G11B20/00123

Method and apparatus for information carrier authentication

The present invention relates to a method of enabling authentication of an information carrier, the information carrier comprising a writeable part and a physical token arranged to supply a response upon receiving a challenge, the method comprising the following steps; applying a first challenge to the physical token resulting in a first response, and detecting the first response of the physical token resulting in a detected first response data, the method being characterized in that it further comprises the following steps; forming a first authentication data based on information derived from the detected first response data, signing the first authentication data, and writing the signed authentication data in the writeable part of the information carrier. The invention further relates to a method of authentication of an information carrier, as well as to devices for both enabling authentication as well as authentication of an information carrier.

System and Method for Encrypted Disk Drive Sanitizing

A system and method for first changing the encryption key on a self-encrypting disk drive followed by a complete disk wipe. Either process can be separately performed, and they can be performed in any order. In fact, one embodiment of the invention, resets the symmetric key, wipes the disk a predetermined number of times with different predetermined data patterns, and then resets the key a second time. This assures that there is absolutely no way to recover the original key or to read the original plain text data, even if some of it's encrypted values remain on unallocated tracks after wiping. A user can be assured that in milliseconds after starting the wiping process, the entire disk is rendered unreadable and unrecoverable. Verifiable data can be pre-written to a device that is later read back to assure that wiping or firmware-based erase commands have worked.

Data security system that uses a repeatable magnetic signature as a weak entropy source

Apparatus and method for data security in a data storage device. In some embodiments, an alternating pattern is written to a magnetic recording medium as a sequence of symbols at a selected clock rate. A repeatable magnetic signature is generated by reading the alternating pattern from the medium, the magnetic signature having relatively weak entropy at boundaries of the symbols. A multi-bit digital sequence is extracted from the repeatable magnetic signature, the digital sequence having relatively strong entropy. The digital sequence is stored in a separate memory coupled to the medium. Access to data stored on the medium is authenticated responsive to the digital sequence stored in the separate memory.

System and method for tape layout optimization

A magnetic tape for use in a tape drive includes a plurality of tracks and a plurality of media defect characteristics. The plurality of tracks are laid out along a length of the magnetic tape, each of the plurality of tracks being configured to receive data that is organized into a plurality of fixed-size subdata sets each including a plurality of codeword interleaves. The data is laid out on the plurality of tracks in accordance with a tape layout allocation strategy as determined by a tape layout module. The tape layout module includes a tape layout optimization system that receives information on the plurality of media defect characteristics, the tape layout optimization system determining the tape layout allocation strategy based at least in part on at least one of the plurality of media defect characteristics; and the tape layout optimization system determining the tape layout allocation strategy further based on distance spectra between pairs of the plurality of codeword interleaves.

SYSTEM AND METHOD FOR TAPE LAYOUT OPTIMIZATION
20190027186 · 2019-01-24 ·

A tape layout module for determining a tape layout allocation strategy for laying out data on tape, the data being organized into a plurality of fixed-size subdata sets with each of the plurality of subdata sets including a plurality of codeword interleaves, the tape including a plurality of media defect characteristics, includes a tape layout optimization system including a processor that receives information on the plurality of media defect characteristics. The tape layout optimization system determines the tape layout allocation strategy based at least in part on at least one of the plurality of media defect characteristics. Additionally, the tape layout optimization system can determine the tape layout allocation strategy further based on distance spectra between pairs of the plurality of codeword interleaves. Further, the tape layout optimization system can determine the tape layout allocation strategy by selectively utilizing at least one tape layout parameter.

Optical disc authentication by interferometric fingerprinting

Authentication of discs occurs by the use of interferometric authentication data. Such authentication data of a data disc is generated based on an interference pattern associated with thickness variations of a material layer on the disc. The interference pattern represents a unique fingerprint that can be used for authentication of individual discs.

System and method for tape layout optimization

A tape layout module for determining a tape layout allocation strategy for laying out data on tape, the data being organized into a plurality of fixed-size subdata sets with each of the plurality of subdata sets including a plurality of codeword interleaves, the tape including a plurality of media defect characteristics, includes a tape layout optimization system including a processor that receives information on the plurality of media defect characteristics. The tape layout optimization system determines the tape layout allocation strategy based at least in part on at least one of the plurality of media defect characteristics. Additionally, the tape layout optimization system can determine the tape layout allocation strategy further based on distance spectra between pairs of the plurality of codeword interleaves. Further, the tape layout optimization system can determine the tape layout allocation strategy by selectively utilizing at least one tape layout parameter.

Data Security System That Uses a Repeatable Magnetic Signature as a Weak Entropy Source

Apparatus and method for data security in a data storage device. In some embodiments, an alternating pattern is written to a magnetic recording medium as a sequence of symbols at a selected clock rate. A repeatable magnetic signature is generated by reading the alternating pattern from the medium, the magnetic signature having relatively weak entropy at boundaries of the symbols. A multi-bit digital sequence is extracted from the repeatable magnetic signature, the digital sequence having relatively strong entropy. The digital sequence is stored in a separate memory coupled to the medium. Access to data stored on the medium is authenticated responsive to the digital sequence stored in the separate memory.

Protecting against unauthorized firmware updates using induced servo errors
09899053 · 2018-02-20 · ·

Method and apparatus for data security in a data storage device. In some embodiments, a first version of firmware is installed in a memory of the device. The firmware is used by a programmable processor to control accesses to a rotatable data recording medium on which is written pre-recorded servo positioning data used to position a data transducer. A newer, second version of the firmwave is subsequently installed in the memory to replace the first version of firmware. The second version of the firmware includes an instruction to corrupt a selected portion of the servo positioning data on the medium in order to authenticate the second version of the firmware. During a subsequent initialization of the device, host access is granted based on detection of the corruption of the selected portion of the servo positioning data.

OPTICAL DISC AUTHENTICATION BY INTERFEROMETRIC FINGERPRINTING
20170148480 · 2017-05-25 ·

Authentication of discs occurs by the use of interferometric authentication data. Such authentication data of a data disc is generated based on an interference pattern associated with thickness variations of a material layer on the disc. The interference pattern represents a unique fingerprint that can be used for authentication of individual discs.