An example process for controlling access to a data storage device in a distributed information handling system includes the operation of receiving, at the storage device, a login request from a host. In response to the login request, the storage device may determine whether a host access table in the storage device includes an identifier for the host. If the host access table includes an identifier for the host, the storage device may allow the host to use the storage device. However, if the host access table does not include an identifier for the host, the storage device may prevent the host from using the storage device. Additional or alternative operations may include adding identifiers for specified hosts and a list of corresponding logical storage units to a mapping table. The data storage device may then deny access to hosts without identifiers in the mapping table.

 
Web www.patentalert.com

< Memory controller with power management logic

< Power-aware adaptation in an information server

> Burst counter controller and method in a memory device operable in a 2-bit prefetch mode

> Execution time dependent command schedule optimization

~ 00240