Backing up digital content that is stored in a secured storage device
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-012/14
G06F-012/16
G06F-021/10
G06F-021/62
G06F-021/64
G06F-021/60
G06F-011/30
출원번호
US-0185728
(2008-08-04)
등록번호
US-9075957
(2015-07-07)
발명자
/ 주소
Sela, Rotem
Zer, Aviad
출원인 / 주소
SANDISK IL LTD.
대리인 / 주소
Toler Law Group, PC
인용정보
피인용 횟수 :
0인용 특허 :
5
초록▼
A third party facilitates preparation of a backup SSD for backing up a source SSD. Digital data of the source SSD, which includes protected and sensitive data and information, is copied to the backup SSD either by and via the third party or directly from the source SSD but under supervision of the t
A third party facilitates preparation of a backup SSD for backing up a source SSD. Digital data of the source SSD, which includes protected and sensitive data and information, is copied to the backup SSD either by and via the third party or directly from the source SSD but under supervision of the third party. The digital data of the source SSD is copied to the backup SSD under stringent rules and only if each party (i.e., the source SSD, destination SSD, and third party) proves to a counterpart device with which it operates that it is authorized to send to it digital data or to receive therefrom digital data, depending on the device with which that party operates.
대표청구항▼
1. An apparatus configured to communicate with a destination secured storage device, comprising: an authentication manager;a processor configured to execute the authentication manager to authenticate a destination secured storage device, the destination secured storage device containing unusable dig
1. An apparatus configured to communicate with a destination secured storage device, comprising: an authentication manager;a processor configured to execute the authentication manager to authenticate a destination secured storage device, the destination secured storage device containing unusable digital data originating from a source secured storage device, the unusable digital data including secure data that is not transferable to unauthorized devices, and to establish a secure channel with the authenticated destination secured storage device; anda storage device configurator adapted to configure the destination secured storage device to match a configuration of the source secured storage device by transferring a data structure to the destination secured storage device and to disable operation of the destination secured storage device after the unusable digital data has been written to the destination secured storage device, to disable the source secured storage device to render digital data stored therein unusable, and after rendering the digital data unusable at the source secured storage device, to enable the destination secured storage device over the secure channel in order for the unusable digital data in the destination secured storage device to become usable, wherein enabling the destination secured storage device includes reinstating operation of the destination secured storage device, wherein the storage device configurator is configured to receive an identifier of the source secured storage device via the destination secured storage device in order for the identifier to be used to disable the source secured storage device. 2. The apparatus of claim 1, wherein the storage device configurator is further configured to enable the destination secured storage device by reinstating modified data in the destination secured storage device. 3. The apparatus of claim 1, wherein the storage device configurator is further configured to publish the identifier to a host device of the source secured storage device in order to disable the source secured storage device. 4. The apparatus of claim 1, further comprising a data read/write mechanism configured to read the digital data from the source secured storage device and to write the read digital data into the destination secured storage device over a channel that is secure. 5. The apparatus of claim 4, wherein the authentication manager is further configured to authenticate the source secured storage device prior to the data read/write mechanism reading the digital data from the source secured storage device. 6. The apparatus of claim 4, wherein the digital data that the data read/write mechanism reads from the source secured storage device includes the identifier of the source secured storage device. 7. The apparatus of claim 6, wherein the storage device configurator is further configured to disable the source secured storage device by publishing the identifier of the source secured storage device to a host device of the source secured storage device. 8. The apparatus of claim 1, further comprising a revocation table maintaining a list of a plurality of disabled source storage devices, wherein the revocation table is updated in response to receiving the identifier from the destination secured storage device. 9. The apparatus of claim 1, further comprising a storage device configured to store the digital data for a time period after the digital data is written to the destination secured storage device, and wherein the time period is longer than one day. 10. The apparatus of claim 1, further comprising a memory to store the digital data. 11. A source secured storage device comprising: a memory storing digital data and a configuration data structure of the source secured storage device, the digital data including secure data that is not transferable to unauthorized devices; anda secure storage processor configured to determine whether a destination secured storage device or a third party device is authorized to receive therefrom the digital data and, if so, to establish a secure channel between the secure storage processor and the destination secured storage device or between the secure storage processor and the third party device, to transfer the digital data to the destination secured storage device directly or via the third party device for back up over the corresponding secure channel, to transfer the configuration data structure to the third party device for configuration of the destination secured storage device to match a configuration of the source secured storage device, to transfer an identifier to the destination secured storage device, and to disable operation of the destination secured storage device after the digital data has been transferred to the destination secured storage device, wherein the destination secured storage device is enabled to use the digital data responsive to reinstatement by the third party device of operation of the destination secured storage device, and wherein the digital data is configured to be rendered unusable to the source secured storage device by disabling, by the third party device, the source secured storage device using the identifier. 12. The source secured storage device of claim 11, wherein the secure storage processor is further configured to disable the destination secured storage device in order to render the digital data unusable. 13. The source secured storage device of claim 12, wherein the secure storage processor renders the digital data of the destination secured storage device unusable prior to, during, or after the secure storage processor transfers the digital data to the destination secured storage device or to the third party device. 14. The source secured storage device of claim 11, wherein the secure storage processor transfers the identifier to the third party device or to the destination secured storage device during mutual authentication with the third party device or the destination secured storage device or as data embedded in the digital data transferred to the destination secured storage device. 15. The source secured storage device of claim 11, wherein the secure storage processor is further configured to determine whether the source secured storage device is authorized to send to the destination secured storage device the digital data that includes the secure data which is not transferable by the source secured storage device if unauthorized and, if so, to send the digital data of the source secured storage device directly from the source secured storage device or via the third party device. 16. The source secured storage device of claim 15, wherein, if the digital data received from the source secured storage device is usable, the secure storage processor is further configured to disable the destination secured storage device so that the digital data received from the source secured storage device is rendered unusable. 17. The source secured storage device of claim 16, wherein the secure storage processor is further configured to prepare the destination secured storage device for use as a backup secured storage device by rendering the unusable digital data in the destination secured storage device usable. 18. The source secured storage device as in claim 17, wherein the digital data in the source secured storage device is rendered usable by reinstating data in the destination secured storage device. 19. The source secured storage device as in claim 17, wherein as part of the preparation of the destination secured storage device to operate as a backup secured storage device, the secure storage processor sends the identifier of the source secured storage device to the third party device in order for the identifier to be published by the third party device to a host device of the source secured storage device so that the digital data stored in the source secured storage device is not usable. 20. A method of operating a third party device to enable backing up digital data of a source secured storage device, the method comprising: authenticating a destination secured storage device by the third party device, the authenticated destination secured storage device containing unusable digital data originating from a source secured storage device, the unusable digital data including secure data that is not transferable to unauthorized devices;causing, by the third party device, a transfer of a configuration data structure from the source secured storage device to the authenticated destination secured storage device such that configurations of the source secured storage device and the authenticated destination secured storage device match;disabling, by the third party device, operation of the destination secured storage device after the unusable digital data has been written to the destination secured storage device;establishing, by the third party device, a secure channel with the authenticated destination secured storage device;at the third party device, disabling the source secured storage device to render the digital data stored therein unusable;receiving at the third party device an identifier of the source secured storage device via the authenticated destination secured storage device, the identifier to be used by the third party device to disable the source secured storage device; andafter the source secured storage device is disabled, enabling, by a processor of the third party device, operation of the destination secured storage device over the secure channel in order for the unusable digital data in the destination secured storage device to become usable. 21. The method of claim 20, further comprising reinstating, by the third party device, an attribute of the destination secured storage device. 22. The method of claim 20, wherein digital data in the destination secured storage device is made unusable prior to, during, or subsequent to the digital data being copied from the source secured storage device to the destination secured storage device. 23. The method of claim 20, further comprising rendering the digital data in the destination secured storage device unusable by at least one of changing the digital data before or as it is being transferred to the destination secured storage device, modifying an attribute of the destination secured storage device, and configuring the digital data at the destination secured storage device. 24. The method of claim 20, further comprising determining that the source secured storage device is authorized to be backed up by the destination secured storage device. 25. The method of claim 24, further comprising determining that the destination secured storage device is authorized to back up the source secured storage device. 26. The method of claim 20, further comprising publishing the identifier of the source secured storage device to disable the source secured storage device. 27. The method of claim 20, wherein the identifier from the source secured storage device is transferred to the destination secured storage device during mutual authentication between the source secured storage device and the destination secured storage device. 28. The method of claim 20, further comprising embedding the identifier in the unusable digital data. 29. The method of claim 20, wherein the third party device receives the identifier after the destination secured storage device has been enabled. 30. The method of claim 20, further comprising publishing the identifier in response to a request from at least one of an end-user and a user application.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (5)
Teicher,Mordechai; Segalov,Tal, Method and system for maintaining backup of portable storage devices.
Fujiwara Shuuji,JPX ; Maruyama Minoru,JPX, Mobile communication method, and mobile telephone switching station customer management system, and mobile unit for implementing the same.
LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.