Claims
- 1. A data storage device comprising:
(a) a storage medium including a secure data area for storing secure data; and (b) a mechanism for allowing access to said secure data by a host device, on which the data storage device is mounted, if said host device is a trusted host device.
- 2. The data storage device of claim 1, wherein said mechanism allows access to said secure data only.
- 3. The data storage device of claim 1, wherein said storage medium further includes a stored representation of a user password, and wherein said mechanism is further operative to compare said stored representation to a representation of an alleged user password, said access to said secure data being allowed if said representations are substantially identical.
- 4. The data storage device of claim 1, wherein said storage medium further includes a trusted host list, and wherein said mechanism is operative to compare a host ID of said host device to said trusted host list, such that said host device is deemed to be a trusted host device if said trusted host list includes a representation of said host ID.
- 5. The data storage device of claim 1, wherein said mechanism is operative to interrogate a cookie file on said host device to determine whether said host device is a trusted host device.
- 6. The data storage device of claim 5, wherein said mechanism also is operative to participate in creating said cookie file.
- 7. The data storage device of claim 6, wherein said mechanism includes a cryptoprocessor that is operative to encrypt a host ID of said host device, said cookie file then including said encrypted host ID.
- 8. The data storage device of claim 5, wherein said mechanism includes a cryptoprocessor for decrypting records of said cookie file, such that said host device is deemed to be a trusted host if one of said decrypted records is substantially identical to a host ID of said host device.
- 9. The data storage device of claim 1, wherein said mechanism includes:
(i) a representation of a storage password; and (ii) a security application that, when executed by said host device, enables said host device to compare said representation of said storage password to a password list stored in said host device, such that said host device is determined to be a trusted host device if said password list includes said representation of said storage password.
- 10. The data storage device of claim 9, wherein said security application is further operative to transform an untrusted host device into a trusted host device by entering said representation of said storage password in said password list of said untrusted host device.
- 11. The data storage device of claim 9, wherein said mechanism further includes:
(iii) a representation of a storage ID that is used by said host device to find said representation of said storage password in said password list.
- 12. The data storage device of claim 1, wherein said storage medium further includes a clear data area to which said host device has unconditional access.
- 13. The data storage device of claim 1, further comprising:
(c) a representation of a clear key for encrypting and decrypting said secure data.
- 14. The data storage device of claim 1, further comprising:
(c) a mechanism for converting an untrusted host device to a trusted host device.
- 15. The data storage device of claim 1, further comprising:
(c) a mechanism for converting one of a plurality of trusted host devices into an untrusted host device.
- 16. The data storage device of claim 1, further comprising:
(c) a mechanism for converting all of a plurality of trusted host devices into untrusted host devices substantially simultaneously.
- 17. A method of associating at least one of a plurality of host devices with a data storage device as a trusted host device of the data storage device, the data storage device having a secure data area for storing secure data, the method comprising the steps of:
(a) providing each of the host devices with a respective host ID; and (b) for each of the at least one host device that is to be associated with the data storage device: storing said respective host ID in a trusted host list in the data storage device.
- 18. The method of claim 17, further comprising the steps of:
(c) mounting the data storage device on one of said host devices; (d) if said trusted host list includes said respective host ID of said one host device: allowing access to the secure data area by said one host device.
- 19. The method of claim 18, further comprising the steps of:
(e) storing a representation of a user password in the data storage device; and (f) if said trusted host list lacks said respective host ID of said one host device:
(i) entering an alleged user password in said one host device, and (ii) if said stored representation of said user password is substantially identical to a representation of said alleged user password: allowing access to the secure data by said one host device.
- 20. The method of claim 18, wherein the method further includes the steps of:
(e) storing a representation of a clear key in the data storage device; and (f) using said clear key to encrypt and decrypt the secure data accessed by said one host device.
- 21. The method of claim 17, further comprising the step of:
(c) for one of the at least one host device that has been associated with the data storage device: disassociating said one host device from the data storage device.
- 22. The method of claim 21, wherein said disassociating is effected by deleting said respective host ID of said one host device from said trusted host list.
- 23. A method of associating at least one of a plurality of host devices with a data storage device as a trusted host device of the data storage device, the data storage device having a secure data area for storing secure data, the method comprising the steps of:
(a) providing each of the host devices with a respective host ID; (b) providing the data storage device with a trust key; and (c) for each of the at least one host device that is to be associated with the data storage device:
(i) encrypting said respective host ID of said each host device using said trust key, thereby providing an access-permitting encrypted representation of said respective host ID of said each host device, and (ii) storing said access-permitting encrypted representation of said encrypted respective host ID of said each host device in said each host device.
- 24. The method of claim 23, further comprising the step of:
(d) providing each of at least a portion of the host devices with a respective cookie file for storing a list of encrypted representations of said respective host ID of said each host device of said at least portion, said at least portion including the at least one host device that is to be associated with the data storage device, so that for each of the at least one host device that is to be associated with the data storage device, said storing therein of said access-permitting encrypted representation of said encrypted respective host ID is effected by including said access-permitting encrypted representation of said encrypted respective host ID in said list of encrypted representations that is stored in said respective cookie file.
- 25. The method of claim 24, further comprising the step of:
(e) mounting the data storage device on one of said host devices; (f) encrypting said respective host ID of said one host device using said trust key, thereby providing an interrogative encrypted representation of said respective host ID of said one host device; and (g) if said one host device includes a respective one of said cookie files and if said list of encrypted representations that is stored in said one respective cookie file includes said interrogative encrypted representation of said respective host ID of said one host device: allowing access to the secure data area by said one host device.
- 26. The method of claim 25, further comprising the steps of:
(h) storing a representation of a clear key in the data storage device; and (i) using said clear key to encrypt and decrypt the secure data accessed by said one host device.
- 27. The method of claim 24, further comprising the steps of:
(e) mounting the data storage device on one of said host devices; (f) encrypting said respective host ID of said one host device using said trust key, thereby providing an interrogative encrypted representation of said respective host ID of said one host device; (g) storing a representation of a user password in the data storage device; and (h) if said one host device includes a respective one of said cookie files and if said list of encrypted representations that is stored in said one respective cookie file lacks said interrogative encrypted representation of said respective host ID of said one host device:
(i) entering an alleged user password in said one host device, and (ii) if said stored representation of said user password is substantially identical to a representation of said alleged user password: allowing access to the secure data by said one host device.
- 28. The method of claim 27, further comprising the steps of:
(i) storing a representation of a clear key in the data storage device; and (j) using said clear key to encrypt and decrypt the secure data accessed by said one host device.
- 29. The method of claim 24, further comprising the steps of:
(e) mounting the data storage device on one of said host devices; (f) encrypting said respective host ID of said one host device using said trust key, thereby providing an interrogative encrypted representation of said respective host ID of said one host device; (g) storing a representation of a user password in the data storage device; and (h) if said one host device lacks a respective one of said cookie files:
(i) entering an alleged user password in said one host device, and (ii) if said stored representation of said user password is substantially identical to a representation of said alleged user password: allowing access to the secure data by said one host device.
- 30. The method of claim 29, further comprising the steps of:
(i) storing a representation of a clear key in the data storage device; and (j) using said clear key to encrypt and decrypt the secure data accessed by said one host device.
- 31. The method of claim 23, further comprising the step of:
(d) for one of the at least one host device that has been associated with the data storage device: disassociating said one host device from the data storage device.
- 32. The method of claim 31, wherein said disassociating is effected by deleting said access-permitting encrypted representation of said encrypted respective host ID of said one host device from said one host device.
- 33. The method of claim 23, further comprising the step of:
(d) disassociating from the data storage device all of said at least one host device that has been associated with the data storage device.
- 34. The method of claim 33, wherein, if at least two of the host devices have been associated with the data storage device, said disassociating is effected substantially simultaneously for all of said host devices that have been associated with the data storage device.
- 35. The method of claim 33, wherein said disassociating is effected by changing said trust key.
- 36. A method of associating at least one of a plurality of host devices with a data storage device as a trusted host device of the data storage device, the data storage device having a secure data area for storing secure data, the method comprising the steps of:
(a) providing the data storage device with a representation of a storage password; and (b) for each of the at least one host device that is to be associated with the data storage device:
(i) providing a respective password list, and (ii) including said storage password in said respective password list.
- 37. The method of claim 36, further comprising the step of:
(c) for each of the at least one host device that is to be associated with the data storage device:
(i) entering a user password to said each host device; and (ii) comparing said representation of said storage password to a representation of said user password, said including of said storage password in said respective password list of said each host device being contingent on said representation of said user password being substantially identical to said representation of said storage password.
- 38. The method of claim 36, further comprising the step of:
(c) mounting the data storage device on one of said host devices; (d) if said one host device includes a respective said password list and if said respective password list includes said storage password: allowing access to the secure data area by said one host device.
- 39. The method of claim 38, further comprising the steps of:
(i) storing a representation of a clear key in the data storage device; and (j) using said clear key to encrypt and decrypt the secure data accessed by said one host device.
- 40. The method of claim 36, further comprising the step of:
(c) disassociating from the data storage device all said at least one host device that has been associated with the data storage device.
- 41. The method of claim 40, wherein said disassociating is effected by changing said storage password.
- 42. A method of using a data storage device together with a plurality of host devices, comprising the steps of:
(a) designating at least one of the host devices as a trusted host device relative to the data storage device; (b) mounting the data storage device on one of the host devices; and (c) if said one host device, on which the data storage device is mounted, is a trusted host device: allowing access, by said one host device on which the data storage device is mounted, to a secure data area in the data storage device.
- 43. The method of claim 42, further comprising the step of:
(d) otherwise:
(i) entering an alleged user password; and (ii) if said alleged user password is a valid user password, allowing access, by said one host device on which the data storage device is mounted, to said secure data area.
- 44. The method of claim 42, further comprising the step of:
(d) otherwise:
(i) entering an alleged user password; and (ii) if said alleged user password is a valid user password, designating said one host device, on which the data storage device is mounted, as a trusted host device.
- 45. The method of claim 42, further comprising the step of:
(d) if said one host device, on which the data storage device is mounted, is a trusted host device: designating said host device, on which the data storage device is mounted, as an untrusted host.
- 46. The method of claim 42, further comprising the step of:
(d) rendering all the host devices untrusted, substantially simultaneously.
Parent Case Info
[0001] This is a continuation-in-part of U.S. Provisional Patent Application Ser. No. 60/433,992, filed on Dec. 18, 2002.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60433992 |
Dec 2002 |
US |