请输入您要查询的百科知识:

 

词条 Opal Storage Specification
释义

  1. SSC Overview

  2. Functions

  3. Features

  4. Security

  5. Implementers of SCC

      Device Companies    Storage Controller Companies   Software companies  Computer OEMs 

  6. References

  7. External links

{{Multiple issues|{{Primary sources|date=May 2017}}}}

The Opal Storage Specification is a set of specifications for features of data storage devices (such as disk drives) that enhance their security. For example, it defines a way of encrypting the stored data so that an unauthorized person who gains possession of the device cannot see the data. That is, it is a specification for self-encrypting drives (SED).

The specification is published by the Trusted Computing Group Storage Workgroup.

SSC Overview

{{unsourced section|date=May 2017}}

The Opal SSC (Security Subsystem Class) is an implementation profile for Storage Devices built to:

  • Protect the confidentiality of stored user data against unauthorized access once it leaves the owner's control (involving a power cycle and subsequent deauthentication).
  • Enable interoperability between multiple SD vendors.

Functions

{{unsourced section|date=May 2017}}

The Opal SSC encompasses these functions:

  • Security provider support
  • Interface communication protocol
  • Cryptographic features
  • Authentication
  • Table management
  • Access control and personalization
  • Issuance
  • SSC discovery

Features

{{unsourced section|date=May 2017}}
  • Security Protocol 1 support
  • Security Protocol 2 support
  • Communications
  • Protocol stack reset commands

Security

Most of OPAL hardware securities weakness relies in firmware implementation. Radboud University researchers[1] proved in November 2018, how it was easy to hack some SSD devices (Samsung EVO 840 & 850, Crucial MX100 MX200 & MX300) with US$100 of computer & electronics parts.

Implementers of SCC

Device Companies

  • Hitachi
  • Intel Corporation [2]
  • Kingston Technology[3]
  • Lenovo[4]
  • Micron Technology[5]
  • Samsung[6]
  • SanDisk[7]
  • Seagate Technology[8][9]
  • Toshiba[10][11][12]

Storage Controller Companies

  • Marvell[13]
  • Avago/LSI SandForce flash controllers[14]

Software companies

  • Absolute Software[15]
  • Check Point Software Technologies[16]
  • Dell Data Protection[17]
  • Cryptomill[18]
  • McAfee [19]
  • Secude [20]
  • Softex Incorporated[21]
  • Sophos[22]
  • Symantec[23] (Symantec supports OPAL drives, but does not support hardware-based encryption.)[24]
  • Trend Micro[25]
  • WinMagic[26]

Computer OEMs

  • Dell[27]
  • HP[28]
  • Lenovo[29]
  • Fujitsu[30]
  • Panasonic[31]
  • Getac[32]

References

1. ^{{cite web |last1=Meijer |first1=Carlo |last2=van Gastel |first2=Bernard |title=Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs) |url=https://www.ru.nl/publish/pages/909282/draft-paper.pdf |website=Radboud University |publisher=Radboud University |accessdate=November 5, 2018 |ref=draft}}
2. ^{{cite web|url=http://www.intel.com/content/www/us/en/solid-state-drives/ssd-pro-1500-series-m2-specification.html |title=Intel® SSD Pro 1500 Series (M.2): Specs |website=Intel.com |date= |accessdate=2017-05-03}}
3. ^{{cite web|url=http://www.kingston.com/us/ssd/vplus/#skc300s3 |title=Solid State Hard Drives for Business |website=Kingston.com |date=2017-03-05 |accessdate=2017-05-03}}
4. ^{{cite web|author=Clain Anderson |url=http://blog.lenovo.com/en/blog/opal-more-than-a-semi-precious-stone |title=Opal – More than a Semi-Precious Stone | Lenovo |website=Blog.lenovo.com |date=2011-02-16 |accessdate=2017-05-03}}
5. ^{{cite web|url=http://micron.com/products/solid-state-storage/client-ssd |title=Micron Technology, Inc. - Full SSD Part Catalog |website=Micron.com |date= |accessdate=2017-05-03}}
6. ^{{cite web|url=http://www.samsung.com/global/business/semiconductor/minisite/SSD/global/html/about/whitepaper06.html |title=Samsung V-NAND SSD |website=Samsung.com |date= |accessdate=2017-05-03}}
7. ^{{cite web |url=http://www.sandisk.com/products/ssd/sata/x300s/ |title=Archived copy |accessdate=2014-08-02 |deadurl=yes |archiveurl=https://web.archive.org/web/20140803081737/http://www.sandisk.com/products/ssd/sata/x300s |archivedate=2014-08-03 |df= }}
8. ^{{cite web|url=http://www.seagate.com/ww/v/index.jsp?locale=en-US&name=momentus-FDE-self-encrypting,FIPS-seagate-pr&vgnextoid=f0ea53279dc0b210VgnVCM1000001a48090aRCRD |title=News |publisher=Seagate |date= |accessdate=2017-05-03}}
9. ^{{cite web|url=http://www.winmagic.com/solutions/self-encrypting-hard-drives |title=Full Disk Encryption Software, Hard Drives, SSDs & Whole Disk |publisher=WinMagic |date= |accessdate=2017-05-03}}
10. ^{{cite web|url=http://www.fujitsu.com/global/news/pr/archives/month/2009/20090128-01.html |title=Fujitsu Develops HDD Security Technology based on Opal SSC Standards - Fujitsu Global |website=Fujitsu.com |date= |accessdate=2017-05-03}}
11. ^{{cite web|url=http://storage.toshiba.com/storagesolutions/specialty-products/mkxx61gsyg-series |title=Specialty | TOSHIBA Storage & Electronic Devices Solutions Company | Americas |website=Storage.toshiba.com |date= |accessdate=2017-05-03}}
12. ^{{cite web|url=http://storage.toshiba.com/storagesolutions/specialty-products/mkxx61gsyd-series |title=Specialty | TOSHIBA Storage & Electronic Devices Solutions Company | Americas |website=Storage.toshiba.com |date= |accessdate=2017-05-03}}
13. ^{{cite web|url=http://www.marvell.com |title=Marvell Technology Group Ltd |website=Marvell.com |date= |accessdate=2017-05-03}}
14. ^{{cite web |url=http://www.lsi.com/products/storagecomponents/Pages/SandForce_Flash_Storage_Processors.aspx |title=Archived copy |accessdate=2013-08-01 |deadurl=yes |archiveurl=https://web.archive.org/web/20130808084202/http://www.lsi.com/products/storagecomponents/Pages/sandforce_flash_storage_processors.aspx |archivedate=2013-08-08 |df= }}
15. ^{{cite web|url=http://www.absolute.com |title=Self-Healing Endpoint Security |publisher=Absolute |date= |accessdate=2017-05-03}}
16. ^{{cite web|url=http://www.checkpoint.com |title=Industry-Leading Cyber Security Keeps Networks, Data Centers, Mobile Devices & Endpoints One Step Ahead | Check Point Software |website=Checkpoint.com |date= |accessdate=2017-05-03}}
17. ^{{cite web|url=http://www.dell.com/encryption |title=Data Security | Dell United States |website=Dell.com |date=2017-04-26 |accessdate=2017-05-03}}
18. ^{{cite web |url=http://cryptomill.com/products/default.php |title=Archived copy |accessdate=2012-01-14 |deadurl=yes |archiveurl=https://web.archive.org/web/20120209044329/http://www.cryptomill.com/products/default.php |archivedate=2012-02-09 |df= }}
19. ^{{cite web|url=https://kc.mcafee.com/corporate/index?page=content&id=KB75045 |title=McAfee Corporate KB - KB75045 |website=Kc.mcafee.com |date= |accessdate=2017-05-03}}
20. ^{{cite web |url=http://www.secude.com/products/finallysecuretrade-enterprise |title=Archived copy |accessdate=2012-01-14 |deadurl=yes |archiveurl=https://web.archive.org/web/20120126034405/http://www.secude.com/products/finallysecuretrade-enterprise/ |archivedate=2012-01-26 |df= }}
21. ^{{cite web|url=http://www.softexinc.com/securedrive/overview |title=Comprehensive Data Encryption and Protection Solutions - SecureDrive |website=Softexinc.com |date=2014-06-20 |accessdate=2017-05-03}}
22. ^{{cite web|url=http://www.sophos.com/en-us/products/safeguard-encryption.aspx |title=Full Disk Encryption | Always-On, Multi-Platform Enterprise Encryption Synchronizes Devices, Hard Drives, Removable Media, BitLocker, and Cloud Storage Protection in Real-Time |website=Sophos.com |date= |accessdate=2017-05-03}}
23. ^{{cite web|url=http://www.symantec.com/endpoint-encryption |title=Endpoint Encryption Powered by PGP Technology |website=Symantec.com |date= |accessdate=2017-05-03}}
24. ^{{cite web |url=https://support.symantec.com/en_US/article.tech217784.html |title=Archived copy |accessdate=2016-02-03 |deadurl=yes |archiveurl=https://web.archive.org/web/20170925230747/https://support.symantec.com/en_US/article.tech217784.html |archivedate=2017-09-25 |df= }}
25. ^{{cite web|url=http://us.trendmicro.com/us/products/enterprise/endpoint-encryption/index.html |title=Data Protection – Endpoint and Gateway Suites | Trend Micro |website=Us.trendmicro.com |date= |accessdate=2017-05-03}}
26. ^{{cite web|url=http://www.winmagic.com/products |title=Full Disk Encryption Software, Hard Drives, SSDs & Whole Disk |publisher=WinMagic |date= |accessdate=2017-05-03}}
27. ^{{cite web|author= |url=http://www.dell.com |title=Dell Official Site | Dell United States |website=Dell.com |date=2017-04-26 |accessdate=2017-05-03}}
28. ^{{cite web|author= |url=http://www.hp.com |title=Laptop Computers, Desktops, Printers and more | HP® Official Site |website=Hp.com |date= |accessdate=2017-05-03}}
29. ^  {{webarchive|url=https://web.archive.org/web/20080828023252/http://lenovo.com/ |date=2008-08-28 }}
30. ^{{cite web|url=http://www.fujitsu.com/emea/news/pr/fel-de_20090128.html |title=Fujitsu News Updates - Fujitsu UK |website=Fujitsu.com |date= |accessdate=2017-05-03}}
31. ^{{cite web|url=http://www.Panasonic.com/toughbook |title=Panasonic Toughpad | Rugged Tablet | Toughpad |website=Panasonic.com |date=2015-10-27 |accessdate=2017-05-03}}
32. ^{{cite web|url=http://www.Getac.com/ |title=Rugged Notebooks, Tablets, Handhelds and Laptops from |website=Getac.com |date= |accessdate=2017-05-03}}

External links

  • Storage Work Group Storage Security Subsystem Class: Opal

1 : Computer security

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/16 18:12:32