173)
`ates a cryptographic key from the security information. The
`security information can be a function of the unique format
`characteristics of the underlying storage medium, a unique
`identifier retrieved from an electronic circuit embedded
`within the removable storage device or a serial number
`etched on the storage device during manufacturing. In
`addition, drive-specific information and even user-specific
`information can also be used to generate the cryptographic
`key, thereby creating a highly secure computing environ(cid:173)
`ment. When the computer operates in a full-access mode, all
`data written to the storage device is encrypted and the user
`is able access to sensitive data within the organization. When
`security information is not present on the removable storage
`device the computer automatically operates in a restricted(cid:173)
`access mode in which the user does not have access to
`sensitive data and data cannot be written to the removable
`storage device.
`
`50 Claims, 5 Drawing Sheets
`
`-------,
`I
`-
`
`1r
`
`I Read media-specific information from the storage device.
`I,
`1
`
`204
`
`20
`
`I
`Error
`Read drive-specific information from the storage drive. _lf--------1
`1
`1
`
`-
`------1
`
`I
`
`11
`
`Get user-specific security information from the user.
`
`I
`
`208
`
`I
`
`210
`
`Read manufacturing information etched on the storage 11--_E_rr_or_--1
`device during manufacturing.
`I
`1
`212\_
`
`1
`
`I
`
`Generate unique encryption key.
`
`I
`
`214
`
`!.--_ ___jlr--=------,-..,...,.,-----:-~_f216
`'t-lo"'"p=-=e-=ra~te::-:i=-n "'"fu-7.11--=a-=cc::::e-=ss"'" 'II Operate in ''restricted- Ll+-------'
`
`access" mode.
`
`J
`
`mode using the key.
`
`NETAPP ET AL. EXHIBIT 1001
`Page 1 of 12
`
`

`
`1--"
`~
`\0
`(It
`~
`00
`\0 a-..
`-..a-..
`rJ'l
`e
`
`Ul
`
`'"""' 0 ......,
`~ .....
`'JJ. =(cid:173)~
`
`Ul
`
`N c c
`
`~N
`N
`~
`0
`z
`
`~ = ......
`~ ......
`~
`•
`\Jl
`d •
`
`c~~~~::r
`~
`
`---
`
`49-
`
`LOCAL AREA NETWO~K
`
`5I
`I
`
`,~
`
`r-20
`
`
`
`1 3
`
`::.::;;:;~
`I
`
`EJisplay
`
`I
`124
`
`-
`
`40
`'T
`
`42
`
`Lc:::J
`=o
`
`b}--151--@
`'
`!
`
`FIG. 1
`
`!
`
`:
`
`i
`
`i
`
`'"'"' """'''"
`i
`
`-
`
`Port.
`
`-
`
`121
`-,-
`
`1
`R~owbto Moil• Del-
`1
`
`128
`
`I
`
`1
`118
`
`A""~
`
`Video
`
`_IL_-L __ ,
`
`,,
`
`-
`
`!
`:
`L_ ___ j L--t
`I '""""' H•nl
`r
`
`Disk
`
`_L I
`
`120
`
`L _______ ~
`r Software
`
`J
`
`136
`
`Applications
`
`I
`s~ JO.mtroll~
`---~~\_,
`.-
`,,,
`
`t__..---.
`
`-
`
`Processor
`
`112
`
`,
`116
`
`113
`
`ill
`
`I . 135
`
`System
`Operatmg
`
`RAM
`
`r
`I ,m V
`
`-
`
`114
`
`s1os
`
`1
`
`ROM
`
`SYSTEM MEMORY
`
`100\...
`
`NETAPP ET AL. EXHIBIT 1001
`Page 2 of 12
`
`

`
`U.S. Patent
`
`Nov. 22, 2005
`
`Sheet 2 of 5
`
`US 6,968,459 Bl
`
`204
`
`I
`i Read media-specific information from the storage device.
`I
`
`Error
`
`20
`
`I
`
`208
`
`210
`
`Read drive-specific information from the storage drive.
`
`Get user-specific security information from the user.
`
`I Read manufacturing information etched on the storage
`I
`device during manufacturing.
`212 \_
`
`I
`
`Error
`
`Error
`
`Error
`
`I
`
`I
`
`Generate unique encryption key.
`
`i
`
`214
`
`~
`Operate in "full-access"
`mode using the key.
`
`Operate in .. -restricted-
`access" mode.
`
`I
`
`)216
`
`FIG. 2
`
`NETAPP ET AL. EXHIBIT 1001
`Page 3 of 12
`
`

`
`U.S. Patent
`
`Nov. 22, 2005
`
`Sheet 3 of 5
`
`US 6,968,459 Bl
`
`NETAPP ET AL. EXHIBIT 1001
`Page 4 of 12
`
`

`
`U.S. Patent
`
`Nov. 22, 2005
`
`Sheet 4 of 5
`
`US 6,968,459 Bl
`
`NETAPP ET AL. EXHIBIT 1001
`Page 5 of 12
`
`

`
`U.S. Patent
`
`Nov. 22, 2005
`
`Sheet 5 of 5
`
`US 6,968,459 Bl
`
`Key Track Layout
`(Bottom side of Disk)
`
`Track 1732 Last Data Track
`Disk key written to each sector Track 1733-1734
`on the last data track.
`Reassign Sector Tracks
`
`Track 1735
`DMT track
`
`NETAPP ET AL. EXHIBIT 1001
`Page 6 of 12
`
`

`
`US 6,968,459 Bl
`
`1
`COMPUTING ENVIRONMENT HAVING
`SECURE STORAGE DEVICE
`
`2
`may be allowed to write the non-sensitive data to the
`removable storage device in an unencrypted format.
`
`TECHNICAL FIELD
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`This invention relates generally to the field of data storage
`devices, and more particularly to a computer that automati(cid:173)
`cally operates in a full-access data storage mode when the
`computer senses the use of a secure storage device.
`
`BACKGROUND
`
`5
`
`FIG. 1 is a block diagram of a computer that automatically
`operates in a secure data storage mode when a secure storage
`device is detected;
`FIG. 2 is a flow chart illustrating one embodiment of a
`10 method by which a software application executing on the
`computer of FIG. 1 determines whether to configure the
`computer to operate in full-access mode on restricted-access
`mode;
`FIGS. 3A and 3B illustrate one embodiment in which the
`storage device of FIG. 1 is an LS-120 SuperDisk™ diskette
`from Imation Corporation; and
`FIG. 4 illustrates a layout for storing data on a disc-shaped
`magnetic medium within the Imation SuperDisk.
`
`20
`
`DETAILED DESCRIPTION
`
`The following sections describe in detail how the present
`invention addresses the problems outlined above. In the
`following detailed description, references are made to the
`accompanying drawings that illustrate specific embodiments
`in which the invention may be practiced.
`
`System Level Overview
`
`There are many challenges to creating a highly secure
`computing environment including preventing eavesdroppers
`from accessing private communications, preventing vandals 15
`from tampering with information while in transit from
`sender to receiver, authenticating users logging into a net(cid:173)
`work, verifying a network server is indeed the server it
`professes to be and safeguarding confidential documents
`from unauthorized individuals.
`One of the greatest challenges, however, is preventing the
`authorized user from using sensitive data in an unauthorized
`manner. For example, with conventional security measures
`it is very difficult to prevent an authorized user from
`appropriating sensitive data by simply copying the sensitive 25
`data to a removable storage device such as floppy diskette.
`For these reasons, and for other reasons stated below which
`will become apparent to those skilled in the art upon reading
`and understanding the present specification, there is a need
`in the art for an improved mechanism for preventing the 30
`appropriation of sensitive data.
`
`SUMMARY
`
`According to the invention, the above-mentioned prob(cid:173)
`lems are addressed by a secure computing environment in
`which a computer automatically operates in a secure "full(cid:173)
`access" data storage mode when the computer detects the
`presence of a secure removable storage device. If the com(cid:173)
`puter senses a non-secure removable storage device then the
`computer automatically operates in a "restricted-access"
`mode.
`In the secure full-access mode, storage management soft(cid:173)
`ware uses a cryptographic key to encrypt and decrypt the
`data stream between the computer and the removable stor(cid:173)
`age device. Depending upon the selected security level, the
`cryptographic key is generated by a combination of the
`following: (1) device-specific information derived of the
`removable storage device, (2) manufacturing information 50
`that has been etched onto the storage device, (3) drive(cid:173)
`specific information, such as drive calibration parameters,
`retrieved from the storage drive, and ( 4) user-specific infor(cid:173)
`mation such as a password or biometric information such as
`input received from a fingerprint scan or retina scan.
`In addition, the present invention facilitates the use of a
`secure storage device as a secure "access card" by which the
`user gains access to sensitive data of the organization. More
`specifically, the user is permitted to access sensitive data
`stored on other local storage devices, or on remote comput- 60
`ers within the organization, only when the computer is
`operating in full-access data storage mode.
`In the restricted-access mode, however, the computer
`operates the storage drive as a read-only drive such that the
`user can read data from the removable storage device but
`cannot write data to the drive. Alternatively, the user can
`access only non-sensitive data within the organization and
`
`FIG. 1 illustrates a block diagram of a computer 100 that
`automatically operates in a secure data storage mode when
`the computer 100 senses that storage device 151 is a secure
`storage device. As shown in FIG. 1, the computer 100
`includes a processor 112 that in one embodiment belongs to
`35 the PENTIUM® family of microprocessors manufactured
`by the Intel Corporation of Santa Clara, Calif. However, it
`should be understood that the invention can be implemented
`on computers based upon other microprocessors, such as the
`MIPS® family of microprocessors from the Silicon Graph-
`40 ics Corporation, the POWERPC® family of microproces(cid:173)
`sors from both the Motorola Corporation and the IBM
`Corporation, the PRECISION ARCHITECTURE® family
`of microprocessors from the Hewlett-Packard Company, the
`SPARC® family of microprocessors from the Sun Micro-
`45 systems Corporation, or the ALPHA® family of micropro(cid:173)
`cessors from the Compaq Computer Corporation. Computer
`100 represents any server, personal computer, laptop or even
`a battery-powered, pocket-sized, mobile computer known as
`a hand-held PC.
`Computer 100 includes system memory 113 (including
`read only memory (ROM) 114 and random access memory
`(RAM) 115), which is connected to the processor 112 by a
`system data/address bus 116. ROM 114 represents any
`device that is primarily read-only including electrically
`55 erasable programmable read-only memory (EEPROM),
`flash memory, etc. RAM 115 represents any random access
`memory such as Synchronous Dynamic Random Access
`Memory.
`Within the computer 100, input/output bus 118 is con(cid:173)
`nected to the data/address bus 116 via bus controller 119. In
`one embodiment, input/output bus 118 is implemented as a
`standard Peripheral Component Interconnect (PCI) bus. The
`bus controller 119 examines all signals from the processor
`112 to route the signals to the appropriate bus. Signals
`65 between the processor 112 and the system memory 113 are
`merely passed through the bus controller 119. However,
`signals from the processor 112 intended for devices other
`
`NETAPP ET AL. EXHIBIT 1001
`Page 7 of 12
`
`

`
`US 6,968,459 Bl
`
`4
`able storage device, (2) manufacturing information that has
`been etched onto the storage device, (3) drive-specific
`information, such as drive calibration parameters, retrieved
`from the storage drive, and ( 4) user-specific information
`such as a password or biometric information.
`In order to automatically detect whether a storage device
`151 is a secure device, computer 100 determines whether
`device-specific security information was written to storage
`device 151. In one embodiment, the device-specific security
`10 information is a function of the low-level format information
`and, therefore, uniquely identifies the underlying media of
`storage device 151. For example, in one embodiment the
`information is a hash of the
`device-specific security
`addresses of the bad sectors for storage device 151. Because
`it is a function of the physical characteristics of the actual
`storage medium within storage device 151, the format
`information is inherently unique to each storage device 151.
`In other words, the addresses of the bad sectors change from
`device to device.
`The device-specific security information can be combined
`with other security information in order to increase the level
`of security of computer 100. For example, in another
`embodiment, the device specific security information can be
`combined with information that was etched into the storage
`device 151 via a laser during manufacturing. In yet another
`embodiment, drive-specific information, such as internal
`calibration parameters, for one or more of the removable
`media drives 121 can be used to generate the key. As
`described below, computer 100 automatically operates in a
`full-access data storage mode upon detecting the device(cid:173)
`specific security information on storage device 151. If the
`device-specific security information is not detected, then
`computer 100 operates in a restricted access data storage
`mode.
`
`Methods of an Exemplary Embodiment of the
`Invention
`
`3
`than system memory 113 are routed onto the input/output
`bus 118. Video display 124 or other kind of display is
`connected to the input/output bus 118 via a video adapter
`125.
`Various storage drives are connected to the input/output s
`bus 118 including hard disk drive 120 and one or more
`removable media drives 121 that are used to access one or
`more removable storage devices 151. Each storage device
`151 represents a removable device having a storage medium
`for holding digital information such as a floppy diskette, a
`magneto-optical storage device, an optical disk, a SuperD(cid:173)
`isk™ diskette, a Zip™ disk, a Jazz™ disk, a tape cartridge,
`etc. Each removable media drive 121 represents a device
`suitable for servicing access requests for storage device 151
`such as a floppy drive, a magneto-optical drive, a CD-ROM 15
`drive, a SuperDisk™ drive, a removable-cartridge drive
`such as a Zip™ drive, or even a tape drive.
`A user enters commands and information into the com(cid:173)
`puter 100 by using a keyboard 40 and/or pointing device,
`such as a mouse 42, which are connected to bus 118 via 20
`input/output ports 128. Other types of pointing devices (not
`shown in FIG. 1) include track pads, track balls, joy sticks,
`data gloves, head trackers, and other devices suitable for
`positioning a cursor on the video display 124.
`Software applications 136 and data are typically stored 25
`via one of the storage devices, which may include the hard
`disk 120 or storage devices 151, and are copied to RAM 115
`for execution. In one embodiment, however, software appli(cid:173)
`cations 136 are stored in ROM 114 and are copied to RAM
`115 for execution or are executed directly from ROM 114. 30
`In general, the operating system 135 executes software
`applications 136 and carries out instructions issued by the
`user. For example, when the user wants to load a software
`application 136, the operating system 135 interprets the
`instruction and causes the processor 112 to load software 35
`application 136 into RAM 115 from either the hard disk 120
`or a storage device 151. Once software application 136 is
`loaded into the RAM 115, it can be used by the processor
`112. In case of large software applications 136, processor
`112 loads various portions of program modules into RAM
`115 as needed.
`The Basic Input/Output System (BIOS) 117 for the com(cid:173)
`puter 100 is stored in ROM 114 and is loaded into RAM 115
`upon booting. Those skilled in the art will recognize that the
`BIOS 117 is a set of basic executable routines that have 45
`conventionally helped to transfer information between the
`computing resources within the computer 100. Operating
`system 135 or other software applications 136 use these
`low-level service routines.
`In one embodiment, computer 100 includes a registry (not
`shown) which is a system database that holds configuration
`information for computer 100. For example, Windows® 95
`and Windows® NT by Microsoft maintain the registry in
`two hidden files, called USER.DAT and SYSTEM.DAT,
`located on a permanent storage device such as an internal
`disk.
`According to the invention, computer 100 automatically
`operates in a full-access data storage mode only when the
`computer 100 detects a secure removable storage device 151
`present within any one of the removable media drives 121.
`In the secure full-access mode, storage management soft(cid:173)
`ware uses a cryptographic key to encrypt and decrypt the
`data stream between the computer and the removable stor(cid:173)
`age device. Depending upon the selected security level, the
`cryptographic key is generated by combining one or more of 65
`the following: (1) device-specific security information
`derived from the unique format information of the remov-
`
`In the previous section, a system level overview of
`40 various embodiments of the invention was described. In this
`section, the particular methods performed by the exemplary
`embodiments are described by reference to a flowchart. The
`methods to be performed by the embodiments constitute
`computer programs made up of computer-executable
`instructions.
`FIG. 2 is a flow chart illustrating method 200 illustrating
`in more detail how computer 100 detects the device-specific
`security information on storage device 151 and automati(cid:173)
`cally operates in a full-access data storage mode. Method
`so 200 is described in reference to one or more software
`applications 136 executing on computer 100, referred to
`hereafter as the storage manager. The storage manager may
`comprise one or more software applications, device drivers,
`dynamically-linked library (DLL) or any suitable combina-
`ss tion thereof that manages the data storage devices of com(cid:173)
`puter 100, including removable media drive 121 and internal
`hard disk 120. In one embodiment, the storage manager
`performs method 200 anytime a status change is detected for
`storage device 151, such as when storage device 151 is
`60 inserted into removable media drive 121. In another embodi-
`ment, the storage manager performs method 200 at the
`request of a user.
`Method 200 is described in reference to a high secure
`environment in which a cryptographic key is generated by
`combining all of the following: (1) device-specific informa(cid:173)
`tion of the removable storage device, (2) manufacturing
`information that has been etched onto the storage device, (3)
`
`NETAPP ET AL. EXHIBIT 1001
`Page 8 of 12
`
`

`
`US 6,968,459 Bl
`
`5
`drive-specific information, such as drive calibration param(cid:173)
`eters, retrieved from the storage drive, and ( 4) user-specific
`information such as a password or biometric information. In
`other embodiments, however, various levels of security can
`be achieved by generating the key from a subset of the above
`inputs.
`In block 204, the storage manager detects whether storage
`device 151 is a "secure" removable device by attempting to
`read any device-specific security information from storage
`device 151. In one embodiment, the device-specific security
`information is a function of the low-level format information
`and, therefore, uniquely identifies the underlying media of
`storage device 151. The storage manager proceeds to block
`206 when it successfully detects and reads device-specific
`security information. If the device-specific security infor(cid:173)
`mation is not successfully read, then the storage manager
`proceeds to block 216 and operates computer 100 in a
`restricted-access data storage mode as described in detail
`below.
`In block 206, the storage manager retrieves drive-specific
`security information that is specific to removable media
`drive 121 such as a serial number or calibration parameters,
`from a non-volatile memory within removable media drive
`121. Typical calibration parameters that are suitable for
`generating the cryptographic key includes configuration
`parameters for read and write circuitry internal to removable
`media drive 121, tracking parameters, read channel boost,
`frequency cutoff values, read threshold values, alignment
`values, optical alignment correction parameters and analog
`to digital conversion calibrations. Because these calibration 30
`parameters are unique to each drive, they are well suited for
`generating a cryptographic key that is drive-specific. In one
`embodiment, the drive-specific information is a hash of the
`above parameters and is stored in non-volatile memory
`within removable media drive 121. If the storage manager is
`unable to retrieve the drive-specific information, the storage
`manager proceeds to block 216 and operates computer 100
`in a restricted-access data storage mode.
`In block 208, the storage manager retrieves user-specific
`security information from
`the computer user by, for 40
`example, prompting the user for a password, or performing
`a retina or fingerprint scan. If for some reason the storage
`manager is unable to retrieve the user-specific information
`from the current user, then the storage manager proceeds to
`block 216 and operates computer 100 in a restricted-access 45
`data storage mode.
`In block 210, the storage manager retrieves manufactur(cid:173)
`ing information that was physically etched on storage device
`151 during the manufacturing process. For example, in one
`embodiment a laser etches a unique serial number, run 50
`number or a date stamp on the storage device during
`manufacturing. In another embodiment, however, storage
`device 151 contains a computer chip for electronically
`storing a unique identifier. If the storage manager is unable
`to read the manufacturing -specific security information, then 55
`the storage manager proceeds to block 216 and operates
`computer 100 in a restricted-access data storage mode.
`In block 212, the storage manager generates a crypto(cid:173)
`graphic key by combining the information, or a portion
`thereof, that was retrieved in blocks 206 through 210. For 60
`example, by using the device-specific information retrieved
`in block 206 and the manufacturing information retrieved in
`block 210, a highly-secure device-specific cryptographic
`key can be generated such that the data stored on storage
`device 151 is unreadable if copied to other removable media. 65
`Similarly, by incorporating the drive-specific information
`and the user-specific information in the generation of the
`
`6
`key, a highly secure computing system is achieved in which
`data can only be stored on the original storage device from
`the original storage drive by the authorized user.
`In one embodiment, in order to generate the cryptographic
`5 key, the storage manager combines, such as by concatenat(cid:173)
`ing, all or various portions of the information that was
`retrieved in blocks 206 through 210 and submits the result
`to a conventional cryptographic hashing algorithm. For
`example, the drive-specific information, the manufacturing
`10 information, the user information and the storage device(cid:173)
`specific information can be combined and used as input to
`the cryptographic algorithm. All data written to or read from
`storage device 151 is encrypted and decrypted, respectively,
`via the cryptographic key, thereby providing a very high
`15 level of security. Thus, in order to access the data on storage
`device 151, storage device 151 must be an original, secure
`storage device and must be inserted by the original user into
`storage device 151 that was originally used to write the data.
`If portions of all of these inputs are used, then the data on
`20 storage device 151, therefore, cannot be accessed via any
`other drive, either on computer 100 or any other computer
`or via any other user.
`Method 200 has been described including blocks 204
`through 216. In one embodiment, the storage manager
`25 repeats blocks 204 through 216 when a status change is
`detected for storage device 151, such as when storage device
`151 is removed from removable media drive 121 and a new
`storage device 151 is inserted. As described above, upon the
`completion of method 200, computer 100 operates in a
`full-access mode or a restricted-access mode as determined
`by whether the storage manager can successfully retrieve
`security information from storage device 151, removable
`media drive 121, and the user. The following sections
`describe the full-access and restricted-access operating
`35 modes.
`
`Full-Access and Limited-Access Data Storage
`Modes of Operation
`
`When computer 100 is operating in a full-access mode, all
`data read from storage device 151 is decrypted according to
`the key generated by the above process. Similarly, all data
`written to storage device 151 is encrypted using the key. This
`ensures that any data written to a removable storage device
`151 is safely encrypted and cannot be duplicated.
`In addition, in full-access mode, computer 100 allows the
`user to access local area network 51 and remote computer
`49. In this manner, the present invention allows storage
`device 151 to be used as an "access card" by which the user
`gains access to sensitive data of the organization. In addi(cid:173)
`tion, data stored on other storage devices, such as internal
`hard disk 120, tape cartridges, read/write optical discs, etc.,
`may actually be encrypted using the unique key generated
`from the unique format information of key disk 151. In this
`fashion, a user must have a secure storage device 151 in
`order to access the data stored on these devices. In this
`manner, an organization can require that all authorized users
`have a secure storage device 151 in order to access data
`stored within the organization and to store data on any
`removable media. This data, if copied to another removable
`media, would be unreadable according to the present inven(cid:173)
`tion.
`For ultra-secure environments, a cryptographic key can be
`generated from a combination of the unique format infor(cid:173)
`mation of a plurality of storage media. For example, in one
`embodiment, data stored on storage device 151 and hard
`disk 120 may be encrypted using a key derived from the
`
`NETAPP ET AL. EXHIBIT 1001
`Page 9 of 12
`
`

`
`US 6,968,459 Bl
`
`7
`unique format information of storage device 151 and from
`the unique format information of hard disk 120. A crypto(cid:173)
`graphic key is generated by applying one or more crypto(cid:173)
`graphic algorithms to the combination. Because the key is
`generated from unique information from both storage device
`151 and hard disk 120, the user must have storage device
`151 in order to access any data stored on hard disk 120.
`In restricted-access mode, the storage manager configures
`removable-media drive 121 as a read-only drive such that
`the user can read data from the removable storage device but
`cannot write data to the drive. In addition, the user is
`prevented from accessing non-sensitive data within the
`organization. For high-security environments, the storage
`manager prevents both read and write access to storage
`device 151 when computer 100 is operating in restricted- 15
`access mode.
`In one embodiment, computer 100 is configured to oper-
`ate in restricted-access mode upon power-up until remov(cid:173)
`able storage device 151 is verified as secure. Here, remov(cid:173)
`able media drives 121 default to read-only operation until 20
`otherwise configured via the storage manager. As such, the
`present invention provides a secure computing environment
`even when the user tries to boot directly from one of the
`removable storage devices 151. During boot process, the
`storage manager attempts to verify that at least one of the 25
`storage devices 151 contain device-specific security infor(cid:173)
`mation as described above. The storage manager operates
`computer 100 in restricted-access mode by default until the
`storage manager has successfully initialized and verified
`storage devices 151. Upon verification, the storage manager 30
`configures computer 100 to operate in a full-access data
`storage mode and instructs removable media drives 121 to
`allow write access to storage devices 151. On reset, power(cid:173)
`up, or even upon removal of one of the storage devices 151,
`removable media drives 121 automatically return to the 35
`restricted-access mode. In addition, the storage manager can
`detect when the user seeks to install a new removable media
`drive to the system and may inhibit the drive from being
`accessed.
`
`An Exemplary Secure Storage Device
`
`8
`illustrated in FIG. 4, SuperDisk 300 includes a disc-shaped
`storage medium 400 that has 1736 data tracks per side for a
`total of 34 72 tracks; track 0 starts at an outside diameter 402
`while track 1735 conforms to an inside diameter 404. Tracks
`5 0 through 1731 are typically used for holding user data. As
`explained in more detail below, track 1732 may be used to
`hold security information unique to SuperDisk 300 in accor(cid:173)
`dance with the present invention. Tracks 1733-1734 are
`reserved for reassigned sectors. In other words, any sectors
`10 that are determined to be unreadable subsequent to the
`manufacturing are reassigned to locations within tracks 1733
`and 1734. Track 1735 is designated as a disk maintenance
`track (DMT). In addition, each side of Super Disk 300 has six
`overseek tracks at the outside diameter 402.
`During manufacturing, SuperDisk 300 undergoes a two(cid:173)
`step formatting process: low-level formatting and high-level
`formatting. In low-level formatting, format information is
`recorded on SuperDisk 300 and allows removable media
`drive 121 to locate data stored on SuperDisk 300. This
`format information includes a basic structure of the recorded
`data sectors including an identification field that provides
`each sector with a unique address and timing signals that
`allow removable media drive 121 to access the correspond(cid:173)
`ing data sector. In addition, low-level formatting tests the
`integrity of each data sector such that the format information
`maps out bad or marginal sectors so they cannot subse-
`quently be used by computer 100 for storing data.
`SuperDisk 300 uses a slip-sector format that maps data
`into good data sectors. In the slip-sector format, each data
`sector is assigned a logical block address (LEA). The LEA
`identifies a readable sector of data and its logical position
`within SuperDisk 300. Furthermore, the slip-sector format
`defines 110 zones numbered from 0 to 109. Each zone has
`32 tracks, except zones 108 and 109 that have 8 tracks per
`zone. The zones begin at outside diameter 402 of FIG. 3 and
`proceed to inside diameter 404. Each zone has an LEA that
`represents the starting address of the corresponding zone.
`As bad sectors are encountered during low-level format(cid:173)
`ting, the sector is marked as bad and the LEA's for subse-
`40 quent zones slip. Hard disk 120, however, maintains a list of
`bad sectors, referred to as a primary defect list.
`is
`In high-level formatting, additional
`information
`recorded on Super Disk 300 such as the operating system that
`the disk is intended to be used on. This information allows
`a specific computer and operating system to use SuperDisk
`300 as a data storage medium. Any subsequent formatting by
`the user is typically only a high-level formatting process that
`simply rewrites a file allocation table (FAT) and directory
`structure of the disk.
`From the exemplary embodiment described in FIGS. 3A,
`3B and 4,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket