Текст страницы
TCG Enterprise SSC Commands
The table below describes how the required TCG Enterprise SSC commands behave on encryption drives in the
locked and unlocked states. The TCG Enterprise requires the implementation of the Base, Admin, Locking, and
Crypto Templates.
Command
Description
unlocked
Locked
There are two types of sessions:
Session
Management
1) Read-Only session.
2) Read-Write session.
The SSC requires us to support Read-Write sessions. Read-Only
session is not allowed. A session is always initiated by the host.
See the “Write” parameter in the Start Session method description
@ TCG Core 5.2.3.1, and see SSC requirement in SSC 6.2.1.2.
Properties
Returns session properties to host.
N/A
N/A
Start Session
Start a session
N/A
N/A
Syc Session
Response to say session successfully started.
N/A
N/A
Close Session
End (Close) a session
N/A
N/A
Table 89 TCG Enterprise SSC Commands Behavior -1
Command
Description
unlocked
Locked
Discovery
Allows the host to discover a TCG drive, its properties,
and table values.
N/A
N/A
Level 0
Discovery request sent by host as IF-RCV command.
Security Protocol = 0x01, COMID=0x0001
Uses properties
Uses properties
Level 1
Request basic TPER capabilities via properties using
host messaging.
method.
method.
See methods
Level 2
TCG methods retrieve table cell values.
See methods
below.
below.
Table 90 TCG Enterprise SSC Commands Behavior -2
Command
Description
unlocked
Locked
Cryptographic
Template
N/A - Not related to
bands/data on drive.
Random
This is the only required method in the crypto
template for SSC. It is a random number
generator in software.
Authentication
N/A - Not related to
bands/data on drive.
Authentication required.
required.
Table 91 TCG Enterprise SSC Commands Behavior -3
127
Western Digital Ultrastar DC HC310 SATA Product Manual