摘要:
An optical medium associated with a first type of optical drive laser, such as a blue laser, embeds identification information readable by a second type of optical drive laser, such as a red laser associated with DVD media or an IR laser associated with CD media, in order to reduce the time used by the optical drive to recognize media. An attempt to read the embedded identification information by the second laser that succeeds provides the optical drive with the information to proceed with use of the optical medium using the first laser. An attempt to read the embedded identification information that fails provides the optical drive with the opportunity to detect whether the optical medium is associated with the second laser so that a single spindle kick of the optical medium by the optical drive determines whether the optical medium is associated with either of two types of lasers.
摘要:
Systems and methods for reducing problems and disadvantages associated with traditional approaches to data and program storage on an information handling system are provided. A method may include determining if a primary storage resource has a failure. The method may further include, in response to determining that the storage resource does not have a failure: booting from a first operating system stored on the primary storage resource, monitoring data stored to the primary storage resource to identify data to be copied to a persistent storage resource, and copying the identified data to the persistent storage resource. The method may further include, in response to determining that the storage resource has a failure: booting from a second operating system stored on the persistent storage resource, and via the second operating system, providing access to the copied identified data copied to the persistent storage resource.
摘要:
An optical disc drive reads identification information from an optical disc inserted in the drive in a label orientation having a label side presented to the optical disc drive laser by reading codes marked at the opposing storage side in a transparent region or marked on the label side oriented to be read from the storage side. The identification information is used to determine the ability and authority of the optical disc to have a label written on the label surface. For instance, label authorization is determined from authorization information embedded on the storage side of the optical disc when the optical disc is in a storage orientation and the label authorization is saved on an associated information handling system with reference to the identification information to allow authorization to be determined when the optical disc is in the label orientation.
摘要:
A system and method is disclosed for authenticating a removable data storage device (RDSD) by using a trusted information module (TIM) to control access to data files stored on the RDSD. A security information input receiver receives identity verification factors from a user and provides the identity verification factors to the TIM for processing. In some embodiments of the invention, the TIM uses identity verification factors in cryptographic operation to authenticate the user, the RDSD and the information processing system to each other. The TIM then performs similar operations with the contents of one or more authorization files to control access and usage of the data files stored on the RDSD.
摘要:
A system and method is disclosed for authenticating a removable data storage device (RDSD) by implementing a removable trusted information module (TIM) comprising a non-volatile storage medium operable to securely store passwords, digital keys, digital certificates and other security credentials (“security credentials”). An RDSD enclosure comprising a disk storage drive, one or more interfaces, one or more connectors, and a TIM is implemented to be connected, disconnected and reconnected to a plurality of predetermined information handling systems. The RDSD is authenticated by the TIM initiating comparison and cryptographic operations between its contents and the contents of authentication files comprising the RDSD. Once the RDSD has been authenticated, the TIM performs similar operations to authorize access and usage of its contents by the information handling system. Other cryptographic operations are performed to determine whether the integrity of data files has been compromised. Removal of the TIM prevents an information handling system from accessing the contents of the RDSD.
摘要:
A method, system and apparatus for testing a removable storage media drive device are disclosed. According to teachings of the present disclosure, a simulated storage media may be disposed within a removable storage media drive device. In the event removable storage media is not present in the drive device when testing of the device is desired, the simulated storage media may be substituted for at least purposes of testing the operability of one or more device components. In one embodiment, the simulated storage media may be in the form of an annular ring of CD-ROM material. In a further embodiment, the simulated storage media may be in the form of a hologram designed to mimic one or more removable storage media characteristics.
摘要:
Zoned initialization of a solid state drive is provided. A solid state memory device includes a controller for controlling storage and retrieval of data to and from the device. A set of solid state memory components electrically coupled to the controller. The set is electrically divided into a first zone and a second zone, wherein the first zone is at least partially initialized independent from the second zone. An interface is coupled between the controller and the set of solid state memory components to facilitate transfer of data between the set of solid state memory components and the controller.
摘要:
Zoned initialization of a solid state drive is provided. A solid state memory device includes a controller for controlling storage and retrieval of data to and from the device. A set of solid state memory components electrically coupled to the controller. The set is electrically divided into a first zone and a second zone, wherein the first zone is at least partially initialized independent from the second zone. An interface is coupled between the controller and the set of solid state memory components to facilitate transfer of data between the set of solid state memory components and the controller.
摘要:
A system and method is disclosed for visually communicating disk storage meta information comprising a removable data storage device (RDSD). An RDSD enclosure comprising a disk storage drive, input/output interface, one or more connectors, a storage information module (SIM), a power storage device, and a display is implemented to be connected, disconnected and reconnected to a plurality of predetermined information handling systems. The RDSD is connected to a predetermined information handling system and the SIM gathers information from a plurality of disk information files comprising the RDSD. Once gathered, this information is visually communicated via the SIM to a display comprising the RDSD. When connected to, and powered by, an information handling system, the displayed information is dynamically updated as the operational status of the RDSD changes, but becomes static when RDSD is disconnected. Mechanical switches or a touch sensitive screen are implemented to navigate static and dynamic disk information displayed on the RDSD display. Disk information that was current when the RDSD was last connected to an information handling system is persistently displayed on a display powered by battery.
摘要:
A system and method is disclosed for authenticating a removable data storage device (RDSD) by implementing a removable trusted information module (TIM) comprising a non-volatile storage medium operable to securely store passwords, digital keys, digital certificates and other security credentials (“security credentials”). An RDSD enclosure comprising a disk storage drive, one or more interfaces, one or more connectors, and a TIM is implemented to be connected, disconnected and reconnected to a plurality of predetermined information handling systems. The RDSD is authenticated by the TIM initiating comparison and cryptographic operations between its contents and the contents of authentication files comprising the RDSD. Once the RDSD has been authenticated, the TIM performs similar operations to authorize access and usage of its contents by the information handling system. Other cryptographic operations are performed to determine whether the integrity of data files has been compromised. Removal of the TIM prevents an information handling system from accessing the contents of the RDSD.