US 11,838,282 B2
Information recording apparatus with server-based user authentication for accessing a locked operating system storage
Hiroshi Isozaki, Kawasaki (JP)
Assigned to Kioxia Corporation, Minato-ku (JP)
Filed by Kioxia Corporation, Minato-ku (JP)
Filed on Mar. 8, 2022, as Appl. No. 17/689,173.
Application 15/647,408 is a division of application No. 15/055,686, filed on Feb. 29, 2016, granted, now 9,756,033, issued on Sep. 5, 2019.
Application 17/689,173 is a continuation of application No. 16/711,592, filed on Dec. 12, 2019, granted, now 11,297,045.
Application 16/711,592 is a continuation of application No. 15/647,408, filed on Jul. 12, 2017, granted, now 10,547,604, issued on Jan. 28, 2020.
Application 15/055,686 is a continuation of application No. 13/626,972, filed on Sep. 26, 2012, abandoned.
Application 13/626,972 is a continuation of application No. PCT/JP2010/055426, filed on Mar. 26, 2010.
Prior Publication US 2022/0200980 A1, Jun. 23, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 21/85 (2013.01); H04L 9/32 (2006.01); G06F 21/80 (2013.01); G06F 21/57 (2013.01); G06F 21/31 (2013.01); G06F 21/10 (2013.01)
CPC H04L 63/08 (2013.01) [G06F 21/10 (2013.01); G06F 21/31 (2013.01); G06F 21/575 (2013.01); G06F 21/80 (2013.01); G06F 21/85 (2013.01); H04L 9/3226 (2013.01); H04L 63/062 (2013.01); H04L 63/0823 (2013.01); G06F 2221/2141 (2013.01); G06F 2221/2147 (2013.01); H04L 63/0428 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method of controlling a computer executed when the computer accesses a storage of the computer before an operating system is executed by the computer at a boot-up of the computer, the storage including:
a first storage that stores the operating system, and
a second storage that stores first information indicating whether or not the first storage is locked,
the method comprising:
responsive to the first information indicating that the first storage is locked, executing an authentication process, the authentication process including receiving authentication information input by a user, sending the authentication information to a server via wireless communication, and receiving an authentication result from the server via the wireless communication, the authentication result indicating whether the authentication succeeds.