This application is based upon and claims the benefit of priority from Japanese Patent Application No. 2008-294008, filed Nov. 18, 2008, the entire contents of which are incorporated herein by reference.
1. Field
One embodiment of the invention relates to access authentication for a storage device.
2. Description of the Related Art
When a password is set to a storage device having a password for controlling access, if unlocked with the password, the storage device maintains the unlocked state until the power is turned off and is locked with the password when the power is turned off. If the password is set to the storage device, in a conventional system environment including such a storage device and a host, password authentication is performed when the system is started. The system region is read out after the storage device is unlocked with the password.
For example, in a hard disk, two passwords, i.e., a master password and a user password, can be set according to the standard of the advanced technology attachment (ATA). The access to the hard disk can be restricted by setting the two passwords by a user or a system.
A computer system including the storage device as described above will be described with reference to
In such a computer system, a user inputs a password to the host PC 1 through the user interface 13 when the system is started to release restriction to access to the storage module 23 so that the host PC 1 can read starting data. If the host PC 1 enters suspend mode, for example, and the power is interrupted, the information storage device 2 automatically transits to the locked state with the password (password lock state). That is, in such a case, the information storage device 2 is in the same state as the normal power-off due to the interruption of the power supply. In the suspend mode, however, the power of the host PC 1 is not completely shut down. Consequently, to resume from the suspend mode, the host PC 1 accesses the information storage device 2 in the same manner as before the transition to the suspend mode without requiring password input by the user, unlike when the power is turned on or resuming from a hibernation state. At this time, the host PC 1 needs the password to readout information necessary for resuming because the information storage device 2 has returned to the password lock state. Accordingly, the host PC 1 uses the password input by the user and stored in a management region of the system in the storage module 23 or a memory 15 that are accessible even in the password lock state to unlock the information storage device 2 again when the system is recovered.
As such a conventional technology, a hibernation recovery method is known. In this method, restoration information necessary to restore the state is stored in a removable external storage device at the hibernation processing, hibernation passwords including the time, checksum, etc. of the restoration information are stored in a battery backup memory and the external storage device, respectively, and the hibernation passwords are compared at the time of recovery. Only when the hibernation passwords match, wakeup is performed according to the restoration information stored in the external storage device (see, for example, Japanese Patent Application Publication (KOKAI) No. 10-149236).
If, as described above, a password input by the user is retained to unlock an information storage device with the password when a host PC resumes from suspend mode and used at a timing that the user does not intend, security concerns arise.
A general architecture that implements the various features of the invention will now be described with reference to the drawings. The drawings and the associated descriptions are provided to illustrate embodiments of the invention and not to limit the scope of the invention.
Various embodiments according to the invention will be described hereinafter with reference to the accompanying drawings. In general, according to one embodiment of the invention, a storage device comprises a storing module, a determining module, and a releasing module. The storing module is configured to store generated authentication information generated by a host connected to the storage device and set as authentication information for releasing access restriction to a storage module in the storage module. The determining module is configured to determine, when the storage device is turned on upon the host resuming from suspend mode and receives generated authentication information from the host in a state where access to the storage module is restricted, whether the generated authentication information matches the generated authentication information stored by the storing module in the storage module. The releasing module is configured to release, when the determining module determines that the generated authentication information received from the host matches the generated authentication information stored by the storing module in the storage module, access restriction to the storage module.
According to another embodiment of the invention, an information processor comprises a generating module, a setting module, and a transferring module. The generating module is configured to generate predetermined authentication information as generated authentication information. The setting module is configured to set the generated authentication information generated by the generating module to a storage device connected to the information processor as authentication information for releasing access restriction to a storage module of the storage device. The transferring module is configured to transfer, when the storage device is turned on upon the information processor resuming from suspend mode and access to the storage module is restricted, the generated authentication information generated by the generating module to the storage device.
According to still another embodiment of the invention, an information processing system comprises an information processor and a storage device configured to be connected to the information processor. The information processor comprises a generating module, a setting module, and a transferring module. The generating module is configured to generate predetermined authentication information as generated authentication information. The setting module is configured to set the generated authentication information generated by the generating module to the storage device as authentication information for releasing access restriction to a storage module of the storage device. The transferring module is configured to transfer, when the storage device is turned on upon the information processor resuming from suspend mode and access to the storage module is restricted, the generated authentication information generated by the generating module to the storage device. The storage device comprises a storing module, a determining module, and a releasing module. The storing module is configured to store the generated authentication information set by the setting module in the storage module. The determining module is configured to determine, upon receipt of the generated authentication information from the transferring module of the information processor, whether the generated authentication information matches the generated authentication information stored by the storing module in the storage module. The releasing module is configured to release the access restriction to the storage module when the determining module determines that the generated authentication information received from the transferring module of the information processor matches the generated authentication information stored by the storing module in the storage module.
The information storage device 2 comprises the MPU 21, the read/write controller 22, the storage module 23, the host interface 25, the RAM 26, and the controller 24 controlling these modules. The read/write controller 22 writes and reads data to and from the storage module 23. The host interface 25 mediates input and output of information with the host PC 1.
A functional configuration of the host PC 1 and the information storage device 2 will be described.
As illustrated in
As illustrated in
The operation of the computer system according to the embodiment will be described.
When the host PC 1 is turned on and the system starts, the transferring module 19 of the host PC 1 determines whether the information storage device 2 is locked with the password (in access restricted state) (S101).
If the information storage device 2 is locked with the password (YES at S101), the transferring module 19 determines whether the password has been input to the host PC 1 (S102).
If the password has been input to the host PC 1 (YES at S102), the transferring module 19 transfers the input password, i.e., user password (input authentication information), to the information storage device 2 (S103).
The determining module 27 of the information storage device 2 determines whether the transferred user password is correct, i.e., whether the transferred user password matches the preset password (S104).
If the password is correct (YES at S104), the determining module 27 unlocks the information storage device 2 with the password (S105).
Once the information storage device 2 is unlocked with the password, the generating module 17 of the host PC 1 generates a password for resuming from suspend (generated authentication information) based on random numbers (S106), and the setting module 18 sets the generated password for resuming from suspend to the information storage device 2 (S107). At this time, the setting module 18 stores the password for resuming from suspend set to the information storage device 2 in the memory 15.
Subsequently, the storing module 28 of the information storage device 2 stores the password for resuming from suspend set by the setting module 18 in the storage module 23 as authentication information (S108). The storage module 23 is an accessible management region even if the information storage device 2 is in the password lock state.
When the password for resuming from suspend is stored in the storage module 23, the host PC 1 starts the system (S109).
If the password is not correct (NO at S104), the determining module 27 returns an error notification to the host PC 1 (S110).
If the password has not been input to the host PC 1 (NO at S102), the transferring module 19 determines again whether the password has been input to the host PC 1 (S102).
If the information storage device 2 is not locked with the password (NO at S101), the process ends.
A password authentication process for resuming from suspend will be described.
When the host PC 1 starts resuming from suspend (S201), the transferring module 19 determines whether the information storage device 2 is locked with a password (S202).
When the information storage device 2 is turned on again resulting from that the host PC 1 has resumed from suspend (S203), the determining module 27 loads the password for resuming from suspend stored as the authentication information from the storage module 23 into the RAM 26 (S204). At this time, the determining module 27 deletes the password for resuming from suspend that is stored in the storage module 23. Accordingly, when the information storage device 2 is turned off again, the password for resuming from suspend is invalid.
If the information storage device 2 is locked with the password (YES at S202), the transferring module 19 reads the password for resuming from suspend stored in the memory 15 or the management region of the storage module 23 at the time of setting to transfer the password to the information storage device 2 (S205).
Upon receipt of the password for resuming from suspend from the host PC 1, the determining module 27 of the information storage device 2 determines whether the password for resuming from suspend as the authentication information matches the transferred password for resuming from suspend, i.e., whether the transferred password for resuming from suspend is correct (S206).
If the password for resuming from suspend is correct (YES at S206), the determining module 27 unlocks the information storage device 2 with the password for resuming from suspend (S207). At this time, the determining module 27 deletes the password for resuming from suspend loaded into the RAM 26. By using the password for resuming from suspend as a one-time password, the security of the information storage device 2 can be enhanced. Even if the information storage device 2 is not unlocked with the password, when the information storage device 2 is shut down, the password for resuming from suspend is deleted because the information in the RAM 26 is volatile.
When the information storage device 2 is unlocked with the password, the generating module 17 of the host PC 1 deletes the password for resuming from suspend on the memory 15 and generates a password different from the transferred password for resuming from suspend based on random numbers (S208). Subsequently, the setting module 18 sets the generated password for resuming from suspend to the information storage device 2 (S209).
When the new password for resuming from suspend is set by the setting module 18, the storing module 28 of the information storage device 2 stores the new password for resuming from suspend in the storage module 23 as authentication information (S210), and the host PC 1 starts the system (S211).
If the password for resuming from suspend is not correct (NO at S206), the determining module 27 returns an error notification to the host PC 1 (S212).
If the information storage device 2 is not locked with the password (NO at S202), the host PC 1 starts the system (S211).
As described above, according to an embodiment of the invention, a password different from a user password set by the user is generated for every authentication. Consequently, when the information storage device 2 is unlocked resulting from that the host PC 1 has resumed from suspend, it is not necessary to store the user password in a place that is readily read by a third party (the memory 15 or the management region of the storage module 23). The user password is not stored in a place with security concerns, such as the memory 15 or the management region, which prevents the user password from being stolen, and thus, prevents data leakage.
More over, if the information storage device 2 is unlocked with the generated password, the host PC 1 and the information storage device 2 delete the password used for unlocking. This further enhances the security.
Furthermore, if the power of the information storage device 2 is interrupted due to a cause other than the transition of the host PC 1 to suspend mode, the power of the host PC 1 is also interrupted at this time. Accordingly, the PC 1 is not required to resume from the suspend mode, and therefore, the password being volatile is deleted.
Still further, the security at the time of resuming from a suspend mode can be enhanced.
The various modules of the systems described herein can be implemented as software applications, hardware and/or software modules, or components on one or more computers, such as servers. While the various modules are illustrated separately, they may share some or all of the same underlying logic or code.
While certain embodiments of the inventions have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of the inventions. Indeed, the novel methods and systems described herein may be embodied in a variety of other forms; furthermore, various omissions, substitutions and changes in the form of the methods and systems described herein may be made without departing from the spirit of the inventions. The accompanying claims and their equivalents are intended to cover such forms or modifications as would fall within the scope and spirit of the inventions.
Number | Date | Country | Kind |
---|---|---|---|
2008-294008 | Nov 2008 | JP | national |