Storing apparatus and password control method

ABSTRACT

A drive preserves a default input password. When there is no password input from the user, the default input password is regarded as a user input password and is compared and collated with a password for access protection, thereby controlling the access protection. In this instance, if the default input password and the password for access protection have the same value, a collation coincidence is obtained. The drive permits the access without needing a password input of the user.

BACKGROUND OF THE INVENTION

The present invention relates to a storing apparatus such as hard diskdrive, optical disk drive, or the like which is connected to informationprocessing equipment such as computer, word processor, electronic book,or the like and to a password control method. More particularly, theinvention relates to a storing apparatus for protecting an access ofinformation recorded on a medium by a password and relates to itspassword control method.

Hitherto, in a storing apparatus such as hard disk drive, optical diskdrive, or the like, data recorded on a medium is protected by using apassword. That is, an identification confirmation is performed by apassword so that only a specific person is authorized to read and writedata from/to the medium of the storing apparatus and the other personsare not allowed to access to the data. For example, a password ispreliminarily written and stored in a storing apparatus or a storagemedium. When the user inputs his password at the time of using thestoring apparatus and the password inputted by the user and the passwordstored on the apparatus side coincide with each other, a write commandor a read command to the storing medium is accepted. When the passwordsdo not coincide, the write or read command is not accepted and an erroris returned. A system of authorizing a person by the password asmentioned above is not limited to the access protection of the storingapparatus but is used in many cases such as a use of a terminalapparatus in a data communication system and the like. The protectionsystem using the password is widely used since a predetermined effectcan be expected although it is a technique which can be easily employed.

Since the access protection using the password as mentioned above iswidely used, however, an individual user has a number of passwords andit is often difficult to remember all of the passwords. When the userforgets the password which is used by himself, there is a problem suchthat even the authorized user cannot access. There is, accordingly, away of use such that the user records the password in a notebook or thelike and confirms the password in the notebook each time the apparatusis used. This results in a problem such that the password is known bystealingly seeing the notebook of the user. In the access protectionusing the password, since it is presumed that the user is urged to inputthe password every access, a third party such as a colleague of theuser's place of work has many chances to see the password. Thoseproblems are problems accompanied by the operation which always requiresan input of a password when the apparatus is used. A technique which canfurther reduce the frequency of inputting the password by the user whileperforming the access protection by the password is demanded. As amethod of solving the problem, a method of stopping the accessprotection by the password by eliminating the password at an arbitraryuse time point and newly setting a password when the access protectionis necessary can be considered. That is, it is a method of setting apassword only for a period of time in which the protection is necessaryand receiving the access protection. The method has, however, thefollowing problems. First, when a password is set again, the user oftensets a password different from the previous password, so that a passwordmanagement becomes complicated. That is, the user is likely to forgetthe newest password. Second, there is a danger that a third party stealsa glance at a scene when the user resets the password.

SUMMARY OF THE INVENTION

According to the invention, there are provided a storing apparatus andits password control method in which an access is permitted withoutneeding an input of a password by the user depending on a use scenewithout losing a function of an access protection by a password.

According to the invention, a storing apparatus for protecting an accessof information recorded on a medium by a password has a passwordpreserving unit and a password verifying unit. The password preservingunit preserves a default input password and a password for accessprotection. When there is no password input from the user, the passwordverifying unit substitutes the default input password for the user inputpassword and compares and collates the default input password with thepassword for access protection, thereby controlling the accessprotection. When there is a password input by the user, the user inputpassword and the password for access protection are compared andcollated, thereby controlling the access protection. Especially, whenthe password preserving unit preserves the same value as a default inputpassword and a password for access protection, even if there is nopassword input by the user, the password verifying unit substitutes thedefault input password for the user input password and collates thedefault input password with the password for access protection, therebypermitting the access. According to the invention as mentioned above,when the default input password is stored on the storing apparatus sideand there is no password input from the user, the password verificationis performed by regarding the default input password as a user inputpassword. Consequently, by setting the default input password and thepassword for access protection to the same value, even when the userdoes not input the password, the access is permitted and an access by anordinary command can be performed and the password input by the user canbe omitted.

The password preserving unit further has a user input password area forstoring the user input password. At the start of the use of theapparatus such as turn-on of a power source, command reset, error reset,medium insertion, or the like, the password verifying unit reads out thedefault input password and writes it into the user input password area.Subsequently, the password verifying unit establishes access permissionor access inhibition on the basis of a collation coincidence between thedefault input password in the user input password area and the passwordfor access protection. After establishing the access permission, eachtime the password is inputted by the user, the user input password iswritten in the user input password area and the access permission or theaccess inhibition is established on the basis of a collation coincidencewith the password for access protection.

In case of using a form in which the user certainly needs to perform theinput operation of the password, at the start of the use of theapparatus, the password verifying unit waits for the input of thepassword by the user in a state such that the default input password hasbeen read out and written into the user input password area. When thereis the password input by the user, after the default input password inthe user input password area was overwritten by the user input password,the password verifying unit collation compares it with the password foraccess protection, thereby controlling the access protection. When thedefault input password and the password for access protection aredifferent, information is naturally protected from access as long as theuser does not input the authorized password for access protection.

The password preserving unit preserves the default input password andthe password for access protection into the medium. In this instance, atthe start of the use of the apparatus, the password verifying unit readsout the default input password and the password for access protectionfrom the medium, stores them into a work memory of the unit in theapparatus, and controls the access protection. The password preservingunit can also preserve the default input password and the password foraccess protection into a non-volatile memory of the apparatus main body.Further, the password preserving unit can also preserve the defaultinput password into the non-volatile memory of the apparatus main bodyand preserve the password for access protection into the medium. In thiscase, at the start of the use of the apparatus, the password verifyingunit reads out the password for access protection from the medium,stores them into the work memory of the apparatus main body, andcontrols the access protection. Further, the password preserving unitpreserves the password for access protection into the non-volatilememory of the apparatus main body and preserves the default inputpassword into the medium. In this case, at the start of the use of theapparatus, the password verifying unit reads out the default inputpassword from the medium, stores it into the apparatus main body, andcontrols the access protection.

The medium has a password preserving area for preserving the passwordinto a special area which cannot be accessed by the user by ordinaryread command and write command, thereby preventing that the password isread out by the ordinary read command or is rewritten by the writecommand. Further, there is provided a password rewriting unit forrewriting the default input password or the password for accessprotection on the basis of a dedicated command from a host systemserving as an upper apparatus. As a medium, a medium fixedly enclosed inthe apparatus main body or a removal medium which is detachable for theapparatus main body can be also used.

The password preserving unit preserves a plurality of kinds of passwordsfor access protection according to the kinds of access protection. Thepassword verifying unit permits the access by an ordinary commandcorresponding to the kind of password for access protection in which thecollation coincidence is obtained. For example, the password preservingunit preserves a write/read password for permitting the access by theread and write commands and a read only password for permitting only theaccess by the read command as passwords for access protection. Thepassword verifying unit permits the access by the ordinary write or readcommand when the collation coincidence of the write/read password isobtained and permits the access only by the ordinary read command whenthe collation coincidence of the read only password is obtained.

Further, a validity term setting unit for setting a validity term in thedefault input password is provided. A state where the password input canbe omitted is limitedly continued only for a predetermined period oftime, thereby preventing that an unprotected state continues for aninadvertent long period. On the contrary, a method of setting theapparatus into the state where the password can be omitted after theelapse of a predetermined period of time can be also used. That is, byequalizing the default password to the password for access protectionafter a predetermined period, the apparatus can be set into a state inwhich the access can be performed after the predetermined period even ifa password is not inputted. The validity term setting unit counts thenumber of times of using the apparatus by a counter. When a count valueof the counter reaches a predetermined value, the default input passwordis forcedly changed to a different value, thereby disenabling theapparatus to be used. The validity term setting unit sets a time of avalidity term. If the present time when the apparatus is used exceedsthe validity term, the default input password is forcedly changed to adifferent value, thereby disenabling the apparatus to be used.

According to the invention, there is provided a password control methodfor protecting an access of information recorded on a medium by apassword, comprising:

-   -   a password preserving step of preserving a default input        password, a password for access protection, and a user input        password; and    -   a password verifying step of controlling an access protection by        substituting the default input password for the user input        password and comparison collating the default input password and        the password for access protection when there is no password        input from the user and of controlling an access protection by        comparison collating the user input password and the password        for access protection when there is a password input by the        user.

When the same value is preserved as a default input password and apassword for access protection, even if there is no password input bythe user, in the password verifying step, the default input password issubstituted for the user input password and the default input passwordis collated to the password for access protection, thereby permittingthe access. The password preserving step is characterized by preservinga plurality of kinds of passwords for access protection according to thekind of access protection. The password verifying step is characterizedby permitting the access by an ordinary command corresponding to thekind of password for access protection in which the collationcoincidence is obtained. Further, a validity term setting step ofsetting a validity term into the default input password is provided. Thedetailed construction other than the above construction is substantiallythe same as the apparatus construction.

The above and other objects, features, and advantages of the presentinvention will become more apparent from the following detaileddescription with reference to the drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a hard disk drive to which the invention isapplied;

FIG. 2 is a functional block diagram of an embodiment of the inventionin which a password has been preserved in a drive main body;

FIG. 3 is an explanatory diagram for an access protecting process forcapturing an access permission by a default input password in the casewhere there is no password input by the user;

FIG. 4 is an explanatory diagram for a command rewriting process of thedefault input password and a password for access control;

FIG. 5 is an explanatory diagram of an access kind in the invention;.

FIG. 6 is an explanatory diagram of a preserving mode of passwords inthe invention;

FIG. 7 is a functional block diagram of an embodiment of the inventionin which a password has been preserved in only a medium;

FIG. 8 is an explanatory diagram of a password preserving area in themedium in FIG. 7;

FIG. 9 is a functional block diagram of an embodiment of the inventionin which a password has been separately preserved in the drive main bodyand the medium;

FIG. 10 is a functional block diagram of another embodiment of theinvention in which a password has been separately preserved in the drivemain body and the medium;

FIG. 11 is a flowchart for an access protecting process in the casewhere there is no password input by the user;

FIG. 12 is a flowchart for an access protecting process in the casewhere the user inputs a password;

FIG. 13 is a flowchart for an access protecting process in which theuser certainly needs the password inputting operation;

FIGS. 14A and 14B are block diagrams of an optical disk drive to whichthe invention is applied;

FIG. 15 is an explanatory diagram of an internal structure of anapparatus in which an MO cartridge has been loaded;

FIG. 16 is a functional block diagram of an embodiment of the inventionin which a password has been preserved in only a removable medium;

FIG. 17 is an explanatory diagram for an access protecting process forcapturing an access permission by a default input password withoutinputting a password to an MO drive by the user;

FIG. 18 is an explanatory diagram of a password rewriting process toinhibit an access by a default input password;

FIG. 19 is a functional block diagram of an embodiment of the inventionin which a password has been preserved in an MO drive main body;

FIG. 20 is a functional block diagram of an embodiment of the inventionin which a password has been separately preserved in the MO drive mainbody and a removable medium;

FIG. 21 is a functional block diagram of another embodiment of theinvention in which a password has been separately preserved in the MOdrive main body and the removable medium;

FIG. 22 is a flowchart for an access protecting process in the casewhere there is no password input by the user in the MO drive;

FIG. 23 is a flowchart for a validity term managing process in FIG. 21for counting the number of using times by a counter and managing a termof a default input password; and

FIG. 24 is a flowchart for the validity term managing process in FIG. 21for setting and managing a time serving as a term of the default inputpassword.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

[Storing Apparatus of Fixed Medium]

FIG. 1 is a block diagram of a hard disk drive (HDD) to which a passwordprotection using a default input password of the invention is applied.In the hard disk drive, a magnetic disk medium is fixedly built in adrive main body. The hard disk drive is constructed by an enclosure 10and a control board 12 The enclosure 10 has a head IC circuit 14 andfour head assemblies 16-1 to 16-4 are connected thereto in theembodiment. Each of the head assemblies 16-1 to 16-4 has a recordinghead using an inductive head and a reproducing head using an MR head orthe like. The enclosure 10 also has a VCM 18 for driving a head actuatorand a spindle motor 20 for rotating a disk medium. For the head ICcircuit 14 in the enclosure 10, a write channel circuit 28 and a readchannel circuit 26 are provided on the control board 12 side. A harddisk controller 24 is provided for the write channel circuit 28 and theread channel circuit 26. A formatter, an ECC circuit, and the like arebuilt in the hard disk controller 24. The hard disk controller 24 isconnected to an interface circuit 36. The supply of write data from ahost serving as an upper apparatus and the transfer of read data to thehost are executed by a data transmission from/to the host side. As aninterface circuit 36, a proper interface such as SCSI interface, ATAinterface, ATAPI interface, SCSI, or the like can be used. In theembodiment, a constant density recording system (ZCDR) by a zonedivision is used as a recording system of a disk medium. Cylinders ofthe disk medium are divided into zones every predetermined number ofcylinders and different frequencies have been preset for respectivezones. For this purpose, a PLL circuit 30 functioning as a frequencysynthesizer is provided. By setting a corresponding zone frequency froma cylinder address upon reading or writing operation, clocks aresupplied to the write channel circuit 28 and read channel circuit 26.The whole control of the hard disk drive is performed by an MCU (maincontrol unit) 22. The hard disk controller 24 and interface circuit 36are connected to the MCU 22 via a bus and, further, an RAM 38functioning as a work memory and a flash ROM 40 functioning as anon-volatile memory are connected. The MCU 22 receives and decodesvarious commands from the host, instructs the hard disk drive to performan ordinary reading or writing operation by an ordinary command, andinstructs a servo controller 34 to execute a head positioning control bythe VCM 18 provided for the enclosure 10. In order to execute the headpositioning control by the driving of the VCM 18, a servo demodulatingcircuit 32 and the servo controller 34 are provided. In the embodiment,as servo information of the disk medium, a data surface servo system isused. Therefore, servo information is separated from a reproductionsignal for the read channel circuit 26 and head position information isreconstructed by the servo demodulating circuit 32.

FIG. 2 is a functional block diagram for access protection according tothe invention using a password which is realized by a program control ofthe MCU 22 provided for the control board 12 in FIG. 1. As an externalstoring apparatus for a host system 42 serving as an upper apparatus, ahard disk drive 44 is connected. The non-volatile memory 40 in the harddisk drive 44 has a password preserving area 45 in the embodiment. Inthe password preserving area 45, a default input password (DPW) 60, awrite/read password (PAO) 62, and a read only password (PAl) 64 arepreserved. The work memory 38 using an RAM has a user input passwordstoring area 65 for storing a user input password (UPW) 66. Thewrite/read password 62 and read only password 64 stored in thenon-volatile memory 40 are passwords for access protection forpermitting an access determined by each password when a passwordcollation coincidence is obtained as a result of the collation with theuser input password 66 inputted by the user from the upper apparatus.That is, when the collation coincidence with the user input password 66is obtained, the write/read password 62 permits a write access by anordinary write command or a read access by an ordinary read command to adisk medium 52. On the contrary, when the collation coincidence with theuser input password 66 is obtained, the read only password 64 permitsonly the read access to the disk medium 52 by the ordinary read command.That is, the write/read password 62 and read only password 64 have apassword function for determining the kind of access simultaneously withthe access protection. Although the access protection using thewrite/read password 62 and read only password 64 for access protectionis the same as the conventional access protection using a password, inaddition, the default input password 60 is newly preserved in theinvention.

The default input password 60 is a password for permitting an access tothe disk medium 52 in the hard disk drive 44 even if the user inputpassword 66 is not received from the host system 42 serving as an upperapparatus. Specifically, when there is no password input from the hostsystem 42 serving as an upper apparatus by the user at the start of theuse of the hard disk drive 44, the default input password 60 preservedin the non-volatile memory 40 is regarded as a user input password 66and is collation compared with the write/read password 62 and read onlypassword 64 serving as passwords for access protection. By the collationcomparison, for example, when the default input password 60 coincideswith the write/read password 62, the write access and read access by theordinary commands are permitted as access kinds which are designated bythe write/read password 62. In order to perform the access protectionusing the default input password 60, the hard disk drive 44 has acommand processing unit 46, a password verifying unit 48, and an accessexecuting unit 50. The command processing unit 46 receives and decodes acommand from the host system 42 serving as an upper apparatus andexecutes a necessary process. For example, at the start of the use ofthe apparatus, when the user inputs a password, the password inputted bythe user is sent to the hard disk drive 44 by a password transfercommand. The password transferring command is decoded by the commandprocessing unit 46 and the user input password 66 acquired as a commandparameter is written into the user input password storing area 65 in thework memory 38. The command processing unit 46 also has a passwordrewriting unit 54. The default input password 60, write/read password62, and read only password 64 stored in the non-volatile memory 40 canbe rewritten and changed by a password rewriting dedicated command whichis supported by an interface for the host system 42 serving as an upperapparatus. As a password rewriting command, for example, in case of theSCSI interface, a format command, a vendor unique command, or the likecan be used. The password verifying unit 48 has a password collatingunit 56 and an accessing mode setting unit 58. At the start of the useof the hard disk drive 44, the password collating unit 56 first readsout the default input password 60 from the non-volatile memory 40 andwrites it into the user input password storing area 65 in the workmemory 38. Consequently, at the start of the use of the apparatus, avalue of the default input password 60 is first set as a user inputpassword 66. As processes after the default input password 60 waswritten as a user input password 66 into the user input password storingarea 65 in the work memory 38, there are the following two processes.

-   -   I. a process for executing a password collation without waiting        for a password input by the user    -   II. a process for waiting for an executing operation for the        password input by the user and executing a password collation

In the process which does not wait for the password input by the user,when the writing of the default input password 60 into the user inputpassword storing area 65 in the work memory 38 is finished, the userinput password 66 is read from the work memory 38, the write/readpassword 62 is read out from the non-volatile memory 40, and thepasswords 66 and 62 are collated with each other. When the collationcoincidence is obtained by the password collation, an accessing modewhich is determined by the write/read password 62 is set by theaccessing mode setting unit 58 and a permitting state of the writeaccess by the ordinary write command and the read access by the readcommand from the host system 42 serving as an upper apparatus isestablished for the access executing unit 50. On the other hand, in theprocess which waits for the password input operation by the user fromthe host system 42 serving as an upper apparatus, after the defaultinput password 60 was written into the user input password storing area65 in the work memory 38 by the password collating unit 56, theapparatus waits for the reception of the password transfer command fromthe host system 42 serving as an upper apparatus. When the passwordtransfer command is received by the command processing unit 46, thepassword received as a command parameter is overwritten into the userinput password storing area 65 in the work memory 38. The user inputpassword 66 after overwriting and the write/read password 62 in thenon-volatile memory 40 are read out and collated by the passwordcollating unit 56. When the collation coincidence is obtained, thewriting/reading mode is set as an accessing mode by the accessing modesetting unit 58. In this case, in the invention, with respect to thecase where the user does not input a character train of the password andexecutes the password input in the host system 42 serving as an upperapparatus while an input column of the password is left vacant, even ifthe character train of the user input password is not substantiallyreceived, the access permitting state based on the default inputpassword 60 is established. That is, even if the command processing unit46 receives the password transfer command from the upper apparatus, whenthe character train of the password as a command parameter is a spacecharacter train, the password collating unit 56 reads out the user inputpassword 66 which has already been rewritten to the default inputpassword 60 and collates it with the write/read password 62 in thenon-volatile memory 40. When the collation coincidence is obtained, thewriting/reading mode is set as an accessing mode by the accessing modesetting unit 58. As the contents of an apparatus use start timing whenthe password verifying unit 48 in the hard disk drive 44 executes theaccess protection based on the default input password 60 in thenon-volatile memory 40, there are the following timings.

-   -   I. when the power source of the hard disk drive 44 is turned on,    -   II. when a command is reset by an interface with the host system        42 serving as an upper apparatus,    -   III. when the hard disk drive 44 enters a serious error state        and is recovered by an internal reset,        and the like.

FIG. 3 shows a processing operation of the access protection which doesnot require the password input of the user in FIG. 2. The default inputpassword 60, write/read password 62, and read only password 64 preservedin the non-volatile memory 40 in FIG. 2 have been initialized to apredetermined specific value, for example, all “0” when the hard diskdrive 44 is initialized in a low level format. The hard disk drive 44 inFIG. 3 has the default input password 60 and write/read password 62which are in the initializing state and each password is equal to“0000000h” in hexadecimal. The read only password 64 in FIG. 2 which isnot shown in FIG. 3 is also equal to “00000000h”. When it is assumedthat the power source of the hard disk drive 44 is turned on in such astate where the default input password 62 and write/read password 62 arepreserved by the same value by the initialization, on the hard diskdrive 44 side, the password verifying unit 48 in FIG. 2 first reads outthe default input password 60 and executes a writing process 70 forwriting the default input password 60 as a user input password 66 intothe user input password storing area 65 in the vacant state.Subsequently, the user input password 66 in which the value of thedefault input password 60 has been written and the write/read password62 are read out and a collation comparing process 72 is executed. Inthis case, the user input password 66 has the same value as that of thewrite/read password 62 by the writing process 70 using the default inputpassword 60. When the collation coincidence is obtained, an accesspermission 74 which provides the writing/reading mode is performed. Thecase where the value of each of the default input password 60 andwrite/read password 62 is equal to “00000000h” by the initialization hasbeen described here as an example. After the hard disk drive 44established the access permission and the write and/or read access waspermitted, the values of the default input password 60, write/readpassword 62, and further, read only password 64 can be rewritten toother values by a password rewriting command from the upper interface.Further, the value of the read only password 64 can be rewritten toanother value. The rewriting of the passwords is executed by thepassword rewriting unit 54 in the command processing unit 46 in FIG. 2.

FIG. 4 shows a password rewriting process by the password rewriting unit54 in FIG. 2. A rewriting command of the write/read password (accessprotection password) 62 is first issued from the host system 42 sideserving as an upper apparatus. The rewriting command of the write/readpassword 62 is, for example, [Change Password. “0F1E2D3C”). By therewriting command, the value, “00000000h” of the write/read password 62in FIG. 3 is rewritten to “0F1E2D3Ch” by a rewriting process 76 in FIG.4 When the write/read password 62 is rewritten as mentioned above, toestablish the access permission which does not need the password inputby the user, the default input password 60 is also rewritten to the samevalue as the write/read password 62. The rewriting command of thedefault input password 60 is, for example, [Change Default Psw“0F1E2D3C”] and the default input password 60 is rewritten to the samevalue as the write/read password 62 by a rewriting process 78. Theaccess protection password can be also rewritten in association with thedefault input password which has been set.

After the default input password 60 and write/read password 62 as anaccess protection password were rewritten to the other values, when theuse of the hard disk drive 44 is restarted, even if the user does notinput the password by the host system 42 serving as an upper apparatus,the value of the default input password 60 is written as a user inputpassword 66 by a writing process 80. When a collation comparing process82 between the user input password 66 in which the default inputpassword 60 has been written and the write/read password 62 is executednext, since the passwords coincide with each other, an access permission84 of the write/read access is established. It will be obviouslyunderstood that if the user wants to inhibit the access when a correctpassword is not inputted, it is sufficient to rewrite either one of thedefault input password 60 and write/read password 62 which have been setto all “0” due to the initialization in FIG. 3 to another value. Whenthe default input password 60 and write/read password 62 are different,dissidence is obtained by the collation coinciding process, so that theaccess permission cannot be obtained. The access permission can beestablished only by the password input by the user which coincides withthe write/read password 62.

FIG. 5 shows an accessing mode and access contents of the hard diskdrive 44 which are established by the accessing mode setting unit 58provided for the password verifying unit 48 in FIG. 2. That is, theaccessing mode comprises three modes of a writing/reading mode, a readonly mode, and a security mode. In the writing/reading mode, theordinary read command and write command are accepted. A change of thedefault input password, write/read password, and read only password isalso permitted. In the read only mode, only the ordinary read command isaccepted. In this case as well, a change of the default input password,write/read password, and read only password is permitted. Further, inthe security mode, although the access by the ordinary read command andwrite command is perfectly inhibited, the read command or write commandaccompanied with the password input is accepted. It will be obviouslyunderstood that the access for each command is permitted for the firsttime when the password collation coincidence is obtained. The embodimentof FIG. 2 relates to the case where the default input password 60,write/read password 62, and read only password 64 have been preserved inthe non-volatile memory 40 of the hard disk drive 44. However, asanother embodiment of the invention, all of the passwords can be storedin the magnetic disk medium 52 or can be also separately preserved intothe non-volatile memory 40 and magnetic disk medium 52 of the hard diskdrive 44.

FIG. 6 shows a preserving mode of the password in the hard disk drive 44of the invention. A preserving mode 1 relates to the embodiment of FIG.2 and both of the default input password and the password for accessprotection are stored on the hard disk drive 44 side. A preserving mode2 relates to the case where all of the default input password and thepassword for access protection are stored in the magnetic disk medium52. A preserving mode 3 relates to the case where the default inputpassword is stored on the hard disk drive 44 side and the password foraccess protection is stored on the magnetic disk medium 52 side.Further, a preserving mode 4 relates to the case where the default inputpassword is preserved in the magnetic disk medium 52 and the passwordfor access protection is stored in the hard disk drive 44. Thepreserving modes 2, 3, and 4 will now be specifically explained withreference to FIGS. 7, 9, and 10.

FIG. 7 shows the preserving mode 2 in FIG. 6. The default input password60, write/read password 62, and read only password 64 are preserved in apassword storing area 68 of the magnetic disk medium 52. Therefore, atthe start of the use of the hard disk drive 44, the password verifyingunit 48 reads out the default input password 60, write/read password 62,and read only password 64 from the magnetic disk medium 52 via theaccess executing unit and develops them into a password storing area 67in the work memory 38. The user input password storing area 65 to storethe user input password 66 is assured in the work memory 38.

FIG. 8 shows a password preserving state of the magnetic disk medium 52in FIG. 7. In the embodiment, since a logical block address LBA=1 of themagnetic disk medium has been allocated to a disk managing area 71 whichcannot be accessed by the ordinary read command or write command, thepassword storing area 68 is assured as a dedicated area in the diskmanaging area 71. The default input password 60, read only password 64,and write/read password 62 are preserved in the password storing area68.

FIG. 9 relates to the preserving mode 3 in FIG. 6. The default inputpassword 60 is preserved in the password preserving area 45 assured inthe non-volatile memory 40 serving as a hard disk drive 44 side. On theother hand, the write/read password 62 for access protection and readonly password 64 are preserved in the password storing area 68 of themagnetic disk medium 52. Therefore, the password storing area 67 isassured in the work memory 38. At the start of the use of the hard diskdrive 44, the password verifying unit 48 first reads out the write/readpassword 62 and read only password 64 from the password storing area 68of the magnetic disk medium 52 through the access executing unit 50 anddevelops them into the work memory 38. Obviously, the user inputpassword storing area 65 to store the user input password 66 is alsoassured in the work memory 38.

FIG. 10 relates to the preserving mode 4 in FIG. 6. In the embodiment,the default input password 60 is preserved in the password storing area68 of the magnetic disk medium 52. On the other hand, the write/readpassword 62 for access protection and read only password 64 arepreserved in the password preserving area 45 provided in thenon-volatile memory 40 of the hard disk drive 44. The password storingarea 67 is assured in the work memory 38. At the start of the use of thehard disk drive 44, the password verifying unit 48 first reads out thedefault input password 60 from the password storing area 68 of themagnetic disk medium 52 through the access executing unit 50 anddevelops it into the work memory 38 as shown in the diagram. Processingfunctions of the command processing unit 46, password verifying unit 48,access executing unit 50, password rewriting unit 54, password collatingunit 56, and accessing mode setting unit 58 provided in the hard diskdrive 44 in each of the preserving modes 2, 3, and 4 in FIGS. 7, 9, and10 are the same as those in the embodiment of the preserving mode 1 inFIG. 2.

FIG. 11 is a flowchart for an access protecting process in which thepassword input by the user is unnecessary in the access protection ofthe invention for the hard disk drive 44 as a target. This process willnow be described with respect to the embodiment of the preserving mode 1in FIG. 2 as an example. When the use of the hard disk drive 44 isstarted in response to the turn-on of the power source of the hard diskdrive 44, a reset command of the interface during the operation,further, an internal reset from a serious error, or the like, first instep S1, a setting process for reading out the default input password 60and writing into the user input password storing area 65 is executed. Instep S2, the user input password 66 rewritten to the default inputpassword 60 and the write/read password 62 are compared and collated. Inthis instance, as shown in FIG. 3, if the user input password 66 andwrite/read password 62 are set to the same value, the collationcoincidence is obtained in step S3. The writing/reading mode isestablished in step S6. In step S3, when the user input password 66rewritten by the default input password 60 does not coincide with thewrite/read password 62, the read only password 64 is compared andcollated with the user input password 66 rewritten by the default inputpassword 60 in step S4. As a result of the comparison collation, whenthe collation coincidence is obtained in step S5, the read only mode isset in this case in step S7. When the collation dissidence is obtainedeven in step S5, the processing routine advances to the security mode instep S8. The access by the ordinary read command or write command isperfectly inhibited and only the access in response to the passwordinput by the user is accepted.

FIG. 12 is a flowchart for an access protecting process in the casewhere the user inputs a password. The process in the case where the userinputs the password is executed so long as there is the password inputby the user at any one of the proper timings corresponding to a statewhere the processing routine enters the security mode in step S8 in FIG.11, the case where the user inputs the password at the time of the startof the use of the apparatus, and further, during the operation. First,when a password transfer command in association with the password inputby the user is received, in step S1, the password inputted by the useris set as a user input password 66 into the user input password storingarea 65 in the work memory 38. In step S2, the user input password 66and write/read password 62 are compared and collated. When the collationcoincidence is obtained in step S3, the writing/reading mode is set instep S6. If they do not coincide, the user input password is comparedand collated with the read only password in step S4. If the collationcoincidence is obtained in step S5, the read only mode is set in stepS7. When the collation dissidence is obtained even in step S5, thesecurity mode is set in step S8 and the access by the ordinary commandis completely inhibited.

FIG. 13 is a flowchart for another embodiment of the access protectionof the invention for the hard disk drive 44 as a target. In theflowchart, the password inputting operation by the user is certainlynecessary. The processes in FIG. 13 will now be described as followswith regard to the embodiment of the preserving mode 1 in FIG. 2 as anexample. When the use of the apparatus is started by the turn-on of thepower source of the hard disk drive 44 or the like, first in step S1,the default input password 60 is read out and set as a user inputpassword 66 into the user input password area 65. In step S2, theapparatus waits for the password input of the user. When the passwordtransfer command is received by the execution of the password inputtingoperation of the user, the presence or absence of the password input bythe user is discriminated. The processing routine advances to step S3and a check is made to see if the password inputted by the user is avacant character train. If the character train has been normally storedin the password inputted by the user, step S4 follows and the passwordinputted by the user is overwritten into the user input password area65. When the password inputted by the user is the vacant charactertrain, the overwriting in step S4 is not performed. The value of thedefault input password 60 written in step S1 is left as it is as a userinput password 66. In step S5, the user input password 66 and write/readpassword 62 are compared and collated. If the collation coincidence isobtained in step S6, the writing/reading mode is set in step S9. Whenthe collation dissidence is obtained, the user input password 66 andread only password 62 are compared and collated in step S7. When thecollation coincidence is obtained in step S8, the read only mode is setin step S10. When the collation dissidence is derived, the security modeis set in step S11 and the access by the ordinary command is inhibited.In the processes of FIG. 13, in the case where the user does not input acharacter train of the password but executes only the executingoperation of the password input, the vacant character train of thepassword inputted by the user is recognized and the comparison collationusing the default input password in place of the user input password isexecuted. Substantially, the user can establish the accessible state ofthe hard disk drive 44 without needing the character train of thepassword.

[Storing Apparatus of the Removable Medium]

FIGS. 14A and 14B are circuit block diagrams of a magnetooptic diskdrive as a storing apparatus using a removable medium to which theinvention is applied. The embodiment can be obviously applied as it isto a changeable storing apparatus such as removable magnetic disk, phasechange type optical disk, or the like. The optical disk drive isconstructed by a control board 110 and an enclosure 111. The controlboard 110 comprises: an MCU 112 to perform a whole control of themagnetooptic disk drive; an RAM 106 serving as a work memory; a flashROM 108 serving as a non-volatile memory; an interface 117 fortransmitting and receiving commands and data to/from an upper apparatus;a magnetooptic disk controller (ODC) 114 to perform processes which arenecessary to write and read data to/from the optical disk medium; a DSP116; and a buffer memory 118. A formatter 114-1 and an ECC processingunit 114-2 are provided for the magnetooptic disk controller 114. At thetime of the write access, the formatter 114-1 divides NRZ write data ona sector unit basis of the medium and forms a recording format. The ECCprocessing unit 114-2 forms and adds an ECC code on a sector write dataunit basis and, further, forms and adds a CRC code as necessary.Moreover, the sector data after completion of the ECC encoding isconverted into, for example, a 1-7 RLL code. At the time of the readaccess, the demodulated sector read data is inversely converted from the1-7 RLL code and is subjected to a CRC check by the ECC processing unit114-2. After that, error detection and correction are performed. Inaddition, the NRZ data of the sector unit is coupled by the formatter114-1, thereby forming a stream of the NRZ read data and transferring itto the upper apparatus. A write LSI circuit 120 is provided for theoptical disk controller 114. A write modulating unit 121 and a laserdiode control unit 122 are provided for the write LSI circuit 120. Acontrol output of the laser diode control unit 122 is supplied to alaser diode unit 130 provided on the enclosure 111 side. The laser diodeunit 130 integratedly has a laser diode 130-1 and a detector 130-2 formonitoring. The write modulating unit 121 converts the write data into adata format of the PPM recording or PWM recording. A magnetoopticstorage medium is used as a removable medium to perform the recordingand reproduction by using the laser diode unit 130. A recording formatof the medium is the zone CAV. Further, as a recording system of themedium, the pit position recording (PPM) recording to record data incorrespondence to the presence or absence of a mark on the medium or apulse width recording (PWM recording) to make the edges of the mark,namely, a leading edge and a trailing edge correspond to the data isused. When an MO cartridge medium is loaded into the optical disk drive,an ID portion of the medium is first read, the kind of medium isrecognized by the MCU 112 from a pit interval, and a recognized resultof the kind is notified to the write LSI circuit 120. The sector writedata from the optical disk drive 114 is converted into PWM recordingdata by the write modulating unit 121. The PWM recording data convertedby the write modulating unit 121 is supplied to the laser diode controlunit 122 and is written to the medium by the light emission driving ofthe laser diode 130-1. A read LSI circuit 124 is provided as a readingsystem for the optical disk drive 114. A read demodulating unit 125 anda frequency synthesizer 126 are built in the read LSI circuit 124. Aphotosensing signal of the medium return light of the laser beam from adetector 132 for ID/MO is inputted as an ID signal and an MO signal tothe read LSI circuit 124 through a head amplifier 134. Circuit functionsof an AGC circuit, a filter, a sector mark detecting circuit, and thelike are provided for the read demodulating unit 125 of the read LSIcircuit 124. A read clock and read data are formed from the inputted IDsignal and MO signal. The PWM recording data is demodulated to theoriginal NRZ data. Since the zone CAV is used as a control system of aspindle motor 140, a setting control of a frequency dividing ratio togenerate a clock frequency corresponding to the zone is performed fromthe MCU 112 to the frequency synthesizer 126 having the read LSI circuit124 therein. The frequency synthesizer 126 is a PLL circuit having aprogrammable frequency divider and generates a reference clock having apredetermined peculiar frequency as a read clock in accordance with thezone position of the medium. The read data demodulated by the read LSI124 is supplied to the magnetooptic disk controller 114. Aftercompletion of the inverse conversion of the 1-7 RLL code, the read datais subjected to the CRC check and the ECC process by an encodingfunction of the ECC processing unit 114-2. The NRZ sector data isreconstructed and coupled to the stream of the NRZ read data by theformatter 114-1. After that, the resultant data is transferred to theupper apparatus by the upper interface 117 via a buffer memory 118.

A detection signal of a temperature sensor 136 provided on the enclosure111 side is supplied to the MCU 112 via the DSP 116. On the basis of anenvironmental temperature in the apparatus, each of the light emittingpowers for reading, writing, and erasing in the laser diode control unit122 is controlled to the optimum value. The MCU 112 controls the spindlemotor 140 by a driver 138 through the DSP 116, thereby allowing the diskto rotate at a constant velocity of, for example, 6000 r.p.m. The MCU112 supplies a current from the DSP 116 to an electromagnet provided onthe enclosure 111 side through a driver 142, thereby applying arecording magnetic field to the medium. The DSP 116 has a servo functionto position the beam from the laser diode unit 130 for the medium andexecutes a seek control for seeking the optical head to a target trackso as to obtain an on-track state. The seek control can besimultaneously executed in parallel with the write access or read accessin response to an upper command by the MCU 112. To realize the servofunction of the DSP 116, a detector 145 for FES to receive the beamreturn light from the medium is provided for the optical unit on theenclosure 111 side. An FES detecting circuit (focusing error signaldetecting circuit) 146 forms a focusing error signal El from aphotosensing output of the detector 145 for FES and supplies it to theDSP 116. A detector 147 for TES to receive the beam return light fromthe medium is provided for the optical unit on the enclosure 111 side. ATES detecting circuit (tracking error signal detecting circuit) 148forms a tracking error signal E2 from a photosensing output of thedetector 147 for TES and supplies it to the DSP 116. The tracking errorsignal E2 is inputted to a TZC detecting circuit (track zero-cross pointdetecting circuit) 150, by which a track zero-cross pulse E3 is formedand inputted to the DSP 116. A lens position sensor 154 to detect thelens position of an objective lens for irradiating the laser beam to themedium is provided on the enclosure 111 side. A lens position detectionsignal (LPOS) E4 is inputted to the DSP 116. Further, to control theposition of the beam spot on the medium, the DSP 116 controls a focusingactuator 160, a lens actuator 164, and a VCM 168 through drivers 158,162, and 166, respectively.

An outline of the enclosure 111 in the optical disk drive is as shown inFIG. 15. The spindle motor 140 is provided in a housing 167. A loadingsuch that by inserting an MO cartridge 170 from an inlet door 169 sideto a hub of a rotary shaft of the spindle motor 140, an internal MOmedium 172 is attached to a hub of the rotary shaft of the spindle motor140 is performed. A carriage 176 which is movable in the direction whichtraverses the medium tracks by the VCM 168 is provided under the MOmedium 172 of the loaded MO cartridge 170. An objective lens 180 ismounted on the carriage 176. A beam from a laser diode provided for afixed optical system 178 is inputted to the objective lens 180 through aprism 181, thereby forming a beam spot onto the medium surface of the MOmedium 172. The objective lens 180 is moved in the optical axialdirection by the focusing actuator 160 provided in the enclosure 111 inFIGS. 14A and 14B and can be moved in a range of, for example, tens oftracks in the radial direction which traverses the medium tracks by thelens actuator 164. It is also possible to construct such that the lensactuator 164 is not provided but the tracking control is performed byonly the movement of the carriage 176 by the VCM 168.

FIG. 16 shows an embodiment of the access protection by using thedefault input password of the invention for the optical disk drive inFIGS. 14A and 14B as a target. The embodiment is characterized in thatthe default input password, write/read password, and read only passwordare preserved in the storage medium in accordance with the preservingmode 1 in FIG. 6. In FIG. 17, a password storing area 182 is provided inan area which cannot be read out by the ordinary command of the MOmedium 172. The default input password 60, write/read password 62, andread only password 64 are stored in the password storing area 182. Auser input password storing area 202 is provided in the work memory 106.The user input password 66 is stored in the user input password storingarea 202. When the MO cartridge 170 is inserted into an optical diskdrive 90, the default input password 60, write/read password 62, andread only password 64 are read out and stored into a password storingarea 200 in the work memory 106 as shown in the diagram and aresubjected to an access protecting process by a command processing unit92, a password verifying unit 94, and an access executing unit 96. Forthe access protection using the default input password, the commandprocessing unit 92, password verifying unit 94, and access executingunit 96 are provided for the optical disk drive 90. The passwordverifying unit 94 has a password collating unit 100 and an accessingmode setting unit 102. A password rewriting unit 98 is provided for thecommand processing unit 92. Such a construction on the driving side isfundamentally the same as that in the embodiment of FIG. 2 for, forexample, the hard disk drive as a target. However, further, in theoptical disk drive 90 using the MO cartridge 170 having the MO medium172 as a removable medium, a validity term managing unit 104 is newlyprovided for the password verifying unit 94. The validity term managingunit 104 manages a term when the default input password 60 is validlyused. If a validity term which has been preset in the MO medium 172 oroptical disk drive 90 expired, the default input password 60 is forcedlyrewritten to a different value. Consequently, in the validity term, evenif the default input password 60 is the same as the write/read password62, if the validity term expired, the default input password is changedto a value different from the write/read password 62, namely, a valuecorresponding to the EX-OR with a hexadecimal value “3F231200”, so thatthe access of the optical disk drive 90 in which the password is notinputted is inhibited. On the contrary, when a predetermined period oftime elapses, the default input password 60 is loaded so as to berewritten in accordance with a certain rule. A value such that when thedefault input password is rewritten by this rule, it is equalized to,for example, the write/read password 62 serving as an access protectionpassword is set as a rewrite value. With this method, the apparatus canbe used by a method such that when the predetermined period of timeelapses, the access can be performed without inputting any password.

FIG. 17 shows a processing operation of the access protection which doesnot need a password input of the user in the optical disk drive 90 inFIG. 16. The MO disk 172 has already been initialized at a time pointwhen the apparatus is shipped out from the manufacturer of the medium. Ahexadecimal value “CF23CF23h” as an initial value when the MO cartridge170 is initialized has been stored in the default input password 60,write/read password 62, and read only password 64. Therefore, when theuse of the optical disk drive is started in the preserving state of theinitialized passwords, the default input password 60 is first read outand written into the user input password storing area 202 as a userinput password 66 by a writing process 184. Subsequently, a collationcomparing process 186 of the user input password 66 in which the defaultinput password 60 has been written and the write/read password 62 isexecuted. When a collation coincidence is obtained, an access permission188, namely, the writing/reading mode is'set. Therefore, even in theoptical disk drive 90 in FIG. 16, the user can establish an accesspermitting state of the MO cartridge 170 without needing the passwordinput.

FIG. 18 shows a case where the password is rewritten in the state of thewriting/reading mode in which the access permission based on the defaultinput password has been established as shown in FIG. 17. In the passwordrewriting, the initial value “CF23CF23h” of the default input password60 in FIG. 17 is rewritten to another value “AB89AB89h” by a rewritingprocess 192 based on a password rewriting command 190. If the defaultinput password 60 is rewritten to another value as mentioned above, whenthe use of the optical disk drive 90 is started, unless the user inputsa password, the user input password 66 is first rewritten to a value“AB89AB89h” of the default input password 60 after the change by awriting process 194. Subsequently, a collation comparing process 196between this value and the value “CF23CF23h” of the write/read password62 is executed. In this case, since a collation dissidence is obtained,an access inhibition 198, namely, the security mode is set.

The rewriting of the default input password 60 as shown in FIG. 19 iseffective in the following case. First, the authorized inherent user Mr.A of the optical disk drive 90 requests a secretary Mr. B to perform aprocess in a state where the default input password 60 and write/readpassword 62 are set to the same initial value “CF23CF23h” as shown inFIG. 17. Mr. B who received the request turns on the power source, sothat the reading/writing mode by the access permission based on thedefault input password 60 is established even if he does not know thepassword. He can execute the process using the optical disk drive 90.The inherent user Mr. A preliminarily requests Mr. B, whom Mr. Arequested the work, to input a password rewriting command (ChangeDefault Psw “AB89AB89”) if he finished the work. Mr. B who received therequest inputs the command instructed from Mr. A if the work wasfinished. When the command is inputted, the default input password 60 isrewritten to “AB89AB89h” as shown in FIG. 18. Therefore, Mr. B whoreceived the request from the inherent user Mr. A and performed the workfinishes the work, rewrites the default input password 60, and executesan ejecting operation of the MO cartridge 170. Thus, in response to aninstruction in association with the ejecting operation, the defaultinput password 60, write/read password 62, and read only password 64developed in the work memory 106 are written back to the passwordstoring area 182 of the MO cartridge 170. After that, the MO cartridge170 is ejected. Therefore, after the MO cartridge 170 was ejected, evenif the MO cartridge 170 is again inserted into the optical disk drive90, the default input password 60 which is read out and stored into thework memory 106 at this time is changed to a value different from thewrite/read password 62 as shown in FIG. 18. Unless the value of thewrite/read password 60 is inputted as a password, the access to the MOcartridge 170 can be perfectly inhibited. That is, the inherent user Mr.A instructs Mr. B to input a default input password rewriting commandafter the end of the work, thereby constructing in a manner such thatafter Mr. B finished the work, even if Mr. B as well as the third personturns on the power source in order to use the optical disk drive 90 ofMr. A, unless he inputs the password “CF23CF23h” which is known for onlythe inherent user Mr. A, the optical disk drive 90 enters the securitymode and the access can be completely inhibited.

FIG. 19 shows an embodiment of the optical disk drive 90 correspondingto the preserving mode 1 in FIG. 6. This embodiment is characterized inthat the default input password, write/read password, and read onlypassword are preserved on the drive main body side. The password storingarea 200 is provided in the non-volatile memory 108 of the optical diskdrive 90. The default input password 60, write/read password 62, andread only password 64 are stored in the password storing area 200. Theuser input password storing area 202 is provided in the work memory 106.The user input password 66 is stored in the user input password storingarea 202. For the purpose of the access protection using the defaultinput password, the command processing unit 92, password verifying unit94, and access executing unit 96 are provided for the optical disk drive90. The password verifying unit 94 has the password collating unit 100and accessing mode setting unit 102. The password rewriting unit 98 isprovided for the command processing unit 92. Further, the validity termmanaging unit 104 is newly provided for the password verifying unit 94.

FIG. 20 shows an embodiment of the optical disk drive 90 correspondingto the preserving mode 3 in FIG. 6. This embodiment is characterized inthat the default input password 60 is preserved in the password storingarea 200 in the non-volatile memory 108 of the optical disk drive 90 andthe write/read password 62 and read only password 64 are preserved inthe password storing area 182 of the MO cartridge 170 as a removablemedium. Therefore, when the MO cartridge 170 is inserted into theoptical disk drive 90, the password verifying unit 94 first reads outthe write/read password 62 and read only password 64 from the passwordstoring area 182 of the MO cartridge 170 through the access executingunit 96 and develops them into the work memory 106.

FIG. 21 shows an embodiment of the optical disk drive 90 to which thepreserving mode 4 in FIG. 6 is applied. In the preserving mode 4, thewrite/read password 62 for access protection and the read only password64 are preserved in the password storing area 200 in the non-volatilememory 108 of the optical disk drive 90. The default input password 60is preserved in the password storing area 182 of the MO cartridge 170.Therefore, when the MO cartridge 170 is inserted into the optical diskdrive 90, the password verifying unit. 94 reads out the default inputpassword 60 from the MO cartridge 170 through the access executing unit96 and develops it into a password storing area 204 in the work memory106 as shown in the diagram.

FIG. 22 is a flowchart for the access protecting process in the casewhere the user does not input a password in the optical disk drive 90. Acase of the preserving mode 2 in FIG. 6 will now be described as anexample. When the MO cartridge 170 is inserted into the optical diskdrive 90, in step Si, the default input password 60 is read out andwritten and set as a user input password 66 into the user input passwordarea. In step S2, the user input password 66 and write/read password 62are compared and collated. When the collation coincidence is obtained instep S3, the writing/reading mode is set in step S6. When the collationdissidence is obtained, the user input password 66 and read onlypassword 64 are compared and collated in step S4. When the collationcoincidence is obtained in step S5, the read only mode is set in stepS7. When the collation dissidence is obtained, the security mode is setin step S8 and the access which is not accompanied with the password isperfectly inhibited. When the writing/reading mode or reading mode isset in step S6 or S7, a term managing process by the validity termmanaging unit 104 provided in the password verifying unit 94 is executedin step S9.

FIG. 23 is a flowchart for an embodiment of the term managing process instep S9 in FIG. 22. In the term managing process, first in step S1, thepresence or absence of the initialization of the default input passwordor the change by the command is discriminated. When there is theinitialization or change, the counter DPC is set to DPC=0 in step S2. Instep S3, a count value of the counter DPC is increased by “1”. If thereis not the initialization or change of the default input password, stepS2 is skipped and the count value of the counter DPC is increased by “1”in step S3. In step S4, a check is made to see whether the count valueof the counter DPC is equal to or larger than a specified value NXXwhich gives a predetermined validity term or not. When the value of thecounter DPC is less than the specified value NXX, step S5 is skipped.However, when the value of the counter DPC is equal to or larger thanthe specified value NXX, step S5 follows and a random number train RX isgenerated in the optical disk drive 90. The exclusive OR between thevalue PD of the default input password and the random number train RX isobtained and is set to a value of the new default input password. Thatis, in the embodiment, the number of using times of the optical diskdrive 90 is counted by the counter DPC. When the number of using timesreaches the specified value NXX, the default input password is forcedlychanged to a value which cannot be known by the user by using the randomnumber train, thereby inhibiting the access permission in which thepassword is not inputted after the validity term.

FIG. 24 is a flowchart for another embodiment of the term managingprocess of the default input password in step S9 in FIG. 22. In the termmanaging process, in step S1, the presence or absence of theinitialization or change of the default input password is discriminated.If there is the initialization or change, the time of a predeterminedvalidity term is set into the counter DPC in step S2. In step S3, acheck is made to see if the present time is a time after the validityterm set in the counter DPC. When the present time is the time after thetime of the validity term of the counter DPC, step S4 follows. In amanner similar to the case of FIG. 23, the random number train RX isgenerated in the optical disk drive 90 and is replaced by the exclusiveOR between the random number train RX and the value PD of the defaultinput password in this instance. The value of the default input passwordis forcedly changed to a different value and the access of the opticaldisk drive 90 irrespective of the password input after the validity termis perfectly inhibited. It is possible to set a using method such thatwhen the present time is the time after the validity term of the counterDPC and the processing routine advances to step S5, the default inputpassword 60 is changed to an access protection password, for example,the value which is equal to the write/read password 62, thereby makingit possible to access even if the password is not inputted after theelapse of a predetermined period of time. In the optical disk drive 90,the process in the case where the user does not input the password inthe flowchart of FIG. 22 has been shown as an example. However, theprocesses in the case where the user inputs the password are the same asthose in the flowchart of FIG. 12 in the hard disk drive. The processesin the flowchart of FIG. 13 of the hard disk drive in which the user isallowed to certainly execute the password inputting operation can bealso applied as they are to the optical disk drive 90.

As mentioned above, according to the invention, the default inputpassword is stored on the apparatus side where it is protected by usingthe password, for example, on the storing apparatus side, and when thereis no password input from the user, the default input password isregarded as a user input password and the verification of the passwordis performed. Therefore, by setting the default input password and thepassword for access protection to the same value, even if the user doesnot input any password, the access protection is cancelled and theaccess by the ordinary command can be performed. The password input bythe user can be remarkably omitted.

In the case where the access has already been permitted in the storingapparatus, by enabling the default input password to be rewritten by theuser, the user can selectively use the access protection which does notneed the password input and the access protection which needs thepassword input as necessary.

Further, the validity term of the default input password is managed and,when the present time exceeds the validity term, the default inputpassword is forcedly changed to another value which cannot be known bythe user. Thus, the accessible state of the storing apparatus in whichthe password input is omitted can be limitedly continued for only apredetermined period of time. A situation such that a defenseless statewhere the password input can be omitted continues for a long period oftime can be prevented.

Although the above embodiment has been described with respect to thecase where, for instance, the hard disk drive and optical disk drive areused as storing apparatuses, the invention obviously also incorporatesother storing apparatuses such as magnetic tape drive and floppy diskdrive. The invention is not limited to the storing apparatus but can bealso applied as it is to an apparatus or a general system for performingthe access protection by the password.

The invention incorporates other arbitrary modifications within a scopewithout losing the objects and advantages of the invention. Further, theinvention is not limited by the numerical values shown in theembodiment.

1-21. (canceled)
 22. A storing apparatus for use with a computer-based system in which a first user can selectively protect a medium from reading and/or writing control by an access command with a second password, or permit access to the medium without inputting the second password, said apparatus comprising: a password preserving unit for preserving a first password for selecting protect access or permit access to information recorded on the medium, and the second password for access protection; and a password verifying unit which, when an access authorization is requested by entering a password, compares the entered password with the second password; if in agreement, issues an authorization, and if not, refuses to issue an authorization; and when an access authorization is requested without entering a password, compares the first password and the second password; if in agreement, issues an authorization, and if not, refuses to issue an authorization; wherein in the case where a same value has been preserved in said first password and said second password, said password verifying unit copies a value of said first password to the user input password and collates the same with said second password, thereby permitting an access.
 23. The apparatus as defined in claim 22, wherein said password preserving unit includes a user input password area to store a user input password input by a user; said password verifying unit is constructed in a manner such that at the start of the use of the apparatus such as turn-on of a power source, command reset, error reset, medium insertion, or the like, said first password is read out and written into said user input password area, an access permission is established if the first password is the same as the second password, or an access inhibition is established if the first password is not the same as the second password, on the basis of a collation between the first password in said user input password area and the second password for access protection; and after said access permission or inhibition is established, each time there is a password input of the user, the user input password is written into said user input password area and, subsequently, the access permission inhibition is established on the basis of a collation between the user input password in said user input password area and the second password for access protection.
 24. The apparatus as defined in claim 22, wherein said password preserving unit preserves said first password and said second password for access protection into said medium; and said password verifying unit reads out said first password and said second password for access protection from said medium and stores into an apparatus main body at the start of the use of the apparatus and controls the access protection.
 25. The apparatus as defined in claim 22, wherein said password preserving unit preserves said first password into a non-volatile memory of an apparatus main body and preserves said second password for access protection into the medium; and said password verifying unit reads out said second password for access protection from said medium and stores into the apparatus main body at the start of the use of the apparatus and controls the access protection.
 26. The apparatus as defined in claim 22, wherein said password preserving unit preserves said second password for access protection into a non-volatile memory of an apparatus main body and preserves said first password into the medium, and said password verifying unit reads out said first password from said medium and stores into the apparatus main body at the start of the use of the apparatus and controls the access protection.
 27. An apparatus according to claim 22, wherein in said medium, a password preserving area to preserve said second password is provided in a specific area which cannot be accessed by an ordinary read command and write command.
 28. The apparatus as defined in claim 22, further comprising a password rewriting unit for rewriting said default input password or said first password for access protection on the basis of a dedicated command from an upper apparatus.
 29. An apparatus according to claim 22, wherein said medium is fixedly enclosed in the apparatus main body.
 30. An apparatus according to claim 22, wherein said medium is detachable from the apparatus main body.
 31. The apparatus as defined in claim 22, wherein said password preserving unit preserves a plurality of kinds of passwords for access protection according to kinds of access protection, and said password verifying unit permits an access by an ordinary command corresponding to the kind of said first password for access protection in which a collation coincidence is obtained.
 32. The apparatus as defined in claim 22, wherein as said first passwords for access protection, said password preserving unit preserves a write/read password to permit an access by a read command and a write command and a read only password to permit only an access by the read command; and said password verifying unit permits the access by the ordinary write command or read command when the collation coincidence of said write/read password is obtained and permits the access by only the ordinary read command when the collation coincidence of said read only password is obtained.
 33. The apparatus as defined in claim 22, further comprising a validity term setting unit for setting a validity term into said first password.
 34. The apparatus as defined in claim 33, wherein said validity term setting unit counts the number of using times of the apparatus by a counter and, when a value of said counter reaches a predetermined value, said validity term setting unit changes said first password to a different value.
 35. An apparatus according to claim 33, wherein said validity term setting unit sets a time of a validity term and, when a present time in case of using the apparatus exceeds said validity term, said validity term setting unit changes said first password to a different value.
 36. A method of selectively protecting a medium from reading and/or writing control by an access command with a second password for use with a computer-based system, or permitting access to the medium without inputting the second password, comprising: a password preserving step of preserving the second password and a first password for selecting protect access or permit access to information recorded on the medium; and a password verifying step which, when an access authorization is requested by entering a password, compares the entered password with the second password; if in agreement, issues an authorization, and if not, refuses to issue an authorization; and when an access authorization is requested without entering a password, compares the first password and the second password; if in agreement, issues an authorization, and if not, refuses to issue an authorization; wherein in the case where a same value has been preserved in said first password and said second password, in said password verifying step, a value of said first password is copied to the user input password and is collated with said second password, thereby permitting an access.
 37. A method as defined in claim 36 wherein in said password preserving step, a plurality of kinds of passwords for access protection according to kinds of said access protection are preserved, and in said password verifying step, an access by an ordinary command corresponding to the kind of said first password for access protection in which a collation coincidence is obtained is permitted.
 38. A method as defined in claim 36 further comprising a validity term setting step of setting a validity term into said first password. 