摘要:
Updating firmware stored in a rewritable non-volatile memory as a plurality of firmware code images having position dependent code. A plurality of update code images are made available that have position dependent code specifying positions of a rewritable non-volatile memory, such that each update code image is suitable for replacing a different stored code image. A computer processor determines which stored code image is to be updated; and selects the one of the plurality of update code images that has position dependent code suitable for replacing the code image to be updated.
摘要:
An apparatus and method are disclosed for managing component identifiers in a data storage system. The apparatus includes a recognition module, a receiving module, a comparison module, and an update module. The recognition module recognizes newly installed components. The receiving module receives a component identifier stored on the newly installed component. The comparison module compares the identifier of the newly installed component with one or more component identifiers stored in a computer system memory. The update module updates the one or more component identifiers stored in the system memory based upon the identifier of the newly installed component.
摘要:
An apparatus, system, and method are disclosed for managing control path commands in an automated data storage library. The present invention teaches a data storage library with stored data and at least one controller. The present invention also teaches at least one command source that provides commands to the data storage library via at least one control path. The data storage library stores a last successful command for each control path in the data storage library, receives a new command from a control path, compares the new command with one or more of the last successful commands, and executes the new command if the new command is unique.
摘要:
Provided are a method, system, and article of manufacture for rekeying encryption keys for removable storage media. A rekey request is received for a coupled removable storage media, wherein encryption on the coupled removable storage media uses a first key and wherein the rekey request indicates a second key. The first key and the second key are accessed in response to the rekey request. The first key is used to perform decryption for the coupled removable storage media and the second key is used to perform encryption for the coupled removable storage media.
摘要:
An apparatus, system, and method are disclosed for backing up vital product data for a data processing device. A communication module establishes a communications channel with a maintenance module of a service center. The service center remotely supports the data processing device. A backup module copies vital product data to the maintenance module and the maintenance module maintains the vital product data copy. In one embodiment, a restore module receives a command to restore the vital product data copy. The communication module establishes the communications channel between the restore module and the maintenance module and the maintenance module copies the vital product data copy to the restore module.
摘要:
A system and a computer program product are disclosed for eliminating access to data on removable storage media of a removable storage media cartridge. The system comprises a data storage drive that stores a key on the removable storage media cartridge, such that data on the removable storage media is accessible with the key. Upon receiving a command to eliminate access to data on the removable storage media the data storage drive shreds the key such that access to data on the removable storage media is eliminated.
摘要:
A system is provided to perform a key path diagnostic that aids in isolating an error within the encryption storage system. The system includes at least one drive, a key proxy, a key server, a key manager, and a processor. The processor performs a first communication test on a path between the key proxy and the drive. The first communication test verifies that the path between the drive and the key proxy is operational. The processor performs a second communication test on a path between the key proxy and the key server. The second communication test verifies that the path between the key proxy and the key server is operational. In addition, processor sends a command to the key manager to attempt communication with the key manager. The communication attempt verifies the installation and configuration parameters related to the key manager.
摘要:
In an automated data storage library, selective encryption for data stored or to be stored on removable media is provided. One or more encryption policies are established, each policy including a level of encryption one or more encryption keys and the identity of one or more data cartridges. The encryption policies are stored in a policy table and the encryption keys are stored in a secure key server. A host requests access to a specified data cartridge and the cartridge is transported from a storage shelf in the library to a storage drive. Based on the identity of the specified cartridge the corresponding encryption policy is selected from the table and the appropriate encryption key is obtained from the key server. The storage drive encrypts data in accordance with the key and stores the data on the media within the specified data cartridge.
摘要:
Provided are a method, system, and article of manufacture for rekeying encryption keys for removable storage media. A rekey request is received for a coupled removable storage media, wherein encryption on the coupled removable storage media uses a first key and wherein the rekey request indicates a second key. The first key and the second key are accessed in response to the rekey request. The first key is used to perform decryption for the coupled removable storage media and the second key is used to perform encryption for the coupled removable storage media.
摘要:
An automated data storage library provides for reducing inventory after media access. Media is moved, inserted, or removed without opening the access door normally associated with accessed media. A media status of a data storage drive within the automated data storage library is checked. An unexpected condition is detected at the data storage drive. An inventory of at least part of the library is performed for the unexpected condition. Alternately, a move operation is initiated for a data storage media wherein an unexpected condition is detected at the source and/or target location of the move operation. An inventory of at least part of the library is performed for the unexpected condition. In either embodiment, the unexpected condition includes a state of the automated data storage library which is inconsistent with a library database, such as a presence or absence of a data storage media in the location, or a data storage media in the location having an identifier which is inconsistent with the library database. The automated data storage library is brought back on-line after performing the inventory.