Текст страницы
10.21.14.2 TCG Enterprise SSC Commands
The table below describes how the required TCG Enterprise SSC commands behave on encryption drives in the
locked and unlocked states. The TCG Enterprise requires the implementation of the Base, Admin, Locking, and
Crypto Templates.
Table 78 TCG Enterprise SSC Commands Behavior -1
Command
Description
unlocked
Locked
There are two types of sessions:
Session
Management
1) Read-Only session.
2) Read-Write session.
The SSC requires us to support Read-Write sessions. Read-Only
session is not allowed. A session is always initiated by the host.
See the “Write” parameter in the Start Session method description
@ TCG Core 5.2.3.1, and see SSC requirement in SSC 6.2.1.2.
Properties
Returns session properties to host.
N/A
N/A
Start Session
Start a session
N/A
N/A
Sync Session
Response to say session successfully started.
N/A
N/A
Close Session
End (Close) a session
N/A
N/A
Table 79 TCG Enterprise SSC Commands Behavior -2
Command
Description
unlocked
Locked
Discovery
Allows the host to discover a TCG drive, its properties,
and table values.
N/A
N/A
Level 0
Discovery request sent by host as IF-RCV command.
Security Protocol = 0x01, COMID=0x0001
Level 1
Request basic TPER capabilities via properties using
host messaging.
Uses properties
method.
Uses properties
method.
Level 2
TCG methods retrieve table cell values.
See methods
below.
See methods
below.
Table 80 TCG Enterprise SSC Commands Behavior -3
Command
Description
unlocked
Locked
Cryptographic
Template
Random
This is the only required method in the crypto
template for SSC. It is a random number
generator in software.
N/A - Not related to
bands/data
on
drive.
Authentication required.
N/A - Not related to
bands/data on drive.
Authentication
required.
121
Hard Disk Drive Specification