TWI274499B - Authentication mechanism permitting access to data store in a data processing device - Google Patents
Authentication mechanism permitting access to data store in a data processing device Download PDFInfo
- Publication number
- TWI274499B TWI274499B TW94111914A TW94111914A TWI274499B TW I274499 B TWI274499 B TW I274499B TW 94111914 A TW94111914 A TW 94111914A TW 94111914 A TW94111914 A TW 94111914A TW I274499 B TWI274499 B TW I274499B
- Authority
- TW
- Taiwan
- Prior art keywords
- user
- access
- memory
- execution
- data
- Prior art date
Links
- 230000007246 mechanism Effects 0.000 title abstract description 27
- 238000012545 processing Methods 0.000 title description 24
- 230000015654 memory Effects 0.000 claims abstract description 84
- 238000003860 storage Methods 0.000 claims abstract description 27
- 238000000034 method Methods 0.000 claims abstract description 16
- 238000012795 verification Methods 0.000 claims description 22
- 238000013500 data storage Methods 0.000 claims description 18
- 239000000463 material Substances 0.000 claims description 12
- 241000282320 Panthera leo Species 0.000 claims description 4
- 241000283690 Bos taurus Species 0.000 claims 1
- 208000027418 Wounds and injury Diseases 0.000 claims 1
- 230000009286 beneficial effect Effects 0.000 claims 1
- 230000006378 damage Effects 0.000 claims 1
- 208000014674 injury Diseases 0.000 claims 1
- 238000004891 communication Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 5
- 238000007726 management method Methods 0.000 description 5
- 229920001690 polydopamine Polymers 0.000 description 4
- 239000003795 chemical substances by application Substances 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 229910052802 copper Inorganic materials 0.000 description 2
- 239000010949 copper Substances 0.000 description 2
- 238000013506 data mapping Methods 0.000 description 2
- 238000003825 pressing Methods 0.000 description 2
- 230000011218 segmentation Effects 0.000 description 2
- 239000004575 stone Substances 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 206010011469 Crying Diseases 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
Description
12744991274499
用,該輸入有利於該用 取。 戶對存儲於該資料存儲設備中的資料的存 本發明之一特點是 本發明之一特點是、: 本發明之一特點是, 的存取。 ’5亥執行機構邑括用一個開關。 1該輸入短路該開關。 操作該開關,允許—段__對該資料This input is advantageous for this use. A feature of the present invention for storing data stored in the data storage device is that one of the features of the present invention is that: one of the features of the present invention is access. The '5H actuators include a switch. 1 This input shorts the switch. Operate the switch, allow - segment __ for this data
本發明之一特點是, 根據本發明的一方面 包括·· 该時間期間可由用戶規劃。 儲設備用戶的方法 接收由顧戶提供的啓動一個執行設備的輸入; 接收該用戶的用戶識別碼; 接收孩用戶的密石馬。 第=之一特點是’該第挪驟和第三接收步驟都發生在One feature of the invention is that, according to an aspect of the invention, the time period can be planned by the user. A method of storing a device user receives an input provided by a customer to activate an execution device; receives a user identification code of the user; and receives a baby stone of the child user. One of the characteristics of = is that the first and third receiving steps occur in
弟一接收步驟發生後的-段時_。 或弟—接收步驟發生後的-段時間内。 本發明之-槪是,魏行設射_ 選擇而被啓動或禁止。 個或夕個 本發明之一特點是 開關。 本發明之一特點是 開啓或關閉的開關。 該執行設備包括一個位於該射鋪内的 _于設備包括在一段指定_間内保持 6 1274499 本發明之—特點是,該指定的時間段可由用戶來規割。 的資料 本發明之一特點是,該驗證允許用戶存取射极該存儲設備中 根據本發明的一個方面’提供對存館於一個資料 個=多個資料存儲驅動器的—個❹個資料制區轉 權存取的系統包括: •個處理器; -細於接收由要存取該資料的用戶提供 一個該存儲設備中的記憶體; 爾又備, 一個或多個存#1於觀憶針的可執行文件; -個電耦合至該龍存儲設備的計算設備;The younger one receives the - segment after the step occurs. Or brother—the period after the receiving step occurs. The trick of the present invention is that the start-up or prohibition of the set-up is selected. One or one of the features of the invention is a switch. One feature of the invention is a switch that is turned on or off. The execution device includes a device located within the slab including a predetermined number of _ s. 6 1274499. The present invention is characterized in that the specified period of time can be calibrated by the user. One of the features of the present invention is that the verification allows the user to access the emitter of the storage device in accordance with an aspect of the present invention to provide a data storage area for one data store/storage data storage drives. The system for transferring access includes: • a processor; - finely receiving the memory in the storage device provided by the user who wants to access the data; and preparing one or more storage #1 in the memory An executable file; a computing device electrically coupled to the dragon storage device;
物細糊她軸—個或多個可 一個存在於該計算設備中! 用戶人="及初始化的執行,該執行生成-個用戶介面,在該 用戶"面中用戶可啓動或禁止該執行設備。 用戶=:特點是,該輸入啓動該執行設備-段時間,細 =:一特點是,如果用戶在該執行設備被啓動後 用戶名和岔碼’對該資料的存取被啟動。 ^發明之-特點是,該執行設備包括—個開闕。 施例的^.或其他優勢嶒徵,及新穎性特徵,_的實 輪撕下面的描述及晴被更全面地轉。、 7 1274499 【實施方式】 本發明的-些方面提供了一種方便對一個或多個尋求存取存 儲於-個資料存儲設射峨細戶的安全_統及方法。 2的-些方面誇種安__,其防止對存儲於該 =存儲中的資料的未經批准的存取。經由一個或多個用戶 "面/亥文全或驗證機制可能有效或無效。該一個或多細戶介 面允許戶配置或控_戶對該資料存儲設備的存取。例 :料^^或多铜戶介面可以用於配置一個或多細戶讀寫該 =、子叹傷内共用的一個或多個資料。該一個或多個用戶介面 控制、操作和/或配置該資料存儲設備。___ 、固或多個管理魏或操作,包括其設技修改,均可由該一 ,_彳_方崎於防^^ 包括敏爲5亥貝科存儲設備的用戶端,該資料處理設備可以 腦工_、PDA、膝壤職触何可能的網路 存取^個典型的實補中,該雜存儲設備允許—铜戶最初 存取-個或多個用於初始化 面。該配置頁面用減^ 义夕烟戶名和掛碼的配置頁 仏 耵面所提到的安全/驗證機制。通過啓動 作是全/驗證機制而被獲得。該安全, 仃卜構或者執行。通過啓動該安全/驗證機制,將 8 1274499 =·該存儲設備中物的存取能被限制 =::、碼和執行了該安、 動後’其能作用一 時門視★太個可讓用戶存取存儲於該存儲設備中的資料的 利2 的一些方面能防止未經批准的實體,例如里客, ::的網路安全性攻擊來存取資料。•二A thin paste of her axis - one or more can exist in the computing device! The user =" and the execution of the initialization, the execution generates a user interface in which the user can activate or deactivate the execution device. User =: The feature is that the input initiates the execution device - segment time, fine =: a feature is that if the user is activated after the execution device is activated, the user name and weight 'access to the data is initiated. ^Invented - the feature is that the execution device includes - an opening. The ^. or other advantages of the application, and the novelty characteristics, the description of the actual tearing of the _ and the clearing are more comprehensively transferred. 7, 1274499 [Embodiment] Aspects of the present invention provide a security and method for facilitating the storage of one or more data storage devices. 2 - Some aspects exaggerate the security __, which prevents unauthorized access to the data stored in the = storage. It may be valid or invalid via one or more users "face/Haiwen or authentication mechanisms. The one or more user interfaces allow the user to configure or control access to the data storage device. Example: The material ^^ or multi-copper interface can be used to configure one or more users to read and write one or more materials shared by the = and sub-snips. The one or more user interfaces control, operate, and/or configure the data storage device. ___, solid or multiple management Wei or operations, including its technical modifications, can be made by the one, _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ In the typical implementation of the network access, the PDA, the PDA, the singular storage device allows the copper to initially access one or more of the initialization surfaces. This configuration page uses the security/authentication mechanism mentioned in the 义 夕 烟 烟 烟 烟 烟 烟 烟 烟 烟. It is obtained by starting the full/verification mechanism. The security, the construction or execution. By initiating the security/authentication mechanism, 8 1274499 = · access to the object in the storage device can be limited =::, code and after the execution of the security, the action can be used for a moment. Some aspects of accessing the data stored in the storage device can prevent unauthorized entities, such as the Internet security attack, from accessing data. •two
γ:τ::γ— 為亥-個心個資料處理或計算設細集中 料存儲設備可以看作是一個網路_己憶體_。 個資施例中’該資料存錯設備可以包括—個或多 驅動器,例如硬碟驅動器或者其他任何-種嬋體驅動 器,存儲設備可以包括多種不_的資_== 以料存儲驅動器可以包括能存儲資料的任何-種媒;: 抓類型可以包括·、光碟、快_和其他類似的媒介。 下文中,硬碟驅動器被稱作一個資料存儲設備或者_1 於存儲資料的媒介的驅動器或者元件。在—個业型的 貫施例中’-個或多個資料存儲驅動器或硬碟驅動器可以 合併。在-個典型的實施例中,該資料存儲促 Μ個或多個附加的資料存儲驅動器或者硬碟驅動器的合併。 在-個典型的實施射,駐條賴制包括—彳峨行機 構’例7_鎌的按酬,私馳—辦魏得該網路 附加疏翻容存取的用戶進行物理的按壓。該内容可以包括一 9 1274499 六1命攝在個物目酬猶加記‘丨·%—個或多個資料 存儲驅動11的編中的資觸和/或文件目錄。在—個业獅 實施例中’在該執行機概啓動後,用能只能在一定的: :她丁機•按下後(例如—個可按壓的按爛 二二、皮用了寺間’在一分鐘内,一個或多個資料檔案或文 件临被用戶存取。在這個實施例中,如果用戶不對該可按壓 的独開關進行物理按壓’對存儲在麵存儲設備中的一個或 多個貧枓雜驅動器的一個或多個資料共用區域中 能被限制。 、 該執行機構或安全/驗證機繼被用戶以提供一個或多個輸 入給由該網路附加記憶體提供的—個或多個配置頁面的方式而: 動’该動作可以在該網路附加記憶體的初始化設i過程中發生。 在一個典型的實施例中,細于機構能被以用戶介面的折疊區域 提供的-個或多個選擇的方式執行。在一個典型的實施例中,僅 僅當該執行機構、按鈕開關或驗證按鈕被按下和一個在一定時間 内β覽该-個或多個配置頁面的請求產生時,執行該驗證按叙機 制才允許用戶職該-個或多個配置頁面。一個請求能通過選擇 和點擊而被客戶使用一個例如微軟瀏覽器的文件系統廊 用軟體而劉覽的一個或多個配置文件而被發起。當用戶執行节— 個或多個配置文件時(也就是選擇或者點擊),該選擇或被選擇的配 置文件能從一個網路附加記憶體至用戶用戶端工作站被提供。如 果一個瀏覽該一個或多個配置文件的請求不是發生在該一定時間 1274499 消逝之前,該網路附加記憶體能防止該一個或多個配置文件被顯 不。在另一個的典型實施例中,該執行機構或驗證機制包括一個 指紋閱讀裔、一個讀卡機(例如一個磁卡閱讀器)、一個無線電波辨 谶态(Radio Frequency Identification Device,RFro)、一個代碼字 或密碼、關鍵碼識別卡或任何其他的驗證機制。可選地,與用戶 按壓機械開關相反,該驗證機制能使用任何有線或無線的協定實 現與该網路附加記憶體通信。該無線通信可包括使用一個安全的 通信形式。例如,該無線通信協定可包括藍牙或jgEE 8〇211χ。 該安全/驗證機制提供一個防止黑客未經批准的進入一個資料存 儲設備的手段。 圖1是根據本發明的一個實施例的使用網路附加記憶體励 的典型系統的框圖。該網路附加記憶體1〇〇爲一個或多個資料處 理設備提供資料記憶體。如圖所示,—個典獅咖設備提供該 網路附加記憶體100與一個或多個資料處理設備之間的連接。該 開關設備能提供有線或無線通信的連接。例如,一個無線路由器 能利用如下所述的任何一種有線或無線的通訊協定:10/100乙太 網,十億位元乙太網’ 802.11X藍牙及其類似的協定。該一個或多 個資料處理汉備包括例如數位攝影機、數碼相機、Mp3播放哭、 PDA及一個或多個個人錄影機(Personal Vide〇 Rec〇rder,pvR)的設 備。如圖解…擁人錄影射岐裝或不安裝硬碟驅動器。 該個人錄影機可以指一個能用作個人錄影功能的機頂盒 (Set-Top-Box,STB)。另一方面,該個人攝像機可以指一個個人錄 1274499 接至—個能向家庭γ:τ::γ—A storage device that can be used as a data processing or calculation for a data processing or calculation can be regarded as a network_remembering body_. In the case of the affiliation, the data storage device may include one or more drives, such as a hard disk drive or any other type of media drive, and the storage device may include a plurality of types of resources _== the storage drive may include Any medium that can store data;: Grab types can include ·, CD, Fast_ and other similar media. Hereinafter, a hard disk drive is referred to as a data storage device or a driver or component of a medium in which data is stored. In one embodiment, one or more data storage drives or hard disk drives can be combined. In a typical embodiment, the data store facilitates the merging of one or more additional data storage drives or hard disk drives. In a typical implementation, the stagnation system includes the 彳峨 机 ’ 例 例 例 例 例 例 例 例 例 例 例 例 例 例 办 办 办 办 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 该 该 该 该The content may include a 9 1274499 six 1 life shot in the title of the ‘丨·%—one or more data storage driver 11 in the compilation and/or file directory. In the case of a lion industry, 'after the start of the execution machine, the energy can only be used in certain:: She Ding machine ・ After pressing (for example, a depressible press rotten 22, the skin used the temple 'One or more data files or files are accessed by the user in one minute. In this embodiment, if the user does not physically press the depressible single switch' to one or more stored in the face storage device One or more data sharing areas of the lean drive can be limited. The actuator or security/verification machine is then provided by the user to provide one or more inputs to the network attached memory or Multiple ways of configuring the page: The action can occur during the initialization of the network attached memory. In a typical embodiment, the mechanism can be provided by the user interface's folded area - Executing one or more selected ways. In a typical embodiment, only when the actuator, button switch or verification button is pressed and a request for viewing the one or more configuration pages within a certain period of time When the verification is performed, the user is allowed to serve the one or more configuration pages. A request can be selected and clicked by the client using a file system gallery such as Microsoft browser and one or more of the viewers. The profile is initiated. When the user executes the profile or profiles (ie select or click), the selected or selected profile can be provided from a network attached memory to the user client workstation. If a request to browse the one or more configuration files does not occur before the certain time 1274499 elapses, the network attached memory can prevent the one or more configuration files from being displayed. In another exemplary embodiment, The actuator or verification mechanism includes a fingerprint reader, a card reader (such as a magnetic card reader), a Radio Frequency Identification Device (RFro), a code word or password, a key identification card, or Any other verification mechanism. Alternatively, contrary to the user pressing the mechanical switch, the verification mechanism can Communicating with the network attached memory using any wired or wireless protocol. The wireless communication can include the use of a secure form of communication. For example, the wireless communication protocol can include Bluetooth or jgEE 8〇211χ. The security/authentication mechanism provides A means of preventing hackers from entering a data storage device without approval.Figure 1 is a block diagram of a typical system for using network attached memory to enhance the network in accordance with one embodiment of the present invention. One or more data processing devices provide data memory. As shown, a lion service device provides a connection between the network attached memory 100 and one or more data processing devices. The switch device can provide wired Or a wireless communication connection. For example, a wireless router can utilize any of the wired or wireless communication protocols described below: 10/100 Ethernet, Gigabit Ethernet, 802.11X Bluetooth, and the like. The one or more data processing devices include, for example, digital cameras, digital cameras, Mp3 playback crying, PDAs, and one or more personal video recorders (Personal Vide® Rec〇rder, pvR) devices. As shown in the figure... the video is shot or not installed. The personal video recorder can refer to a set-top box (STB) that can be used as a personal video recording function. On the other hand, the personal camera can refer to a personal record 1274499 to a family
用戶顯示多媒體内容的電視機或監視器。該網路附加記憶體· 爲被-個或多個個人錄影機接收够媒體内容提供—個隼中存儲 設備。因爲將内容存儲至該網路附加記憶請,所以ς固人錄 影機可缺乏能_任何由該網路附加記憶體100所接收的資料存 儲工細如硬碟驅動器)。而且,任何由其他練處理設備存微包 括個人攝像_資料可以輕易地被任何一個該資料處理設備存 蛛劉覽。例如’-個沒有猶鶴人錄影機能存取由具 有硬碟驅動器的個人錄影機存入該網路附加記憶體则的多媒體 内谷,反之亦然。結果,該網路附加記憶體100促進了該一個或 多個資料處理設備之間的資料共用。因爲它提供一個中心存儲機 構,所以該網路附加記憶體100可以看作是該一個或多個資料處 理設備的虛擬存儲驅動器。該網路附加記憶體1⑻配置有容易擴 充的存儲容量。在一個實施例中,該網路附加記憶體1〇〇能接受 一個附加的硬碟驅動器。例如,一個網路附加記憶體1〇〇能接受 一個或多個附加的石更碟驅動器。同樣地,爲適應未來資料容量的 增長,該網路附加記憶體100提供一個容易升級的靈活的存儲機 構。另外,該網路附加記憶體100能提供資料映射及資料分段功 能0 當該網路附加記憶體100首先被引入如圖1所示典型的開關 設備時,一個或多個配置參數可被設置成初始化過程的一部分。 在一個實施例中,在初始化過程中的參數設置包括該網路附加記 12 1274499 憶體的時間、日期及時區。該網路附加記憶體,例如,能利用如 圖1所示的電子電腦作爲一個設置其時間、日期及時區的參考 原麵路附加存儲設備利用任何一個其他的如目1所示的資料 處理設備(例如數位攝錄放影機(cybercam)、數碼相機、不帶硬碟 _器的個人錄賴、具有麵鶴卿目场織、MP3播放 益或PDA)作爲設置離的參麵是可频期到的。 在-個實施例中,該網路附加記憶體設置過程發生在該網路 ^加記憶體被物理地連接至一個網路及被一個作業系統(例如微 軟Windows作業系統)辨認後。接下來的圖2及圖3揭示了一個網 路附加記憶體系統結構的一個實施例。 圖2是根據本發明的一個實施例的網路附加記憶體2〇〇的框 圖。該網路附加記憶體200包括一個具有一個或多個元件的印刷 f路板(_?€8)202。該-個或多個元件通過該印刷電路板2〇2 電f生連接。该一個或多個元件包括一個網路附加記憶體晶片0丨 - S〇C)204,一個隨機存取記憶體,一個快閃記憶體212, 一個交流介面(1/F)216,一個電源220,一個介面模組224,一個 無線收發機/天線模組228,一個或多個硬碟驅動器232和一個控 制态(或處理器)236。該介面模組224包括如下的一個或多個介 面· IEEE 1394、USB、10/100乙太網、十億位元乙太網、pCI、 SATA、ΑΤΑ、IDE、SCSI、GPI0等等。該無線收發機/天線模組 228可包括一個能隨意連接至該網路附加記憶體印刷電路板2〇2 的可連接模組或者迷你型PCI卡。該一個或多個硬碟驅動器232 13 1274499 的數量取決於該網路附加記憶體200的設計。該印刷電路板2〇2 可適應該硬碟驅動器的數量配置。採用的硬碟驅動器232的數量 可取決於是否對該網^附加記憶體5〇〇提供的資料進行映射或分 段(也就是RAID)。在二個實施例中,該控制器236控制通信耦合 至该網路附加記憶體晶片204的任意元件。該網路附加記憶體晶 片204包括一個與處理器或中央處理器(CPU)240混合使用的積體 電路晶片。 圖3是根據本發明的一個實施例的網路附加記憶體晶片3〇〇 的框圖。該網路附加記憶體晶片3〇〇是一個安裝在先前描述的網 路附加記憶體印刷電路板(NAS PCB)上的積體電路。該網路附加 記憶體晶片300提供了一個或多個允許該網路附加記憶體做適當 操作的功能。該網路附加記憶體晶片300包括一個中央處理器 (CPU)304 ’ 一個片上隨機存取記憶體308,一個乙太網/MAC控制 器312,一個加密加速器316,一個安全/驗證、關鍵碼交換的DRM 晶片320及多個介面324、328、332、336、340。例如如下的介 面:USB設備介面324、PCI主機介面328、GPIO/LCD/互動媒體 介面332、ΑΤΑ介面336、USB主機介面340。該網路附加記憶 體晶片300可連接至圖2所示的一個或多個元件。 參照圖2,該網路附加記憶體可依靠其存儲及資料映射及分 段的要求來改變資料存儲驅動器或者硬碟驅動器的數量。根據不 同的使用類型,該網路附加記憶體可合併1,2,4個或更多的硬 碟驅動器。例如,適合於一個小型辦公室/商店的環境的網路附加 14 1274499 記輸拥4個硬碟_執行資料。ΜΗ 一個豕庭環境中,網路附加記憶體 /㈣1或2個硬碟驅動器, 从— 仔^里—般小於辦公室/前务環境所採A television or monitor that the user displays multimedia content. The network attached memory provides a storage device for receiving media content by one or more personal video recorders. Since the content is stored in the network attached memory, the tamping recorder may lack any data storage hardware such as a hard disk drive that is received by the network attached memory 100. Moreover, any personal processing equipment stored in other processing equipment can be easily stored by any of the data processing equipment. For example, there is no U-heb video recorder that can access a multimedia video recorder with a hard disk drive and store it in the multimedia memory of the network, and vice versa. As a result, the network attached memory 100 facilitates data sharing between the one or more data processing devices. Because it provides a central storage mechanism, the network attached memory 100 can be viewed as a virtual storage drive for the one or more data processing devices. The network attached memory 1 (8) is configured with an easily expandable storage capacity. In one embodiment, the network attached memory 1 can accept an additional hard disk drive. For example, a network attached memory 1 can accept one or more additional stone disk drives. Similarly, to accommodate future growth in data capacity, the network attached memory 100 provides a flexible storage mechanism that is easy to upgrade. In addition, the network attached memory 100 can provide data mapping and data segmentation functions. When the network attached memory 100 is first introduced into a typical switching device as shown in FIG. 1, one or more configuration parameters can be set. As part of the initialization process. In one embodiment, the parameter settings during the initialization process include the time, date, and time zone of the network add-on. The network additional memory, for example, can use the electronic computer shown in FIG. 1 as a reference original path additional storage device for setting its time, date and time zone to utilize any other data processing device as shown in FIG. (For example, a digital camcorder, a digital camera, a personal recording without a hard disk, a faceted crane, an MP3 player, or a PDA) can be used as a setting. Arrived. In one embodiment, the network attached memory setup process occurs after the network is physically connected to a network and recognized by an operating system (e.g., a Microsoft Windows operating system). Next, Figures 2 and 3 disclose an embodiment of a network attached memory system architecture. 2 is a block diagram of a network attached memory 2〇〇 in accordance with one embodiment of the present invention. The network attached memory 200 includes a printed f-board (_?8) 202 having one or more components. The one or more components are electrically connected through the printed circuit board 2〇2. The one or more components include a network attached memory chip 0丨-S〇C) 204, a random access memory, a flash memory 212, an alternating interface (1/F) 216, and a power supply 220. An interface module 224, a wireless transceiver/antenna module 228, one or more hard disk drives 232, and a control state (or processor) 236. The interface module 224 includes one or more of the following interfaces: IEEE 1394, USB, 10/100 Ethernet, Gigabit Ethernet, pCI, SATA, ΑΤΑ, IDE, SCSI, GPI0, and the like. The wireless transceiver/antenna module 228 can include a connectable module or mini PCI card that can be freely coupled to the network attached memory printed circuit board 2〇2. The number of the one or more hard disk drives 232 13 1274499 depends on the design of the network attached memory 200. The printed circuit board 2〇2 can be adapted to the number of configurations of the hard disk drive. The number of hard disk drives 232 employed may depend on whether the data provided by the additional memory 5 is mapped or segmented (i.e., RAID). In two embodiments, the controller 236 controls any elements that are communicatively coupled to the network attached memory die 204. The network attached memory chip 204 includes an integrated circuit chip that is used in conjunction with a processor or central processing unit (CPU) 240. 3 is a block diagram of a network attached memory chip 3A in accordance with one embodiment of the present invention. The network attached memory chip 3 is an integrated circuit mounted on the previously described network attached memory printed circuit board (NAS PCB). The network attached memory die 300 provides one or more functions that allow the network to attach memory for proper operation. The network attached memory chip 300 includes a central processing unit (CPU) 304', an on-chip random access memory 308, an Ethernet/MAC controller 312, a cryptographic accelerator 316, a security/authentication, key exchange. DRM wafer 320 and a plurality of interfaces 324, 328, 332, 336, 340. For example, the following interface: USB device interface 324, PCI host interface 328, GPIO/LCD/interactive media interface 332, UI interface 336, USB host interface 340. The network attached memory die 300 can be coupled to one or more of the components shown in FIG. Referring to Figure 2, the network attached memory can vary the number of data storage drives or hard disk drives depending on its storage and data mapping and segmentation requirements. Depending on the type of usage, the network attached memory can be combined with 1, 2, 4 or more hard drives. For example, a network add-on for a small office/shop environment 14 1274499 has lost 4 hard drives_execution data. ΜΗ In a court environment, the network attached memory / (four) 1 or 2 hard disk drives, from the _ _ ^ is less than the office / predecessor environment
二存_。_,_路__記航件也可根 據應用類型财咖改變。目__縣的增減資料存儲 相關的頻率要求的增加’網路附加記憶體的性能可根據其操作的 需求而通__體的对魏。例如,物_記憶體 或dram的容量來改進網路附加記憶體的處理性能。相似地,底 板的大小,電源電路及其他元件可以根據工作環境的要求來調整。 在一個典型的實施例t,該網路附加記憶體晶片⑽或300) 内部的該處理器24G能執行該RAM通或快閃記憶體212内部的 軟體或硬體。在-個魏财,賴的執行導輸贿程式所用 的協定(httpM司服器在促使期望的用戶介面顯示的用戶工作站(例 如用戶端工作站)提供頁面ϋ實施例中,該軟體被該處理器 240執行,該處理器240包括一個被作業系統(例如微軟Wind〇ws 作業系統)存取及辨認的配置文件,如此以使得其能被典型的微軟 Windows瀏覽器運行和瀏覽。在一個實施例中,在用戶完成對該 網路附加記憶體的初始化程式之前,該配置文件是可以存取的。 该初始化程式可包括生成一個或多個將來用來存取配置文件的驗 證密碼。微軟Windows作業系統可包括Windows XP、2000、ME、 98、袖珍型個人電腦或者類似的作業系統。當該配置文件被執行 時’通過點擊被微軟Windows劇覽器顯示的標案名,一個用戶介 15 1274499 面被顯示朗户雜處理設備。其後,用戶能提供 置參數或輸入以初始化或配置該網路附加存儲設備 用戶能提供一個或多個配 括如下内容:該網路&加記憶體的名稱、Second deposit _. _, _路__ 航 。 can also be changed according to the type of application. __ County's increase and decrease of data storage related to the increase in frequency requirements 'The performance of network-attached memory can be based on the needs of its operation. For example, the capacity of the memory/memory or dram improves the processing performance of the network attached memory. Similarly, the size of the backplane, power supply circuitry, and other components can be adjusted to the requirements of the work environment. In a typical embodiment t, the processor 24G within the network attached memory chip (10) or 300) can execute software or hardware within the RAM pass or flash memory 212. In the embodiment of Wei Wei, Lai's implementation of the bribery program (httpM server provides a page for the user workstation (such as the client workstation) that causes the desired user interface to be displayed. In the embodiment, the software is used by the processor. Executed 240, the processor 240 includes a configuration file that is accessed and recognized by a operating system (e.g., the Microsoft Windwss operating system) such that it can be run and browsed by a typical Microsoft Windows browser. In one embodiment The configuration file is accessible before the user completes the initialization program for the network attached memory. The initialization program may include generating one or more verification passwords for future access to the configuration file. Microsoft Windows operating system It can include Windows XP, 2000, ME, 98, Pocket PC or similar operating system. When the profile is executed, 'by clicking on the title of the file displayed by Microsoft Windows Player, a user interface 15 1274499 Display the Langmu miscellaneous processing device. Thereafter, the user can provide parameters or inputs to initialize or configure the network attached storage device. The user can provide one or more of the following: the name of the network & plus memory,
碼、一個或多個相應的、驗證輸入、時間、 網際網路協定地址。 官理員名字、管理員密 時區及網路時間伺服器 上圖4是根據本發明的一個實施例的有助於驗證存儲存取驗證 有效或無效的安全/驗t登德在丨丨由6^5 4, ΛΑϋιCode, one or more corresponding, verification input, time, internet protocol address. The official name, the administrator's secret time zone, and the network time server. FIG. 4 is a security/inspection that helps verify that the storage access verification is valid or invalid according to an embodiment of the present invention. ^5 4, ΛΑϋι
如微軟Windows劉覽器。在步驟棚,通過點擊該典型的 劉覽器用戶介面中的目錄,工作組目錄(典型的建立在胸_ 觀器中的)被用戶存取。在一個實施例中,該微軟胸_作業 馨 系、統提供一個識別及顯示任意被配置文件調用的資料處理設備。 每一個資料處理設備包括顯示給使用wind〇ws瀏覽器的用戶的配 敎件’例如’該貢料處理設備被一個或多個配置在該資料處理 設備中的軟體或硬體中的缺省的名字所識別。在步驟412,爲了 存取-個網路附加記憶、體配置文件,用戶通過點擊一適當的缺 省的被Windows瀏覽器工作組目錄顯示的網路附加記憶體名稱查 找並選擇一個顯示的網路附加記憶體。圖5是一個Wind〇ws劇覽 器的螢幕戴圖,其顯示一個具有典型缺省名字,VireshNAS的網路 附加記憶體目錄内容,該螢幕截圖在恤也嫩淡本發明一個實 16 1274499 施例的工作組目錄中選擇後再顯示。每個網路附加記憶體在生産 的時候被預先配置一個缺省的名字是可以預期到的。如圖5所示 的實施例,Viresh N乂S包括一個目錄樹,該目錄樹包括如下的目 錄:Bulk、config、Hi^iPerf、raidl、SafeData 和 punters。在步驟 416,用戶從該Viresh NAS的配置目錄中尋找合適的配置文件。 圖6是根據本發明的一個實施例的配置目錄中的一個或多個配置 文件的Windows瀏覽器的螢幕截圖。如圖所示,該配置目錄包括 一個Viresh NAS配置目錄,該Viresh NAS配置目錄包括兩個文 件一Configuration.html 及 ConfigurationFromWLAN.htm卜在這個 實施例中,該Configuration.html是關係到一個局域網用戶的介面 設置,而ConfigurationFromWLAKhtml是關係到一個無線網路用 戶的介面設置。在步驟420,適當的配置文件被點擊執行。該配 置文件的執行允許一個被網路附加記憶體提供的服務程式所用的 ' .· :- ....... . 協定(http)伺服器提供一個存在用戶端工作站(或資料處理設備)的 W 覽态,該劉覽器可包括 Netscape Navigator、Internet Explorer 或 其他類似的網路瀏覽器。該瀏覽器通知用戶該配置文件正在執行 如圖7所示的命令。圖7是本發明一個實施例的配置文件正在執 行命令的Netsacpe螢幕截圖。其後,該配置文件生成一個用戶介 面(在頁面被服務程式所用的協定(http)伺服器(例如網路附加記憶 體)提供後),該用戶介面允許用戶輸入不同的管理參數。圖8是本 發明一個實施例用戶介面的瀏覽器螢幕截圖,該用戶介面允許用 戶輸入一個或多個管理參數。用戶可以配置或輸入一個或多個管 17 1274499 理參數’該管理參數啓動或禁止一個或多個安全/驗證機制。在如 圖4所示的步驟心用戶通過選擇來啓動或者禁止該安全/驗證 機制。例如,用戶可以從用戶介面提供的“下拉,,ϋ域中選擇兩 者(啓動或禁止)之一。'Such as Microsoft Windows browser. In the step store, the workgroup directory (typically built in the chest) is accessed by the user by clicking on the directory in the typical browser user interface. In one embodiment, the Microsoft Office provides a data processing device that identifies and displays any configuration file calls. Each of the data processing devices includes a configuration that is displayed to a user using the wind 〇 ws browser 'eg, the tributary processing device is defaulted by one or more software or hardware configured in the data processing device The name is recognized. In step 412, in order to access the network-attached memory and body profile, the user finds and selects a displayed network by clicking on an appropriate default network-attached memory name displayed by the Windows Explorer Workgroup Directory. Additional memory. Figure 5 is a screen shot of a Wind〇ws projector showing a network attached memory directory with a typical default name, VireshNAS. The screenshot is also light in the shirt. The invention is a real 16 1274499 Displayed in the workgroup directory and then displayed. Each network attached memory is pre-configured with a default name at the time of production that is expected. In the embodiment shown in Figure 5, Viresh N乂S includes a directory tree that includes the following directories: Bulk, config, Hi^iPerf, raidl, SafeData, and punters. At step 416, the user looks for a suitable configuration file from the configuration directory of the Viresh NAS. Figure 6 is a screenshot of a Windows browser configuring one or more profiles in a directory, in accordance with one embodiment of the present invention. As shown, the configuration directory includes a Viresh NAS configuration directory. The Viresh NAS configuration directory includes two files, Configuration.html and ConfigurationFromWLAN.htm. In this embodiment, the Configuration.html is related to a LAN user. The interface is set, and ConfigurationFromWLAKhtml is the interface setting that is related to a wireless network user. At step 420, the appropriate configuration file is clicked to execute. The execution of this configuration file allows a service program provided by the network attached memory to use '.· :- ....... . The protocol (http) server provides a presence client workstation (or data processing device) The browser can include Netscape Navigator, Internet Explorer or other similar web browsers. The browser notifies the user that the configuration file is executing the command shown in Figure 7. Figure 7 is a screenshot of a Netsacpe screen in which a configuration file is executing a command in accordance with one embodiment of the present invention. Thereafter, the configuration file generates a user interface (after the page is provided by the protocol (http) server (e.g., network attached memory) used by the service program), which allows the user to enter different management parameters. Figure 8 is a screenshot of a browser of a user interface in accordance with one embodiment of the present invention that allows a user to enter one or more management parameters. The user can configure or enter one or more tubes 17 1274499 Parameters 'This management parameter enables or disables one or more security/authentication mechanisms. In the step shown in Figure 4, the user initiates or disables the security/authentication mechanism by selection. For example, the user can select one of the two (start or disable) from the drop-down, in the user interface provided by the user interface.
旧圖9是本發日月一個實施例網路附加記憶體9〇〇與執行機構_ 此口使用的框圖。圖9顯示了該網路附加記憶體9〇〇中的一個戋 多個設備的多種可能的連接。概行謝冓_包括—個利於撕 -個或多個安全/驗證功能的設備或機制。在一個典 中,該-個或多個安全/驗證功能包括接收一個該網路附加=體 9〇〇用戶的物理輸入。例如’該執行機構9〇4可包括一個1置在1 網路附加記憶㈣上的可碰._。概行機構料 連接至或合舰如_ 2職的娜___ 在一個典型的細中,該執行機構9〇4包括一細於啓動= 在棚路附加記憶體的-個或多_料細區____ : 當被按下時’該删允觸戶通過在:段時間_人_個或多個 參數以自我驗證。該-個或多個參數可包括—個用戶及一個或多 個密碼。例如,該酬可以爲機械魏錢啓動。―個管理員用 戶可給該網路附加記憶體設定輸入時間的長短。 5 、 ______二的執行可侧 於官理和/或配置該網路附加記憶體_ 戶’丨面的顯示。在一 ^性的侧巾,該輯概祕1物提供用於配 置女全/驗證機制的用戶介面的配置文株。 ^ _戶介面可允許用戶 18 1274499 啓動或禁止該執行機構及其驗證機制。 如果在ττ亥執行機構被執行後,如果有一個或多個驗證輸入在 -段時間峨提供,¥發_不财面可允許對存儲於該網路附 加記憶體900的資料的存取。對資料的存取可包括讀、修改或寫 該資料存儲設備巾㈣料。當制雜按下時,職行機構· 可運行一段時間。該時間可被管理員規劃或設置,例如,在一個 _ 代表性的實施例中,用戶必須在該執行機構904回復它的非執行 狀態之前初始化對存儲於該網路附加記憶體9〇〇的資料的存取。 例如’只要用戶(使用其計算設備)存取的資料在開關被按下之後的 該段時間内,用戶將被成功驗證。其後,例如,用戶可繼續獲得 對存儲在棚路附加記憶體9〇〇的資料的存取直到其停止其對 治。用戶可以通過退出該網路附加記憶體_停止其對話。可選 地’用戶的對話可在—段特定的時間(如被管理員預先設定的)消逝 鲁 亭止例如,在成功的驗證發生後,管理員可設置時間的持續 期,在持續期内,用戶可存取網路附加記憶體900中的-個或多 個共用或一個或多個資料庫。 在一個代表性的實施例中,在該執行機構904被啓動後,在 訪對存儲在資料共用區的資料的存取發生之前,用戶可能需要在 —段時間内輸入用戶名和一個或多個密碼。@此,在該執 ^ _動後,用戶可能需要在—段軸輸入用戶名和—個或 多個密碼。例如’被存取的#料可包括存儲在一個或多個資料丘 用區中的資料。例如,該資料可以是位於—㈣料制區的一個 19 1274499 或多個共用文件(或共用目錄)中的資料。 ia苔&^;^機構904被描述成該網路附加記憶體9〇〇的一部 本考X明的一些方面也提供一個該網路附加記憶體9〇〇外部的 ’該執行機穩以一種或多種麵的通信方式連接至該網 路附加孤體900。例如,一個外部的典型的執行機構可通過無 線和/或有線通信連接至該網路附加記憶體。該通信可使用一 φ 個或多個驗證和加密機制而産生。 本發明提供的不同方面的驗證細可用於—贼多個資料存 取方法和/或系統的組合的實施例中,可參見·5年2月3日申請 的美國專利申睛,其申請序列號爲H/_72,標題爲“控制對存 儲於貝料存儲設财的㈣的存取的祕及方法”,(代理編號 可&合用於此處。例如,如果本發明的 該驗證機制(也就是圖9所示的執行機構9〇4)被優先用於以該網路 _ 附加記憶體獅介面類型的方式調用選擇性地執行對存儲_網 _加—體_中的雜的存取,對轉 體900中的資料的存取可能發生。 本發明的不同方面可允許-個執行機構(例如圖9所示的執行 機構904)被祕校驗或驗證最近引入網路設備。當一個新設備被 加入網路時,該執行機構可被按壓以初始化最近連接的設備的校 驗或驗證。如果最近連接的設備被成功驗證,那麼,該最近連接 的設備可以被允許存取存儲例如-個網路附加記憶體中的資料。 以上是結合一定的實施例對本發明的描述,對本領域的技術 20 1274499 人員來说,對本發明的各種更換和等效替換都未脫離本發明的保 護範圍。任何根據本發明公開的内容進行的具體環境和材料的修 改均爲脫離本發曰月的知護範圍。本發明的麵並非僅限於前述已 公開的具體實綱,喻私從屬糊要絲傾範_的具體 實施例都屬於本發明的内容。 相關申諳及參考立件 本申睛參考及主張美國臨時專利申請“允許存取存儲於資料 處理設備中的資料的驗證機制,,的優先權,其申請號爲 60/562829,申請日爲2〇〇4年4月15曰,通過參考其全部而將其完整 的主題結合於此處。 本申請參考: 美國申請號爲11/049905 (代理人號爲15673US02 ),申請曰爲 2005年2月3日; 美國申請號爲__(代理人號爲15675US03),申請曰爲 2005年3月22日; _ 美國申請號爲·_(代理人號爲15679US02),申請曰爲 2005年4月8日; 美國申請號爲·_(代理人號爲15681US02),申請曰爲 2005年3月30日; 美國申請號爲11/049772 (代理人號爲15682US02 ),申請曰爲 2005年2月3日; 美國申請號爲11/049798 (代理人號爲15683US02),申請日爲 21 1274499 2005年2月3日; 美國申請號爲-(代理人號爲15684US02 ),申請曰爲 2005年3月22日;又 美國申請號爲11/049768 (代理人號爲15685US02 ),申請曰爲 2005年2月3日; 通過參考其全部而將其完整的主題結合於此處。 【圖式簡單說明】 圖1疋根據本發明的一個實施例的使用網路附加記憶The old figure 9 is a block diagram of an embodiment of the network add-on memory 9 〇〇 and the actuator _ this port. Figure 9 shows the various possible connections of one or more of the network attached memories. Xie 冓 _ includes a device or mechanism that facilitates tearing one or more security/verification functions. In one code, the one or more security/authentication functions include receiving a physical input of the network attached user. For example, the actuator 9〇4 may include a touchable ._1 placed on the 1 network attached memory (4). The general organization is connected to the naval ship such as _ 2 ___ In a typical detail, the actuator 9〇4 includes a finer than the start = additional memory in the shed road - or more Zone ____: When pressed, the user is allowed to self-verify by: _ person_s or more parameters. The one or more parameters may include - a user and one or more passwords. For example, the reward can be initiated for mechanical Wei Qian. ― An administrator can set the length of the input time for the network attached memory. 5, ______ 2 execution can be side-by-side and/or configured to display the network attached memory _ user's face. In a sexual side scarf, the collection provides a configuration file for the user interface for configuring the female full/verification mechanism. ^ The _ user interface allows the user 18 1274499 to activate or deactivate the actuator and its authentication mechanism. If, after execution of the ττH executing mechanism, if one or more verification inputs are provided during the time period, the _ _ no financial face may allow access to the data stored in the network attached memory 900. Access to the material may include reading, modifying, or writing the data storage device. When the press is pressed, the front office can run for a while. This time can be planned or set by the administrator, for example, in a representative embodiment, the user must initiate initialization of the additional memory stored in the network before the executing mechanism 904 replies to its non-executing state. Access to data. For example, as long as the user accesses the data (using his computing device) for the period of time after the switch is pressed, the user will be successfully authenticated. Thereafter, for example, the user can continue to gain access to the material stored in the shed add-on memory until it stops its treatment. Users can stop their conversation by leaving the network attached to the memory. Optionally, the 'user's conversation can be lapsed at a specific time (as preset by the administrator). For example, after a successful verification occurs, the administrator can set the duration of the time, during the duration, The user can access one or more shares or one or more databases in the network attached memory 900. In a representative embodiment, after the execution of the execution mechanism 904, the user may need to enter the username and one or more passwords for a period of time before accessing the access to the material stored in the data sharing area occurs. . @这, after the move, the user may need to enter the username and one or more passwords on the - segment axis. For example, the material being accessed may include data stored in one or more data fields. For example, the material may be one of 19 1274499 or a plurality of shared files (or shared directories) located in the - (4) material area. The ia moss &^; ^ mechanism 904 is described as a part of the network attached memory 9 本 X Ming also provides a network attached memory 9 〇〇 external 'the execution is stable The network add-on orphan 900 is connected in one or more aspects of communication. For example, an external, external actuator can be connected to the network attached memory via wireless and/or wired communication. This communication can be generated using one or more verification and encryption mechanisms. The verification of the different aspects provided by the present invention can be used in the embodiment of the combination of multiple data access methods and/or systems of the thief, and the application serial number of the US patent application filed on February 3, 2005. For H/_72, the title is "Controlling the secret method of access to (4) stored in the bait storage." (Proxy number can be used together. For example, if the verification mechanism of the present invention (also That is, the actuator 9〇4) shown in FIG. 9 is preferentially used to selectively perform the access to the memory in the storage_network_addition_body in the manner of the network_addition memory lion interface type. Access to material in the swivel 900 may occur. Different aspects of the present invention may allow an actuator (such as the actuator 904 shown in Figure 9) to be secretly verified or verified to be recently introduced into the network device. When the device is added to the network, the actuator can be pressed to initiate verification or verification of the most recently connected device. If the most recently connected device is successfully authenticated, then the recently connected device can be allowed to access the storage, for example Network attached memory The above is a description of the present invention in combination with certain embodiments, and the various alternatives and equivalents of the present invention are not departing from the scope of the present invention. The specific circumstances and materials modified are all out of the scope of this issue. The aspects of the present invention are not limited to the specific embodiments disclosed above, and the specific embodiments of the private subordinates are The content of the present invention. Related Application and References The present application and claims the priority of the US Provisional Patent Application "Allowing access to the authentication mechanism of data stored in a data processing device", the application number is 60/562829, The application date is April 15th, 4th, 4th, and the full theme is incorporated here by reference. All of the references are: US Application No. 11/049905 (Attorney No. 15673US02), the application is February 3, 2005; US application number is __ (agent number is 15675US03), application number is March 22, 2005; _ US application number is _ (proxy number 15679US02), Please refer to April 8, 2005; US application number is _ (proxy number 15681US02), application number is March 30, 2005; US application number is 11/049772 (agent number 15682US02), application曰 is February 3, 2005; US application number is 11/049798 (proxy number 15683US02), application date is 21 1274499 February 3, 2005; US application number is - (agent number 15684US02), application The date is March 22, 2005; the US application number is 11/049768 (proxy number 15685US02), and the application number is February 3, 2005; the full subject matter is incorporated herein by reference. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a network attached memory according to an embodiment of the present invention.
AttachedSt〇rageDevice,NAS)的典型的系統框圖。 圖2疋根據本發明的一個實施例的網路附加記憶體的框圖。 圖3疋根據本發明的一個實施例的網路附加記憶體晶片^AS〇c)的 框圖。 圖4是根據树嘛—個實_时助概證射赫取酬有效或 無效的驗證機制中的程式的操作流程圖。 圖5是-個Windows瀏覽器的蝥幕截圖,其顯示了一個具有^型缺 省名字Viresh NAS的網路附加記憶體目錄内容,該榮幕麵在A typical system block diagram of Attached St〇rageDevice, NAS). 2 is a block diagram of a network attached memory in accordance with one embodiment of the present invention. Figure 3 is a block diagram of a network attached memory chip ^AS〇c) in accordance with one embodiment of the present invention. Fig. 4 is a flow chart showing the operation of the program in the verification mechanism based on whether the tree is valid or invalid. Figure 5 is a screenshot of a Windows browser showing the contents of a network attached memory directory with the default name of the Viresh NAS.
Viresh NAS從根據本發明的一個實施例的工作組目錄中被選擇後 再被顯示。 圖6是根據本發明的-個實施例的配置目錄中的一個或多個配置文 件的Windows瀏覽器的螢幕截圖。 圖7是根據本發明的-個實施例的配置文件正在執行命令的 22 1274499The Viresh NAS is selected from the workgroup directory in accordance with one embodiment of the present invention and then displayed. 6 is a screenshot of a Windows browser of one or more configuration files in a configuration directory in accordance with an embodiment of the present invention. Figure 7 is a configuration file in accordance with an embodiment of the present invention executing a command 22 1274499
NetsacPe螢幕截圖。 :_據本發明的—個實齡咖戶介面的趣器營幕截圖 戶介面允許用戶輸'入-個或多個管理來數。 ,該 51疋根據本發明的一翻實施例的網路附加記憶體與執行機構混合 使用的框圖。 【主要元件符號說明】 # 網路附加記憶體100、200 一個或多個元件的印刷電路板(NASPCB) 202 NAS晶片(NASoC) 204 隨機記憶體208 快閃記憶體212 AC電源介面 216 電源220 介面塊224 無線收發信機/天線模組228 —個或多個硬碟驅動器232 控制器236 央處理單元(cpu) 240 ⑩ NAS晶片(NASoC) 300 中央處理單元(CPU) 304 晶片内隨機記憶體308 乙太網/MAC控"制器312 流型AES加密加速器316 一個安全/鑒定、密钥的交換、DRM晶片320 USB 設備 I/F 324 PCI 主機 I/F 332 GPIO/LCD/快閃記憶體媒體I/F328 ΑΤΑ 介面 336 USB 主機 I/F 340 網路附加記憶體900 執行機構904 23Screenshot of NetsacPe. : _ According to the invention, a real-life café interface screenshot of the user interface allows the user to input 'in-one or more management numbers. 51 is a block diagram of a network attached memory and an actuator in accordance with an embodiment of the present invention. [Main component symbol description] # Network additional memory 100, 200 One or more components of the printed circuit board (NASPCB) 202 NAS chip (NASoC) 204 Random memory 208 Flash memory 212 AC power interface 216 Power 220 interface Block 224 Wireless Transceiver/Antenna Module 228 - One or More Hard Disk Drives 232 Controller 236 Central Processing Unit (CPU) 240 10 NAS Chip (NASoC) 300 Central Processing Unit (CPU) 304 Intra Wafer Random Memory 308 Ethernet/MAC Control"System 312 Streaming AES Encryption Accelerator 316 A Security/Authentication, Key Exchange, DRM Chip 320 USB Device I/F 324 PCI Host I/F 332 GPIO/LCD/Flash Memory Media I/F 328 介 Interface 336 USB Host I/F 340 Network Attached Memory 900 Actuator 904 23
Claims (1)
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US56282904P | 2004-04-15 | 2004-04-15 | |
| US11/049,772 US8543737B2 (en) | 2004-05-12 | 2005-02-03 | System and method to control access to data stored in a data storage device |
| US11/049,768 US20050262322A1 (en) | 2004-05-21 | 2005-02-03 | System and method of replacing a data storage drive |
| US11/049,798 US7555613B2 (en) | 2004-05-11 | 2005-02-03 | Storage access prioritization using a data storage device |
| US11/049,905 US20050235336A1 (en) | 2004-04-15 | 2005-02-03 | Data storage system and method that supports personal video recorder functionality |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW200605591A TW200605591A (en) | 2006-02-01 |
| TWI274499B true TWI274499B (en) | 2007-02-21 |
Family
ID=38624417
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW94111914A TWI274499B (en) | 2004-04-15 | 2005-04-14 | Authentication mechanism permitting access to data store in a data processing device |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI274499B (en) |
-
2005
- 2005-04-14 TW TW94111914A patent/TWI274499B/en not_active IP Right Cessation
Also Published As
| Publication number | Publication date |
|---|---|
| TW200605591A (en) | 2006-02-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN100555298C (en) | The method and apparatus of virtulizing personal office environment | |
| US7246226B1 (en) | Method and apparatus rendering user accounts portable | |
| JP5992524B2 (en) | Granting resource access | |
| US8769131B2 (en) | Cloud connector key | |
| EP2572309B1 (en) | Host device and method for accessing a virtual file in a storage device by bypassing a cache in the host device | |
| US9137244B2 (en) | System and method for generating one-time password for information handling resource | |
| TW201212617A (en) | Host device and method for securely booting the host device with operating system code loaded from a storage device | |
| JP2009087124A (en) | Storage device and storage device access control method | |
| US20050235364A1 (en) | Authentication mechanism permitting access to data stored in a data processing device | |
| JP2010536193A (en) | System and method for selecting, distributing and playing back alarm sounds in networked audiovisual devices | |
| JP2011526028A (en) | Authentication method for temporary storage device using multiple authentication silo | |
| US20120179915A1 (en) | System and method for full disk encryption authentication | |
| CN104246698A (en) | Computer with flexible operating system | |
| KR20100096090A (en) | Mobile smartcard based authentication | |
| CN106462678A (en) | Systems and methods for providing authentication using a managed input/output port | |
| CN1377481A (en) | Removable active, personal storage device, system and method | |
| TW201234198A (en) | User identity attestation in mobile commerce | |
| JP2016502338A (en) | Network connection parameter setting method, apparatus, network facility, program, and recording medium | |
| TW201007469A (en) | Computer with remote mangement system | |
| JP4279856B2 (en) | Information transfer method and computer | |
| TW201843616A (en) | Data center with data encryption and operating method thererfor | |
| TWI274499B (en) | Authentication mechanism permitting access to data store in a data processing device | |
| TW201335789A (en) | Secure information access over network | |
| KR100502612B1 (en) | Usb apparatus having a remote control function and remote controlling method thereof | |
| CN113761599B (en) | Solid state disk encryption method, device, readable storage medium and electronic equipment |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | Annulment or lapse of patent due to non-payment of fees |