The present invention relates generally to protecting peripheral devices such as computer disc drives. More particularly, the present invention relates to a method for protecting a peripheral device such as a disc drive, which is restricted to use with a designated host, from being hot-plugged to another system after the device is unlocked.
The development of consumer electronics technology explores the convergence of traditional consumer electronics such as audio, video and personal communication products with the digital worlds of the personal computer. This kind of technology allows products to interact with each other and/or may incorporate many individual products into a compact and interactive unit. For example, one typical application of such technology is a set-top box. A set-top box is a device that uses a specialized computer which translates incoming digital signals into a form suitable for viewing on a standard television set. The source of the signals may be a digital satellite or terrestrial broadcast, a cable television channel or a video-on-demand program sent down a telephone line. In the Internet realm, a set-top box is essentially a specialized computer that can “talk” to the Internet. These products may be equipped with storage devices in the form of hard disc drives so that for example, users can order TV programs or movies from cable TV companies, store them on the drive, and then play back the programs or movies from the drive whenever it is convenient. Drives applied to consumer electronics generally require that an individual drive be designated to a unique host to avoid data such as video/music being stored on the drive in a way which compromises privacy.
The term hot-plug normally refers to a procedure involving plugging in or removal of a disc drive into or from a system with the power turned on. In particular, a hot-plug attack against a disc drive means that the drive is removed from a system after it is powered up and unlocked by the system, and is then plugged into another system while keeping the drive powered up during the procedure to maintain an unlocked mode of the drive. In this manner, all data stored on the disc drive can be copied to other drives or the drive can be used with another system until it is powered down.
The issue of hot-plug attack for disc drives is difficult to address because it generally occurs after a disc drive is unlocked and existing ATA (Advanced Technology Attachment) standard security features cannot protect disc drives against such attacks.
However, hot-plug attacks may still take place successfully during the interval between Security Unlock commands. So, the unlock time should be set short enough to effectively prevent hot-plug attacks. This implies that the Security Unlock command should be issued quite frequently. Thus, much of the drives time is taken up in dealing with unlock procedure in the drive's normal operations.
The present invention may provide a solution to this and other problems, and may offer other advantages over the prior art.
The present invention provides a system and method for protecting a peripheral device such as a hard disc drive against hot-plug attacks which addresses the above-mentioned problem.
The present invention may provide a method for preventing a disc drive being hot-plugged from its designated host to another system without affecting the drive's normal read/write operations. The method may effectively protect the drive from hot-plug attacks by maintaining time synchronization between the drive and its host. It may also significantly extend the interval (i.e., the unlock time limit) between Security Unlock commands by using a Features register to carry security information in each read/write command.
According to one aspect of the present invention there is provided a method of protecting a peripheral device designated to a host against hot-plug attacks, the method including the steps of:
According to a further aspect of the present invention there is provided a system for protecting a peripheral device designated to a host against hot-plug attacks, the system including:
These and various other features as well as advantages which characterize the present invention will be apparent upon reading of the following detailed description and review of the associated drawings.
According to the ATA standard, issuing a command (control information) from a host to a disc drive can be implemented through the Features register, Sector Count register, LBA Low register, LBA Mid register, LBA High register, Device register and Command register. Because the Features register is not used for all read/write commands currently implemented in ATA disc drives, it can be used to carry security information in each read/write command. This may avoid adding overhead for the purpose of protecting a disc drive against hot-plug attacks.
The security information to be carried by the Features register may include a validation number generated based on a seed. For example, the following formula can be used for such a purpose:
Xn+1=P1·Xn+P2 mod N n=0,1,2, . . . (1)
where X0 denotes the seed. From the formula, the same seed will generate the same validation number X1 if P1, P2 and N of the host are the same as those of the drive.
To maintain time synchronization between the host and its drive, individual timers with an initial value To, may be set between them. The content of each timer may be arranged to increment in milliseconds and may be used as a seed to generate a validation number every time that a read/write command is issued. In each subsequent unlock command, the content of the timer may be updated by adding an unlock time limit with its currently stored value, and the updated content may be stored in the host in addition to the initial value.
To illustrate the concept, the following variables are defined. Let
The timing difference is contributed from three sources:
After power up, the host should send out the encrypted password to unlock the locked drive before commencing normal operations.
During unlock procedure, the host may:
Meanwhile, the drive may:
The purpose of transferring the difference T−To from the host to the drive is to ensure that both start their synchronization timers from the same value in any event.
When the host issues a read/write command at T+Y, the host may:
Once the drive receives the read/write command,
Before the unlock time limit expires, the host may issue an unlock command to resynchronize the synchronization timer by updating its timer with T+Tu and then transfer the encrypted difference T+Tu−To to the drive along with the command. Thus, both can start timing from the newly updated and synchronized value.
This step can avoid the timing difference accumulated since the last unlock command passed down. Hence, the unlock time limit can be set to a relatively large value. For example, it can be set to 30 or 60 minutes or even longer assuming that the timing difference between the host and the drive can be ensured to be small enough. However, for present purposes the unlock time limit may be set to approximately 30 seconds to minimize the possibility of hot-plug attacks.
The following description elaborates point (3) above on how the effect of timing discrepancies can be resolved:
Assume
Let the clock of the host be slower than that of drive by 0.01 milliseconds per second (during implementation, it may be required that To and Tu, are multiples of Dmax). Consider the following two cases:
The disc drive receives the read/write command 1 and responds to the command as usual while confirming the above validation number in the background. The drive confirms the validation number stored in the Features register by generating its own validation number based on the same formula of equation (1) as the host using the value of its own timer as the seed. The drive then compares the validation number it generates with that in the Features register. The drive continues to respond to all host commands while the background validation process is proceeding by ignoring subsequent read/write commands 2 and 3 which contain new validation numbers.
If the comparison is successful, as shown in
If the comparison in the first instance is not successful, as shown in
The present invention may prevent a disc drive designated to a host being hot-plugged to another system by maintaining time synchronization between the drive and the host after unlocking. The present invention may use the Features register in each read/write command to carry a validation number, which is generated based on the seed from time information, so that normal read/write operation commands are not affected.
In this way, the present invention may defeat the following two possibilities of attacks even though the drive is hot-plugged to another system for example, a PC. One possibility is that the contents of the Features register may be captured using an ATA bus analyzer. When the exact captured contents are sent to the drive from the PC, the timer used by the drive is now different and thus generates a different validation number. Thus the captured contents cannot be used to access the drive anymore. Exhaustive search of a valid 8-bit number is not possible because the drive switches to locked mode when there is even 1 miscomparison.
The present invention may significantly prolong the unlock time limit because:
It is to be understood that even though numerous characteristics and advantages of various embodiments of the present invention have been set forth in the foregoing description, together with details of the structure and function of various embodiments of the invention, this disclosure is illustrative only, and changes may be made in detail, especially in matters of structure and arrangement of parts within the principles of the present invention to the full extent indicated by the broad general meaning of the terms in which the appended claims are expressed. For example, the particular elements may vary depending on the particular application for the while maintaining substantially the same functionality without departing from the scope and spirit of the present invention. In addition, although the preferred embodiment describe herein is directed to a disc drive, it will be appreciated by those skilled in the art that the teaching of the present invention can be applied to other systems, like hard disc drive system, without departing from the scope and spirit of the present invention.
This patent application claims priority from U.S. Provisional Application No. 60/348,431 filed on Oct. 29, 2001.
Number | Name | Date | Kind |
---|---|---|---|
4724423 | Kinoshita | Feb 1988 | A |
4800590 | Vaughan | Jan 1989 | A |
4885778 | Weiss | Dec 1989 | A |
5237614 | Weiss | Aug 1993 | A |
5282247 | McLean et al. | Jan 1994 | A |
5363449 | Bestock | Nov 1994 | A |
5367572 | Weiss | Nov 1994 | A |
5386567 | Lien et al. | Jan 1995 | A |
5412730 | Jones | May 1995 | A |
5434562 | Reardon | Jul 1995 | A |
5481611 | Owens et al. | Jan 1996 | A |
5623637 | Jones | Apr 1997 | A |
5625777 | Takahashi et al. | Apr 1997 | A |
5640453 | Schuchman et al. | Jun 1997 | A |
5661807 | Guski | Aug 1997 | A |
5703948 | Yanovski | Dec 1997 | A |
5784576 | Guthrie et al. | Jul 1998 | A |
5802176 | Audebert | Sep 1998 | A |
5867686 | Conner et al. | Feb 1999 | A |
5889866 | Cyras et al. | Mar 1999 | A |
5933500 | Blatter et al. | Aug 1999 | A |
6069953 | Kong | May 2000 | A |
6071191 | Takeda | Jun 2000 | A |
6073122 | Wool | Jun 2000 | A |
6088802 | Bialick | Jul 2000 | A |
6111505 | Wagener | Aug 2000 | A |
6128605 | Saito et al. | Oct 2000 | A |
6190257 | Takeda | Feb 2001 | B1 |
6236728 | Marchant | May 2001 | B1 |
6310956 | Morito et al. | Oct 2001 | B1 |
6314518 | Linnartz | Nov 2001 | B1 |
6735310 | Hsing et al. | May 2004 | B1 |
6865675 | Epstein | Mar 2005 | B1 |
Number | Date | Country |
---|---|---|
1 063 580 | Dec 2000 | EP |
A-04-163649 | Jun 1992 | JP |
A-05-250326 | Sep 1993 | JP |
2835433 | Jun 1997 | JP |
9153890 | Jun 1997 | JP |
A-11-353049 | Dec 1999 | JP |
A-2001-209614 | Aug 2001 | JP |
A-2001-256004 | Sep 2001 | JP |
Number | Date | Country | |
---|---|---|---|
20030084295 A1 | May 2003 | US |
Number | Date | Country | |
---|---|---|---|
60348431 | Oct 2001 | US |