Monitoring of residual encrypted data to improve erase performance on a magnetic medium

ABSTRACT

In one embodiment, a system includes a processor and logic integrated with and/or executable by the processor, the logic being configured to: determine a physical position on a magnetic medium that corresponds to an end of an encrypted data set; store an indicator of the physical position on the magnetic medium and/or a memory coupled thereto; and cause obscuring of an unencrypted data set positioned after the physical position without overwriting the encrypted data set. In another embodiment, a computer program product includes a computer readable storage medium and program instructions embodied therewith, the program instructions readable and/or executable by the processor to cause the processor to: read an indicator of a physical position on a magnetic medium that corresponds to an end of an encrypted data set; and cause obscuring of an unencrypted data set positioned after the physical position without overwriting the encrypted data set.

RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.13/551,513, filed Jul. 17, 2012, which is herein incorporated byreference.

BACKGROUND

The present invention relates to data storage systems, and moreparticularly, this invention relates to monitoring residual encrypteddata to improve erase performance on a magnetic medium

In magnetic storage systems, data is read from and written onto magneticrecording media utilizing magnetic transducers. Data is written on themagnetic recording media by moving a magnetic recording transducer to aposition over the media where the data is to be stored. The magneticrecording transducer then generates a magnetic field, which encodes thedata into the magnetic media. Data is read from the media by similarlypositioning the magnetic read transducer and then sensing the magneticfield of the magnetic media. Read and write operations may beindependently synchronized with the movement of the media to ensure thatthe data can be read from and written to the desired location on themedia.

BRIEF SUMMARY

In one embodiment, a system includes a processor and logic integratedwith and/or executable by the processor, the logic being configured to:determine a first physical position on a magnetic medium thatcorresponds to an end of at least one encrypted data set; store anindicator of the first physical position on at least one of the magneticmedium and a memory coupled thereto; and cause obscuring of at least oneunencrypted data set positioned after the first physical positionwithout overwriting the encrypted data set.

In another embodiment, a method includes: determining a first physicalposition on a magnetic medium that corresponds to an end of at least oneencrypted data set; determining a second physical position on themagnetic medium that corresponds to a beginning of the encrypted dataset; storing an indicator of the first physical position and anindicator of the second physical position on at least one of themagnetic medium and a memory coupled thereto; and causing obscuring ofat least one unencrypted data set positioned after the first physicalposition and/or before the second physical position without overwritingthe encrypted data set.

In yet another embodiment, a system includes a processor and logicintegrated with and/or executable by the processor, the logic beingconfigured to: read an indicator of a first physical position on amagnetic medium that corresponds to an end of an encrypted data set; andcause obscuring of at least one unencrypted data set positioned afterthe first physical position without overwriting the encrypted data set.

In a further embodiment, a method includes: reading an indicator of afirst physical position on a magnetic medium that corresponds to an endof an encrypted data set; and causing obscuring of at least oneunencrypted data set positioned after the first physical positionwithout overwriting the encrypted data set.

Other aspects and embodiments of the present invention will becomeapparent from the following detailed description, which, when taken inconjunction with the drawings, illustrate by way of example theprinciples of the invention.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1A is a schematic diagram of a simplified tape drive systemaccording to one embodiment.

FIG. 1B is a schematic diagram of a tape cartridge according to oneembodiment.

FIG. 2 illustrates a side view of a flat-lapped, bi-directional,two-module magnetic tape head according to one embodiment.

FIG. 2A is a tape bearing surface view taken from Line 2A of FIG. 2.

FIG. 2B is a detailed view taken from Circle 2B of FIG. 2A.

FIG. 2C is a detailed view of a partial tape bearing surface of a pairof modules.

FIG. 3 is a partial tape bearing surface view of a magnetic head havinga write-read-write configuration.

FIG. 4 is a partial tape bearing surface view of a magnetic head havinga read-write-read configuration.

FIG. 5 is a side view of a magnetic tape head with three modulesaccording to one embodiment where the modules all generally lie alongabout parallel planes.

FIG. 6 is a side view of a magnetic tape head with three modules in atangent (angled) configuration.

FIG. 7 is a side view of a magnetic tape head with three modules in anoverwrap configuration.

FIG. 8 is a flow diagram of a method according to one embodiment.

FIG. 9 is a flow diagram of a method according to one embodiment.

FIG. 10 is a schematic representation of data on a magnetic mediumaccording to one embodiment.

FIG. 11 is a schematic representation of data on a magnetic mediumaccording to one embodiment.

FIG. 12 is a schematic representation of data on a magnetic mediumaccording to one embodiment.

FIG. 13 is a schematic representation of data on a magnetic mediumaccording to one embodiment.

DETAILED DESCRIPTION

The following description is made for the purpose of illustrating thegeneral principles of the present invention and is not meant to limitthe inventive concepts claimed herein. Further, particular featuresdescribed herein can be used in combination with other describedfeatures in each of the various possible combinations and permutations.

Unless otherwise specifically defined herein, all terms are to be giventheir broadest possible interpretation including meanings implied fromthe specification as well as meanings understood by those skilled in theart and/or as defined in dictionaries, treatises, etc.

It must also be noted that, as used in the specification and theappended claims, the singular forms “a,” “an” and “the” include pluralreferents unless otherwise specified.

The following description discloses several preferred embodiments ofmagnetic storage systems, as well as operation and/or component partsthereof.

In one general embodiment, a system includes a processor, logic in theprocessor and/or memory configured to determine a physical position on amagnetic medium that corresponds to an end of encrypted data writtenover residual unencrypted data, and logic configured to store anindicator of the physical position on at least one of the magneticmedium and a memory coupled thereto.

In another general embodiment, a method includes determining a physicalposition on a magnetic medium that corresponds to an end of encrypteddata written over residual unencrypted data, storing an indicator of thephysical position on at least one of the magnetic medium and a memorycoupled thereto.

In yet another general embodiment, a system includes a processor, logicin the processor and/or a memory configured to receive an instruction toobscure data on a magnetic medium, logic configured to read an indicatorof a physical position on the magnetic medium that corresponds to an endof encrypted data written over residual unencrypted data, wherein theindicator is retrieved from at least one of the magnetic medium and amemory coupled to the magnetic medium; logic configured to issue aninstruction to pass over the encrypted data without overwriting theencrypted data, and logic configured to cause obscuring of the residualunencrypted data positioned after the physical location.

According to another general embodiment, a method includes receiving aninstruction to obscure data on a magnetic medium, reading an indicatorof a physical position on the magnetic medium that corresponds to an endof encrypted data written over residual unencrypted data, wherein theindicator is read from at least one of the magnetic medium and a memorycoupled to the magnetic medium, issuing an instruction to pass over theencrypted data without overwriting the encrypted data, and causingobscuring of the residual unencrypted data positioned after the physicallocation.

FIG. 1A illustrates a simplified tape drive 100 of a tape-based datastorage system, which may be employed in the context of the presentinvention. While one specific implementation of a tape drive is shown inFIG. 1A, it should be noted that the embodiments described herein may beimplemented in the context of any type of tape drive system.

As shown, a tape supply cartridge 120 and a take-up reel 121 areprovided to support a tape 122. One or more of the reels may form partof a removable cartridge and are not necessarily part of the system 100.The tape drive, such as that illustrated in FIG. 1A, may further includedrive motor(s) to drive the tape supply cartridge 120 and the take-upreel 121 to move the tape 122 over a tape head 126 of any type. Suchhead may include an array of readers, writers, or both.

Guides 125 guide the tape 122 across the tape head 126. Such tape head126 is in turn coupled to a controller assembly 128 via a cable 130. Thecontroller 128, which may be or include a processor, typically controlshead functions such as servo following, writing, reading, etc. Thecontroller 128 may operate under logic known in the art, as well as anylogic disclosed herein. The controller 128 may be coupled to a memory136 of any known type. The cable 130 may include read/write circuits totransmit data to the head 126 to be recorded on the tape 122 and toreceive data read by the head 126 from the tape 122. An actuator 132controls position of the head 126 relative to the tape 122.

An interface 134 may also be provided for communication between the tapedrive 100 and a host (integral or external) to send and receive the dataand for controlling the operation of the tape drive 100 andcommunicating the status of the tape drive 100 to the host, all as willbe understood by those of skill in the art.

FIG. 1B illustrates an exemplary tape cartridge 150 according to oneembodiment. Such tape cartridge 150 may be used with a system such asthat shown in FIG. 1A. As shown, the tape cartridge 150 includes ahousing 152, a tape 122 in the housing 152, and a nonvolatile memory 156coupled to the housing 152. In some approaches, the nonvolatile memory156 may be embedded inside the housing 152, as shown in FIG. 1B. In moreapproaches, the nonvolatile memory 156 may be attached to the inside oroutside of the housing 152 without modification of the housing 152. Forexample, the nonvolatile memory may be embedded in a self-adhesivelabel. In one preferred embodiment, the nonvolatile memory 156 may be aFlash memory device, ROM device, etc., embedded into or coupled to theinside or outside of the tape cartridge 150. The nonvolatile memory isaccessible by the tape drive and the tape operating software (the driversoftware), and/or other device.

By way of example, FIG. 2 illustrates a side view of a flat-lapped,bi-directional, two-module magnetic tape head 200 which may beimplemented in the context of the present invention. As shown, the headincludes a pair of bases 202, each equipped with a module 204, and fixedat a small angle α with respect to each other. The bases may be“U-beams” that are adhesively coupled together. Each module 204 includesa substrate 204A and a closure 204B with a thin film portion, commonlyreferred to as a “gap” in which the readers and/or writers 206 areformed. In use, a tape 208 is moved over the modules 204 along a media(tape) bearing surface 209 in the manner shown for reading and writingdata on the tape 208 using the readers and writers. The wrap angle θ ofthe tape 208 at edges going onto and exiting the flat media supportsurfaces 209 are usually between about 0.1 degree and about 5 degrees.

The substrates 204A are typically constructed of a wear resistantmaterial, such as a ceramic. The closures 204B made of the same orsimilar ceramic as the substrates 204A.

The readers and writers may be arranged in a piggyback or mergedconfiguration. An illustrative piggybacked configuration comprises a(magnetically inductive) writer transducer on top of (or below) a(magnetically shielded) reader transducer (e.g., a magnetoresistivereader, etc.), wherein the poles of the writer and the shields of thereader are generally separated. An illustrative merged configurationcomprises one reader shield in the same physical layer as one writerpole (hence, “merged”). The readers and writers may also be arranged inan interleaved configuration. Alternatively, each array of channels maybe readers or writers only. Any of these arrays may contain one or moreservo track readers for reading servo data on the medium.

FIG. 2A illustrates the tape bearing surface 209 of one of the modules204 taken from Line 2A of FIG. 2. A representative tape 208 is shown indashed lines. The module 204 is preferably long enough to be able tosupport the tape as the head steps between data bands.

In this example, the tape 208 includes 4 to 22 data bands, e.g., with 16data bands and 17 servo tracks 210, as shown in FIG. 2A on a one-halfinch wide tape 208. The data bands are defined between servo tracks 210.Each data band may include a number of data tracks, for example 1024data tracks (not shown). During read/write operations, the readersand/or writers 206 are positioned to specific track positions within oneof the data bands. Outer readers, sometimes called servo readers, readthe servo tracks 210. The servo signals are in turn used to keep thereaders and/or writers 206 aligned with a particular set of tracksduring the read/write operations.

FIG. 2B depicts a plurality of readers and/or writers 206 formed in agap 218 on the module 204 in Circle 2B of FIG. 2A. As shown, the arrayof readers and writers 206 includes, for example, 16 writers 214, 16readers 216 and two servo readers 212, though the number of elements mayvary. Illustrative embodiments include 8, 16, 32, 40, and 64 readersand/or writers 206 per array. A preferred embodiment includes 32 readersper array and/or 32 writers per array, where the actual number oftransducing elements could be greater, e.g., 33, 34, etc. This allowsthe tape to travel more slowly, thereby reducing speed-induced trackingand mechanical difficulties and/or execute fewer “wraps” to fill or readthe tape. While the readers and writers may be arranged in a piggybackconfiguration as shown in FIG. 2B, the readers 216 and writers 214 mayalso be arranged in an interleaved configuration. Alternatively, eacharray of readers and/or writers 206 may be readers or writers only, andthe arrays may contain one or more servo readers 212. As noted byconsidering FIGS. 2 and 2A-B together, each module 204 may include acomplementary set of readers and/or writers 206 for such things asbi-directional reading and writing, read-while-write capability,backward compatibility, etc.

FIG. 2C shows a partial tape bearing surface view of complimentarymodules of a magnetic tape head 200 according to one embodiment. In thisembodiment, each module has a plurality of read/write (R/W) pairs in apiggyback configuration formed on a common substrate 204A and anoptional electrically insulative layer 236. The writers, exemplified bythe write head 214 and the readers, exemplified by the read head 216,are aligned parallel to a direction of travel of a tape mediumthereacross to form an R/W pair, exemplified by the R/W pair 222.

Several R/W pairs 222 may be present, such as 8, 16, 32 pairs, etc. TheR/W pairs 222 as shown are linearly aligned in a direction generallyperpendicular to a direction of tape travel thereacross. However, thepairs may also be aligned diagonally, etc. Servo readers 212 arepositioned on the outside of the array of R/W pairs, the function ofwhich is well known.

Generally, the magnetic tape medium moves in either a forward or reversedirection as indicated by arrow 220. The magnetic tape medium and headassembly 200 operate in a transducing relationship in the mannerwell-known in the art. The piggybacked MR head assembly 200 includes twothin-film modules 224 and 226 of generally identical construction.

Modules 224 and 226 are joined together with a space present betweenclosures 204B thereof (partially shown) to form a single physical unitto provide read-while-write capability by activating the writer of theleading module and reader of the trailing module aligned with the writerof the leading module parallel to the direction of tape travel relativethereto. When a module 224, 226 of a piggyback head 200 is constructed,layers are formed in the gap 218 created above an electricallyconductive substrate 204A (partially shown), e.g., of AlTiC, ingenerally the following order for the R/W pairs 222: an insulating layer236, a first shield 232 typically of an iron alloy such as NiFe(permalloy), CZT or Al—Fe—Si (Sendust), a sensor 234 for sensing a datatrack on a magnetic medium, a second shield 238 typically of anickel-iron alloy (e.g., 80/20 Permalloy), first and second writer poletips 228, 230, and a coil (not shown).

The first and second writer poles 228, 230 may be fabricated from highmagnetic moment materials such as 45/55 NiFe. Note that these materialsare provided by way of example only, and other materials may be used.Additional layers such as insulation between the shields and/or poletips and an insulation layer surrounding the sensor may be present.Illustrative materials for the insulation include alumina and otheroxides, insulative polymers, etc.

The configuration of the tape head 126 according to one embodimentincludes multiple modules, preferably three or more. In awrite-read-write (W-R-W) head, outer modules for writing flank one ormore inner modules for reading. Referring to FIG. 3, depicting a W-R-Wconfiguration, the outer modules 252, 256 each include one or morearrays of writers 260. The inner module 254 of FIG. 3 includes one ormore arrays of readers 258 in a similar configuration. Variations of amulti-module head include a R-W-R head (FIG. 4), a R-R-W head, a W-W-Rhead, etc. In yet other variations, one or more of the modules may haveread/write pairs of transducers. Moreover, more than three modules maybe present. In further approaches, two outer modules may flank two ormore inner modules, e.g., in a W-R-R-W, a R-W-W-R arrangement, etc. Forsimplicity, a W-R-W head is used primarily herein to exemplifyembodiments of the present invention. One skilled in the art apprisedwith the teachings herein will appreciate how permutations of thepresent invention would apply to configurations other than a W-R-Wconfiguration.

FIG. 5 illustrates a magnetic head 126 according to one embodiment ofthe present invention that includes first, second and third modules 302,304, 306 each having a tape bearing surface 308, 310, 312 respectively,which may be flat, contoured, etc. Note that while the term “tapebearing surface” appears to imply that the surface facing the tape 315is in physical contact with the tape bearing surface, this is notnecessarily the case. Rather, only a portion of the tape may be incontact with the tape bearing surface, constantly or intermittently,with other portions of the tape riding (or “flying”) above the tapebearing surface on a layer of air, sometimes referred to as an “airbearing”. The first module 302 will be referred to as the “leading”module as it is the first module encountered by the tape in a threemodule design for tape moving in the indicated direction. The thirdmodule 306 will be referred to as the “trailing” module. The trailingmodule follows the middle module and is the last module seen by the tapein a three module design. The leading and trailing modules 302, 306 arereferred to collectively as outer modules. Also note that the outermodules 302, 306 will alternate as leading modules, depending on thedirection of travel of the tape 315.

In one embodiment, the tape bearing surfaces 308, 310, 312 of the first,second and third modules 302, 304, 306 lie on about parallel planes(which is meant to include parallel and nearly parallel planes, e.g.,between parallel and tangential as in FIG. 6), and the tape bearingsurface 310 of the second module 304 is above the tape bearing surfaces308, 312 of the first and third modules 302, 306. As described below,this has the effect of creating the desired wrap angle α₂ of the taperelative to the tape bearing surface 310 of the second module 304.

Where the tape bearing surfaces 308, 310, 312 lie along parallel ornearly parallel yet offset planes, intuitively, the tape should peel offof the tape bearing surface 308 of the leading module 302. However, thevacuum created by the skiving edge 318 of the leading module 302 hasbeen found by experimentation to be sufficient to keep the tape adheredto the tape bearing surface 308 of the leading module 302. The trailingedge 320 of the leading module 302 (the end from which the tape leavesthe leading module 302) is the approximate reference point which definesthe wrap angle α₂ over the tape bearing surface 310 of the second module304. The tape stays in close proximity to the tape bearing surface untilclose to the trailing edge 320 of the leading module 302. Accordingly,read and/or write elements 322 may be located near the trailing edges ofthe outer modules 302, 306. These embodiments are particularly adaptedfor write-read-write applications.

A benefit of this and other embodiments described herein is that,because the outer modules 302, 306 are fixed at a determined offset fromthe second module 304, the inner wrap angle α₂ is fixed when the modules302, 304, 306 are coupled together or are otherwise fixed into a head.The inner wrap angle α₂ is approximately tan⁻¹ (δ/W) where δ is theheight difference between the planes of the tape bearing surfaces 308,310 and W is the width between the opposing ends of the tape bearingsurfaces 308, 310. An illustrative inner wrap angle α₂ is in a range ofabout 0.5° to about 1.1°, though can be any angle required by thedesign.

Beneficially, the inner wrap angle α₂ may be set slightly less on theside of the module 304 receiving the tape (leading edge) than the innerwrap angle α₃ on the trailing edge, as the tape 315 rides above thetrailing module 306. This difference is generally beneficial as asmaller α₃ tends to oppose what has heretofore been a steeper exitingeffective wrap angle.

Note that the tape bearing surfaces 308, 312 of the outer modules 302,306 are positioned to achieve a negative wrap angle at the trailing edge320 of the leading module 302. This is generally beneficial in helpingto reduce friction due to contact with the trailing edge 320, providedthat proper consideration is given to the location of the crowbar regionthat forms in the tape where it peels off the head. This negative wrapangle also reduces flutter and scrubbing damage to the elements on theleading module 302. Further, at the trailing module 306, the tape 315flies over the tape bearing surface 312 so there is virtually no wear onthe elements when tape is moving in this direction. Particularly, thetape 315 entrains air and so will not significantly ride on the tapebearing surface 312 of the third module 306 (some contact may occur).This is permissible, because the leading module 302 is writing while thetrailing module 306 is idle.

Writing and reading functions are performed by different modules at anygiven time. In one embodiment, the second module 304 includes aplurality of data and optional servo readers 331 and no writers. Thefirst and third modules 302, 306 include a plurality of writers 322 andno readers, with the exception that the outer modules 302, 306 mayinclude optional servo readers. The servo readers may be used toposition the head during reading and/or writing operations. The servoreader(s) on each module are typically located towards the end of thearray of readers or writers.

By having only readers or side by side writers and servo readers in thegap between the substrate and closure, the gap length can besubstantially reduced. Typical heads have piggybacked readers andwriters, where the writer is formed above each reader. A typical gap is25-35 microns. However, irregularities on the tape may tend to droopinto the gap and create gap erosion. Thus, the smaller the gap is thebetter. The smaller gap enabled herein exhibits fewer wear relatedproblems.

In some embodiments, the second module 304 has a closure, while thefirst and third modules 302, 306 do not have a closure. Where there isno closure, preferably a hard coating is added to the module. Onepreferred coating is diamond-like carbon (DLC).

In the embodiment shown in FIG. 5, the first, second, and third modules302, 304, 306 each have a closure 332, 334, 336, which extends the tapebearing surface of the associated module, thereby effectivelypositioning the read/write elements away from the edge of the tapebearing surface. The closure 332 on the second module 304 can be aceramic closure of a type typically found on tape heads. The closures334, 336 of the first and third modules 302, 306, however, may beshorter than the closure 332 of the second module 304 as measuredparallel to a direction of tape travel over the respective module. Thisenables positioning the modules closer together. One way to produceshorter closures 334, 336 is to lap the standard ceramic closures of thesecond module 304 an additional amount. Another way is to plate ordeposit thin film closures above the elements during thin filmprocessing. For example, a thin film closure of a hard material such asSendust or nickel-iron alloy (e.g., 45/55) can be formed on the module.

With reduced-thickness ceramic or thin film closures 334, 336 or noclosures on the outer modules 302, 306, the write-to-read gap spacingcan be reduced to less than about 1 mm, e.g., about 0.75 mm, or 50% lessthan standard LTO tape head spacing. The open space between the modules302, 304, 306 can still be set to approximately 0.5 to 0.6 mm, which insome embodiments is ideal for stabilizing tape motion over the secondmodule 304.

Depending on tape tension and stiffness, it may be desirable to anglethe tape bearing surfaces of the outer modules relative to the tapebearing surface of the second module. FIG. 6 illustrates an embodimentwhere the modules 302, 304, 306 are in a tangent or nearly tangent(angled) configuration. Particularly, the tape bearing surfaces of theouter modules 302, 306 are about parallel to the tape at the desiredwrap angle α₂ of the second module 304. In other words, the planes ofthe tape bearing surfaces 308, 312 of the outer modules 302, 306 areoriented at about the desired wrap angle α₂ of the tape 315 relative tothe second module 304. The tape will also pop off of the trailing module306 in this embodiment, thereby reducing wear on the elements in thetrailing module 306. These embodiments are particularly useful forwrite-read-write applications. Additional aspects of these embodimentsare similar to those given above.

Typically, the tape wrap angles may be set about midway between theembodiments shown in FIGS. 5 and 6.

FIG. 7 illustrates an embodiment where the modules 302, 304, 306 are inan overwrap configuration. Particularly, the tape bearing surfaces 308,312 of the outer modules 302, 306 are angled slightly more than the tape315 when set at the desired wrap angle α₂ relative to the second module304. In this embodiment, the tape does not pop off of the trailingmodule, allowing it to be used for writing or reading. Accordingly, theleading and middle modules can both perform reading and/or writingfunctions while the trailing module can read any just-written data.Thus, these embodiments are preferred for write-read-write,read-write-read, and write-write-read applications. In the latterembodiments, closures should be wider than the tape canopies forensuring read capability. The wider closures will force a widergap-to-gap separation. Therefore a preferred embodiment has awrite-read-write configuration, which may use shortened closures thatthus allow closer gap-to-gap separation.

Additional aspects of the embodiments shown in FIGS. 6 and 7 are similarto those given above.

A 32 channel version of a multi-module head 126 may use cables 350having leads on the same pitch as current 16 channel piggyback LTOmodules, or alternatively the connections on the module may beorgan-keyboarded for a 50% reduction in cable span. Over-under, writingpair unshielded cables can be used for the writers, which may haveintegrated servo readers.

The outer wrap angles α₁ may be set in the drive, such as by guides ofany type known in the art, such as adjustable rollers, slides, etc. Forexample, rollers having an offset axis may be used to set the wrapangles. The offset axis creates an orbital arc of rotation, allowingprecise alignment of the wrap angle α₁.

To assemble any of the embodiments described above, conventional u-beamassembly can be used. Accordingly, the mass of the resultant head can bemaintained or even reduced relative to heads of previous generations. Inother approaches, the modules may be constructed as a unitary body.Those skilled in the art, armed with the present teachings, willappreciate that other known methods of manufacturing such heads may beadapted for use in constructing such heads.

In conventional magnetic storage systems, securely erasing a magneticmedium, such as a tape cartridge, generally requires overwriting theentire volume to obscure the data. For example, if the magnetic mediumis written in an encrypted format, the data can be obscured bydestroying the associated data keys. However, this does not destroy anyresidual data that may be in encrypted or unencrypted format, and maystill be on the physical medium from previous usages. In addition todestroying the data keys, some applications also choose to obscure thesection of physical tape from the end of their user data to the end ofthe physical tape. This ensures that any residual data from previoustape usages are not exposed. However, this can potentially add hours tothe process of erasing the tape.

Embodiments of the present invention overcome the aforementioneddrawback by providing a system and method to record the location ofresidual encrypted data on a magnetic medium. When an encrypted magneticmedium is reused for writing new data, the data keys for the formerusage may be destroyed. Therefore, any residual data that was in anencrypted format may already be obscured. Preferably, a system and/ormethod is able to record the location of the encrypted residual data,such that an application may specify that the erase command skipoverwriting this data. If a volume of the magnetic medium is always usedfor encrypted data, such a system and/or method may save a large amountof time during the erase procedure.

FIG. 8 shows a method 800 for monitoring encrypted residual dataaccording to one illustrative embodiment. As an option, the presentmethod 800 may be implemented in conjunction with features from anyother embodiments listed herein, such as those shown in the other FIGS.Of course, however, this method 800 and others presented herein may beused in various applications and/or permutations, which may or may notbe related to the illustrative embodiments listed herein. Further, themethod 800 presented herein may be carried out in any desiredenvironment. Moreover, more or less operations than those shown in FIG.8 may be included in method 800, according to various embodiments.

As shown in FIG. 8 according to one approach, the method 800 includesdetermining a physical position on a magnetic medium that corresponds toan end of encrypted data written over residual unencrypted data. Seeoperation 802. The method 800 may be performed, at least in part, by asystem. As used herein, a system may include, but is not limited to, atape drive controller, a tape drive or other type of drive, a tapelibrary controller, a host, etc. Additionally, a magnetic medium as usedherein may include, but is not limited to, magnetic tape or othersequential medium of a type known in the art.

In one embodiment, the physical position on the magnetic medium maycorrespond to the beginning of an un-overwritten portion of theunencrypted data adjacent to the end of the encrypted data.

In another embodiment, the physical position may correspond to the endof residual encrypted data. In yet another embodiment, the physicalposition may correspond to the beginning of the un-overwritten portionof the unencrypted data adjacent to the end of the residual encrypteddata.

The method 800 also includes storing an indicator of the physicalposition on at least one of the magnetic medium and a memory coupledthereto, as shown in FIG. 8 according to one approach. See operation804. As discussed herein, the indicator of the physical position may bestored in a header, in a reserved area on the magnetic medium, innonvolatile cartridge memory coupled to a cartridge housing a magnetictape, etc., or other such suitable location as would be understood byone skilled in the art upon reading the present disclosure.

In one embodiment, the indicator of the physical position may not beextremely precise, but may preferably point to a position on the sameset of data tracks and within 25 feet or less of the actual physicallocation of the end of the unobscured data, where the unobscured datamay include a string of bits, a volume or set of volumes, a block or setof blocks, etc. and combinations thereof. Thus, the physical positionsindicated by the indicator may be approximate, but may nonetheless beclose to the actual physical positions where the last bits of unobscureddata reside on the medium.

In another embodiment, the method 800 may include causing obscuring ofunencrypted data positioned after the physical position, and notoverwriting of the encrypted data. In one approach, the obscuring mayinclude overwriting the unobscured data. As used herein, the overwritingmay include, but is not limited to, writing, one or more times, of apredetermined or random pattern, an AC erase, a DC erase, etc. andcombinations thereof.

In yet another embodiment, the method 800 may include causing obscuringand/or disablement of decryption data associated with the encrypteddata. As used herein, decryption data may include, but are not limitedto, a key, a password, etc. or other decryption data that would beunderstood by one skilled in the art upon reading the presentdisclosure.

Some embodiments support the ability to interrupt and cancel the eraseprocess in the middle of obscuring data. Since this process is typicallyassociated with a physical device position rather than a logical block,one approach provides the ability to resume the erase process where itleft off when it was canceled, thereby allowing the application toreposition the medium and start the erase process from the beginning.

Accordingly, in one approach, the method 800 may include canceling theobscuring prior to reaching the physical position in the indicator, andstoring a second indicator, on at least one of the magnetic medium andthe memory coupled thereto, of the last physical position that wasobscured. In the event that the erase process is resubmitted, such anapproach may allow the magnetic storage system to move to the physicalposition where it left off, e.g. the last physical position that wasobscured, and start obscuring data from that point forward.

In one embodiment, the method 800 may include determining a secondphysical position on the magnetic medium that corresponds to a beginningof the encrypted data written over residual unencrypted data, andstoring a second indicator of the second physical position on at leastone of the magnetic medium and the memory coupled thereto. In anotherembodiment, the second physical position on the magnetic medium maycorrespond to the end of the un-overwritten portion of the unencrypteddata adjacent the beginning of the encrypted data.

In one approach, the residual unencrypted data may be part of the samedata set as that discussed above. In another approach the residualunencrypted data may be a different unencrypted data set.

In yet another approach, the method 800 may include causing obscuring ofthe unencrypted data positioned before the second physical position andobscuring of the unencrypted data positioned after the physicalposition, and not overwriting of the encrypted data, according to oneembodiment.

Additionally, in one embodiment, alternating usages of the magneticmedium may use encrypted and unencrypted formats such that the magneticmedium may have a plurality of alternating encrypted and unencryptedregions. Accordingly, in one approach, the method 800 may includedetermining a plurality of indicators of physical positions on themagnetic medium that correspond to a beginning of the encrypted datawritten over residual unencrypted (and/or encrypted) data anddetermining a plurality of indicators of physical positions on themagnetic medium that correspond to an end of the encrypted data writtenover residual unencrypted (and/or encrypted) data.

Generally, a system such as a tape drive, writes data back and forth ina plurality of tracks on the magnetic medium. Accordingly, in oneembodiment, the method 800 may include recording whether or not thetrack consists entirely of encrypted data after each track is completed.Where a track is entirely of encrypted data, the method may includeskipping (i.e. not overwriting) the encrypted track during the eraseprocedure.

Referring now to FIG. 9, a method 900 for monitoring encrypted residualdata is shown according to one illustrative embodiment. As an option,the present method 900 may be implemented in conjunction with featuresfrom any other embodiments listed herein, such as those shown in theother FIGS. Of course, however, this method 900 and others presentedherein may be used in various applications and/or permutations, whichmay or may not be related to the illustrative embodiments listed herein.Further, the method 900 presented herein may be carried out in anydesired environment. Moreover, more or less operations than those shownin FIG. 9 may be included in method 900, according to variousembodiments.

As shown in FIG. 9 according to one approach, the method 900 includesreceiving an instruction to obscure data on a magnetic medium. Seeoperation 902. The method 900 may be performed at least in part by asystem such as a tape drive controller, a tape drive, a tape librarycontroller, a host, etc., or other suitable system as would beunderstood by one skilled in the art upon reading the presentdisclosure.

The method 900 also includes, according to another approach, reading anindicator of a physical position on the magnetic medium that correspondsto an end of encrypted data written over residual unencrypted data,wherein the indicator is read from at least one of the magnetic mediumand a memory coupled to the magnetic medium. See operation 904.

In one embodiment, the indicator is retrieved via a magnetic reader, amemory reader, a reader local or external to the system, etc. or othersuitable reader as would be understood by one skilled in the art uponreading the present disclosure.

In another embodiment, the physical position on the magnetic medium maycorrespond to the beginning of an un-overwritten portion of theunencrypted data adjacent to the end of the encrypted data.

In yet another embodiment, the physical position may correspond to theend of residual encrypted data. In yet a further embodiment, thephysical position may correspond to the beginning of the un-overwrittenportion of the unencrypted data adjacent to the end of the residualencrypted data.

Additionally, method 900 includes issuing an instruction to pass overthe encrypted data without overwriting the encrypted data, as shown inoperation 906 according to one approach. In another approach, the method900 further includes causing obscuring of the residual unencrypted datapositioned after the physical location. See operation 908.

In yet another approach, the obscuring may include overwriting theunobscured data. In another approach, the method 900 may include causingobscuring and/or disablement of decryption data associated with theencrypted data.

In one embodiment, the method 900 may include canceling the obscuringprior to reaching the physical position in the indicator, and storing asecond indicator, on at least one of the magnetic medium and the memorycoupled thereto, of the last physical position that was obscured. In theevent that the erase process is resubmitted, such an embodiment mayallow the magnetic storage system to move to the physical position whereit left off, e.g. the last physical position that was obscured, andstart obscuring data from that point forward.

In another embodiment, the method 900 may include determining a secondphysical position on the magnetic medium that corresponds to a beginningof the encrypted data written over residual unencrypted data, andstoring a second indicator of the second physical position on at leastone of the magnetic medium and the memory coupled thereto. In yetanother embodiment, the second physical position on the magnetic mediummay correspond to the end of the un-overwritten portion of theunencrypted data adjacent the beginning of the encrypted data.

In one approach, the residual unencrypted data may be part of the samedata set as that discussed above. In yet another approach the residualunencrypted data may be a different unencrypted data set.

In another approach, the method 900 may include causing obscuring of theunencrypted data positioned before the second physical position andobscuring of the unencrypted data positioned after the physicalposition, and not overwriting of the encrypted data.

Additionally, in yet another embodiment, alternating usages of themagnetic medium may use encrypted and unencrypted formats such that themagnetic medium may have a plurality of alternating encrypted andunencrypted regions. Accordingly, in one approach, the method 900 mayinclude determining a plurality of indicators of physical positions onthe magnetic medium that correspond to a beginning of the encrypted datawritten over residual unencrypted (and/or encrypted) data anddetermining a plurality of indicators of physical positions on themagnetic medium that correspond to an end of the encrypted data writtenover residual unencrypted (and/or encrypted) data.

Generally, a system such as a tape drive, writes data back and forth ina plurality of tracks on the magnetic medium. Accordingly, in oneembodiment, the method 900 may include recording whether or not thetrack consists entirely of encrypted data after each track is completed.Where a track is entirely of encrypted data, the method may includeskipping (i.e. not overwriting) the encrypted track during the eraseprocedure.

Referring now to FIGS. 10-13, illustrative representations 1000-1300 ofdata on a data track of a magnetic medium are shown according to variousillustrative embodiments. As an option, the present representations maybe implemented in conjunction with features from any other embodimentlisted herein, such as those described with reference to the other FIGS.Of course, however, such representations, and others presented herein,may be used in various applications and/or in permutations, which may ormay not be specifically described in the illustrative embodiments listedherein.

As shown in FIG. 10 according to one approach, the data track mayinclude encrypted data 1002 written over residual unencrypted data 1004.As noted above, an indicator of the physical position 1006 may be storedon at least one of the magnetic medium and a memory coupled thereto,according to another approach.

In one embodiment, the indicator of the physical position 1006 on themagnetic medium may correspond to the beginning of an un-overwrittenportion of the unencrypted data 1004 adjacent to the end of theencrypted data 1002.

In another embodiment, the indicator of the physical position 1006 maybe stored in a header, in a reserved area on the magnetic medium, innonvolatile cartridge memory coupled to a cartridge housing a magnetictape, etc. or other such suitable location as would be understood by oneskilled in the art upon reading the present disclosure.

In yet another embodiment, the indicator of the physical position 1006may not be extremely precise, but may point to a position on the sameset of data tracks and within 25 feet or less of the actual physicallocation of the end of the unobscured data, where the unobscured datamay include a string of bits, a volume or set of volumes, a block or setof blocks, etc. and combinations thereof. Thus, the physical positionsindicated by the indicators described herein may be approximate, but maybe nonetheless close to the actual physical positions where the lastbits of unobscured data reside on the medium.

As noted above, the unencrypted data 1004 positioned after the physicalposition may be obscured via any known process, where the obscuringprocess does not overwrite the encrypted data 1002. In one approach, theobscuring may include overwriting the unobscured data. In anotherapproach, the decryption data associated with the encrypted data 1002may be obscured and/or disabled.

According to another embodiment as shown in FIG. 11, the data track mayinclude residual encrypted data 1102. In one approach, the indicator ofthe physical position 1104 on the data track may correspond to the endof the residual encrypted data 1102. In another approach, the indicator1102 of the physical position may correspond to the beginning of theun-overwritten portion of the unencrypted data 1004 adjacent to the endof the residual encrypted data 1102.

In yet another approach, the residual encrypted data 1102 may beobscured when the tape is reused, such that the residual encrypted data1102 need not be overwritten during an erase operation. For example,during an erase procedure, the residual encrypted data 1102 may not beoverwritten, whereas the decryption data associated with the encrypteddata 1106 may be disabled and/or obscured and the unencrypted data 1004may be obscured, according to one embodiment.

As shown in FIG. 12 according to one approach, the data track mayinclude a second indicator that corresponds to the last physicalposition 1202 that was obscured. As noted above, the obscuring processmay be cancelled after reaching the physical position 1006 in theindicator, and a second indicator of the last physical position 1202that was obscured may be stored on at least one of the magnetic mediumand a memory coupled thereto, according to another approach. In yetanother approach, also noted above, the indicator and the secondindicator may be read, such that the obscuring process may restart fromthe physical position 1202 indicated in the second indicator andterminate upon reaching the physical position 1006 in the indicator.

In another embodiment depicted in FIG. 13, the data track may include asecond physical position 1302 on the track that corresponds to abeginning of the encrypted data 1002 written over residual unencrypteddata 1304. As discussed above, the second indicator of the secondphysical position 1302 may be stored on at least one of the magneticmedium and the memory coupled thereto, according to one approach.

In one embodiment, the residual unencrypted 1304 data may be part of thesame data set as that discussed above (1004). In yet another embodimentthe residual unencrypted data 1304 may be a different unencrypted dataset.

In another embodiment, the second physical position 1302 on the magneticmedium may correspond to the end of the un-overwritten portion of theunencrypted data 1306 adjacent the beginning of the encrypted data 1002.

As also discussed above, the encrypted data 1002 may not be overwritten,whereas the unencrypted data 1306 positioned before the second physicalposition 1302 and the unencrypted data 1304 positioned after thephysical position 1006 may be obscured, according to another approach.

Additionally, in one embodiment, alternating usages of the magneticmedium may use encrypted and unencrypted formats such that the magneticmedium may have a plurality of alternating encrypted and unencryptedregions. Accordingly, in one approach, the data track may include aplurality of indicators of physical positions corresponding to thebeginning encrypted data written over residual unencrypted data and aplurality of indicators of physical positions corresponding the end ofencrypted data written over residual unencrypted data.

It will be clear that the various features of the foregoingmethodologies may be combined in any way, creating a plurality ofcombinations from the descriptions presented above.

As will be appreciated by one skilled in the art, aspects of the presentinvention may be embodied as a system, method or computer programproduct. Accordingly, aspects of the present invention may take the formof an entirely hardware embodiment, an entirely software embodiment(including firmware, resident software, micro-code, etc.) or anembodiment combining software and hardware aspects that may allgenerally be referred to herein as “logic,” a “circuit,” “module,” or“system.” Furthermore, aspects of the present invention may take theform of a computer program product embodied in one or more computerreadable medium(s) having computer readable program code embodiedthereon.

Any combination of one or more computer readable medium(s) may beutilized. The computer readable medium may be a computer readable signalmedium or a non-transitory computer readable storage medium. Anon-transitory computer readable storage medium may be, for example, butnot limited to, an electronic, magnetic, optical, electromagnetic,infrared, or semiconductor system, apparatus, or device, or any suitablecombination of the foregoing. More specific examples (a non-exhaustivelist) of the non-transitory computer readable storage medium include thefollowing: a portable computer diskette, a hard disk, a random accessmemory (RAM), a read-only memory (ROM), an erasable programmableread-only memory (EPROM or Flash memory), a portable compact discread-only memory (e.g., CD-ROM), a Blu-ray disc read-only memory(BD-ROM), an optical storage device, a magnetic storage device, or anysuitable combination of the foregoing. In the context of this document,a non-transitory computer readable storage medium may be any tangiblemedium that is capable of containing, or storing a program orapplication for use by or in connection with an instruction executionsystem, apparatus, or device.

A computer readable signal medium may include a propagated data signalwith computer readable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electro-magnetic, optical, or any suitable combination thereof. Acomputer readable signal medium may be any computer readable medium thatis not a non-transitory computer readable storage medium and that cancommunicate, propagate, or transport a program for use by or inconnection with an instruction execution system, apparatus, or device,such as an electrical connection having one or more wires, an opticalfibre, etc.

Program code embodied on a computer readable medium may be transmittedusing any appropriate medium, including but not limited to wireless,wireline, optical fibre cable, RF, etc., or any suitable combination ofthe foregoing.

Computer program code for carrying out operations for aspects of thepresent invention may be written in any combination of one or moreprogramming languages, including an object oriented programming languagesuch as Java, Smalltalk, C++ or the like and conventional proceduralprogramming languages, such as the “C” programming language or similarprogramming languages. The program code may execute entirely on theuser's computer, partly on the user's computer, as a stand-alonesoftware package, partly on the user's computer and partly on a remotecomputer or entirely on the remote computer or server. In the latterscenario, the remote computer may be connected to the user's computerthrough any type of network, including a local area network (LAN) or awide area network (WAN), or the connection may be made to an externalcomputer, for example through the Internet using an Internet ServiceProvider (ISP).

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems) and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer program instructions. These computer program instructions maybe provided to a processor of a general purpose computer, specialpurpose computer, or other programmable data processing apparatus toproduce a machine, such that the instructions, which execute via theprocessor of the computer or other programmable data processingapparatus, create means for implementing the functions/acts specified inthe flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in a computerreadable medium that can direct a computer, other programmable dataprocessing apparatus, or other devices to function in a particularmanner, such that the instructions stored in the computer readablemedium produce an article of manufacture including instructions whichimplement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer,other programmable data processing apparatus, or other devices to causea series of operational steps to be performed on the computer, otherprogrammable apparatus or other devices to produce a computerimplemented process such that the instructions which execute on thecomputer or other programmable apparatus provide processes forimplementing the functions/acts specified in the flowchart(s) and/orblock diagram block or blocks.

It will be further appreciated that embodiments of the present inventionmay be provided in the form of a service deployed on behalf of acustomer to offer service on demand.

While various embodiments have been described above, it should beunderstood that they have been presented by way of example only, and notlimitation. Thus, the breadth and scope of an embodiment of the presentinvention should not be limited by any of the above-described exemplaryembodiments, but should be defined only in accordance with the followingclaims and their equivalents.

What is claimed is:
 1. A system, comprising: a processor and logicintegrated with and/or executable by the processor, the logic beingconfigured to: determine a first physical position on a magnetic mediumthat corresponds to an end of at least one encrypted data set; store anindicator of the first physical position on at least one of the magneticmedium and a memory coupled thereto; and cause obscuring of at least oneunencrypted data set positioned after the first physical positionwithout overwriting the encrypted data set.
 2. The system as recited inclaim 1, wherein the obscuring of the unencrypted data set includesoverwriting the unencrypted data set.
 3. The system as recited in claim1, wherein the encrypted data set includes encrypted data written overresidual unencrypted data, and wherein the logic is further configuredto cause obscuring and/or disablement of decryption data associated withthe encrypted data written over residual unencrypted data.
 4. The systemas recited in claim 1, wherein the encrypted data set includes residualencrypted data, the residual encrypted data being associated withdecryption data that has been previously obscured and/or disabled. 5.The system as recited in claim 1, wherein when the obscuring of theunencrypted data set is cancelled and/or interrupted prior to anentirety thereof being obscured, the logic is further configured to:determine a second physical position on the magnetic medium thatcorresponds to an end of the obscured portion of the encrypted data set;and store an indicator of the second physical position on at least oneof the magnetic medium and the memory coupled thereto.
 6. The system asrecited in claim 5, wherein the logic is further configured to: causeobscuring of remaining portions of the unencrypted data set positionedafter the second physical position when obscuring of the unencrypteddata set is resumed.
 7. The system as recited in claim 1, wherein thelogic is further configured to: determine a third physical position onthe magnetic medium that corresponds to a beginning of the encrypteddata set; and store an indicator of the third physical position on atleast one of the magnetic medium and the memory coupled thereto.
 8. Thesystem as recited in claim 7, wherein the logic is further configured tocause obscuring of at least one unencrypted data set positioned beforethe third physical position without overwriting the encrypted data set.9. The system as recited in claim 7, wherein the logic is furtherconfigured to: determine a fourth physical position on the magneticmedium that corresponds to an end of a second encrypted data set, thesecond encrypted data set being positioned before the encrypted dataset; determine a fifth physical position on the magnetic medium thatcorresponds to a beginning of the second encrypted data set; and storean indicator of the fourth physical position and an indicator of thefifth physical position on the at least one of the magnetic medium andthe memory coupled thereto.
 10. The system as recited in claim 9,wherein the logic is further configured to not cause overwriting of thesecond encrypted data set.
 11. A method, comprising: determining a firstphysical position on a magnetic medium that corresponds to an end of atleast one encrypted data set; determining a second physical position onthe magnetic medium that corresponds to a beginning of the encrypteddata set; storing an indicator of the first physical position and anindicator of the second physical position on at least one of themagnetic medium and a memory coupled thereto; and causing obscuring ofat least one unencrypted data set positioned after the first physicalposition and/or before the second physical position without overwritingthe encrypted data set.
 12. The method as recited in claim 11, furthercomprising: for each encrypted data set on the magnetic medium,determining a physical position on the magnetic medium that correspondsto a beginning and an end of the encrypted data set, and storing thephysical position on at least one of the magnetic medium and the memorycoupled thereto; and causing obscuring of each unencrypted data setwithout overwriting any of the encrypted data sets.
 13. The method asrecited in claim 12, wherein at least one of the encrypted data setsincludes encrypted data written over residual unencrypted data; andwherein the method further comprises causing obscuring and/ordisablement of decryption data associated with the encrypted datawritten over residual unencrypted data.
 14. The method as recited inclaim 12, wherein at least one of the encrypted data sets set includesencrypted data written over residual unencrypted data.
 15. A computerprogram product, comprising: a computer readable storage medium havingprogram instructions embodied therewith, the program instructionsreadable and/or executable by a processor to cause the processor to:read an indicator of a first physical position on a magnetic medium thatcorresponds to an end of at least one encrypted data set; and causeobscuring of at least one unencrypted data set positioned after thefirst physical position without overwriting the encrypted data set. 16.The computer program product as recited in claim 15, wherein the programinstructions are readable and/or executable by the processor to causethe processor to cause obscuring of at least one unencrypted data setpositioned before the encrypted data set.
 17. The computer programproduct as recited in claim 15, wherein the encrypted data set includesencrypted data written over residual unencrypted data, and wherein theprogram instructions are readable and/or executable by the processor tocause the processor to cause obscuring and/or disablement of decryptiondata associated with the encrypted data written over residualunencrypted data.
 18. The computer program product as recited in claim17, wherein the encrypted data set further includes residual encrypteddata, the residual encrypted data being is associated with decryptiondata that has been previously obscured and/or disabled.
 19. The computerprogram product as recited in claim 15, wherein when the obscuring ofthe unencrypted data set is cancelled and/or interrupted prior to anentirety thereof being obscured, the program instructions are readableand/or executable by the processor to cause the processor to: read asecond physical position on the magnetic medium that corresponds to anend of the obscured portion of the encrypted data set; and causeobscuring of remaining portions of the unencrypted data set positionedafter the second physical position when obscuring of the unencrypteddata set is resumed.
 20. The computer program product as recited inclaim 15, wherein the magnetic medium includes alternating encrypted andunencrypted data sets; wherein the program instructions are readableand/or executable by a processor to cause the processor to: read aphysical position on the magnetic medium that corresponds to a beginningand an end of each encrypted data set; and cause obscuring of eachunencrypted data set without overwriting any of the encrypted data sets.