Invention Grant
US07757100B2 Protected volume on a data storage device with dual operating systems and configurable access and encryption controls
有权
具有双操作系统和可配置访问和加密控制的数据存储设备上的受保护卷
- Patent Title: Protected volume on a data storage device with dual operating systems and configurable access and encryption controls
- Patent Title (中): 具有双操作系统和可配置访问和加密控制的数据存储设备上的受保护卷
-
Application No.: US12126759Application Date: 2008-05-23
-
Publication No.: US07757100B2Publication Date: 2010-07-13
- Inventor: Gregg D. Weissman , Hon Tran , Gregory W. Dalcher , Jay H. Hoffmeier , James E. Zmuda , Mark J. Sutherland , Michael T. Guttman
- Applicant: Gregg D. Weissman , Hon Tran , Gregory W. Dalcher , Jay H. Hoffmeier , James E. Zmuda , Mark J. Sutherland , Michael T. Guttman
- Applicant Address: US CA San Jose
- Assignee: Spyrus, Inc.
- Current Assignee: Spyrus, Inc.
- Current Assignee Address: US CA San Jose
- Agency: Sheldon Mak Rose & Anderson
- Agent Norman R. Van Treeck
- Main IPC: G06F11/30
- IPC: G06F11/30 ; G06F12/14 ; G06F9/00 ; G06F15/177 ; H04L9/32 ; H04L9/00 ; G06F12/00 ; G06F13/00 ; G06F13/28 ; G06F15/167

Abstract:
A method provides a protected region of a data storage device associated with a computational device, where data in the protected region is primarily protected by preventing access without proper access authorization. The method comprises the steps of providing, in an unprotected region of the data storage device, a first operating system and associated operating system data; monitoring operating system data accessed by the computational device until a predetermined functionality becomes available; storing, in the protected region, the monitored operating system data; providing, in the protected region, a second operating system; transferring control of the computational device from the first operating system to the second operating system; storing data in the protected region; and preventing access to the stored data in the protected region without access authorization. In a further embodiment of the method, the second operating system optionally provides a second level of security by preventing decryption of data stored in the protected region without decryption authorization.
Public/Granted literature
Information query