3.5.1Drive installation
Upon receipt by the consumer, the drive’s user interface is identical to a Momentus 7200.3 drive. The normal ATA security commands are functioning and available for initialization of the password as follows:
Per normal ATA Security Commands specifications, the drive is unlocked and all ATA security commands and all normal ATA commands may be issued.
1.Consumer accesses the computer manufacturer’s BIOS
2.Consumer selects option to set User Password.
After setting the User password, the drive is now under access control (locked) and will require a password for future accesses.
3.Optional: Consumer selects the option to set the Master password from the BIOS choices.
4.Consumer exits the BIOS settings menu and continues with the boot process.
5.The BIOS enters the Security Freeze Command (F5) prior to exiting the boot sequence.
3.5.2Consumer usage
After initialization, the consumer will just need to enter their User password each time the computer is booted according to the following description:
1.The computer system is turned on or the hardware is reset.
2.The drive reports to the BIOS that it is in the locked state per standard ATA Security Command reporting.
3.The BIOS queries the user for the password.
4.The BIOS supplies the password to the drive using the Security Unlock Command (F2).
5.The drive is unlocked and the BIOS may continue the booting process.
6.The BIOS enters the Security Freeze Lock Command (F5) prior to exiting the boot sequence.
Note. To ensure that the system reauthenticates the user, turn the laptop power off (shut down) rather than putting it in sleep mode. The system will authenticate the user at powerup.
3.6Security Erase--ATA security commands
The Momentus 7200 FDE.1 SATA provides powerful features for cryptographically erasing the drive for dis- posal or repurposing. The drive uses the ATA Security Erase Prepare (F3) and ATA Security Erase (F4) com- mands to perform the cryptographic erase.
3.6.1Secure Erase procedure
Using the Security Erase commands, the drive's cryptographic key can be replaced according to the following procedure:
1.Consumer boots up the computer normally according to the Consumer Usage section above.
2.Consumer invokes software or BIOS option for Erase.
3.The software or BIOS queries the user for either the User or Master password.
4.The software or BIOS issues the Security Erase Prepare (F3) command.
5.The software or BIOS issues the Security Erase Unit (F4) command.
Select the Enhanced erase for cryptographic key erasure that completes in less than one second.
3.6.2Drive State after Secure Erase
Upon completion of the erase sequence, the existing cryptographic key is erased, rendering all existing data unintelligible, and the drive has been returned to the manufactured state as follows:
• The existing encryption key is deleted.
Momentus 7200 FDE.1 SATA Product Manual, Rev. A | 25 |