Claims
- 1. A method of protecting a peripheral device such as a computer disc drive designated to a host against hot-plug attacks, the method comprising the steps of:
(a) maintaining time synchronization between the host and the peripheral device; (b) utilizing the time synchronization to generate common data in the host and the peripheral device; and (c) generating a validation code in the host based on a seed including the common data.
- 2. A method according to claim 1 including placing the validation code in a register associated with the host and transferring the validation code to the peripheral device with a read/write command.
- 3. A method according to claim 2 wherein the register includes a Features register.
- 4. A method according to claim 1 wherein the validation code includes a random number.
- 5. A method according to claim 4 wherein the random number may be generated by means of a formula in the form
- 6. A method according to claim 1 wherein the time synchronization is maintained by setting respective timers in the host and the peripheral device to an initial value To.
- 7. A method according to claim 2 wherein the common data is transferred to the peripheral device in a manner which does not substantially affect read/write operations in the device.
- 8. A method according to claim 1 including generating a validation code in the peripheral device based on the common data and comparing the validation code generated in the peripheral device with the validation code generated in the host.
- 9. A method according to claim 8 wherein the peripheral device responds normally to commands from the host during the comparison.
- 10. A method according to claim 8 including generating a revised validation code when the comparison does not result in a match of the validation codes and comparing the revised validation code with the validation code generated in the host.
- 11. A method according to claim 8 including switching the peripheral device to a locked mode in which the peripheral device fails to respond to further commands from the host, when the comparison does not result in a match of the validation codes.
- 12. A system for protecting a peripheral device such as a computer disc drive designated to a host against hot-plug attacks, the system including:
(a) means for maintaining time synchronization between the host and the peripheral device; (b) means utilizing the time synchronization for generating common data in the host and the peripheral device; and (c) means for generating a validation code in the host based on a seed including the common data.
- 13. A system according to claim 12 including means for placing the validation code in a register associated with the host and means for transferring the validation code to the peripheral device with a read/write command.
- 14. A system according to claim 13 wherein the register includes a Features register.
- 15. A system according to claim 12 wherein the validation code includes a random number.
- 16. A system according to claim 15 wherein the random number may be generated by means of a formula in the form
- 17. A system according to claim 12 including respective timers in the host and the peripheral device and wherein the time synchronization is maintained by setting the timers to an initial value To.
- 18. A system according to claim 13 wherein the common data is transferred to the peripheral device in a manner which does not substantially affect read/write operations in the device.
- 19. A system according to claim 13 including means for generating a validation code in the peripheral device based on the common data and means for comparing the validation code generated in the peripheral device with the validation code generated in the host.
- 20. A system according to claim 19 wherein the peripheral device responds normally to commands from the host during the comparison.
- 21. A system according to claim 19 including means for generating a revised validation code when the comparison does not result in a match of the validation codes, and means for comparing the revised validation code with the validation code generated in the host.
- 22. A system according to claim 19 including switching the peripheral device to a locked mode in which the peripheral device fails to respond to further commands from the host, when the comparison does not result in a match of the validation codes.
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This patent application claims priority from U.S. Provisional Application No. 60/348,431 filed on Oct. 29, 2001.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60348431 |
Oct 2001 |
US |