• 当前位置:
  • 首页
  • >
  • PDF资料
  • >
  • AP-FM002GEA4S5S-KSW PDF文件及第10页内容在线浏览

AP-FM002GEA4S5S-KSW

AP-FM002GEA4S5S-KSW首页预览图
型号: AP-FM002GEA4S5S-KSW
PDF文件:
  • AP-FM002GEA4S5S-KSW PDF文件
  • AP-FM002GEA4S5S-KSW PDF在线浏览
功能描述: Value Added ATA Disk Module
PDF文件大小: 193.1 Kbytes
PDF页数: 共18页
制造商: ETC2[List of Unclassifed Manufacturers]
制造商LOGO: ETC2[List of Unclassifed Manufacturers] LOGO
制造商网址:
捡单宝AP-FM002GEA4S5S-KSW
PDF页面索引
120%
Value Added ATA-Disk Module
AP-FMxxxxEAXXXS-XXX
9
© 2011 Apacer Technology Inc. Rev. 1.3
5.2 Intelligent Power Failure Recovery
The Low Power Detection on the controller initiates cached data saving before the power supply to the
device is too low. This feature prevents the device from crash and ensures data integrity during an
unexpected blackout. Once power was failure before cached data writing back into flash, data in the
cache will lost. The next time the power is on, the controller will check these fragmented data segment,
and, if necessary, replace them with old data kept in flash until programmed successfully.
5.3 Enhanced Security Level
5.3.1 Secure protection zone
Partitioning with static commands to logically secure data, protection zones are the solid frameworks of
file vaults. 3 different types of zones, unprotected, read-only, and restricted, are offered for effortless
administration. When the product is shipped out of Apacer, all sectors are in the unprotected zone, which
means there is no control on any data transaction. For further management control, the read-only zone
can be set to be accessed exclusively for grantees, and the restricted zone, to be as the maximum
security stockade with full administration privilege required. A maximum of 4 zones can be configured as
either restricted or read-only zone presenting concurrently. The space outside these 4 zones is
automatically in the unprotected zone if available. After the zone has been configured, the protection zone
can be de-activated or re-activated by either software methods or hardware components. Protection zone
configuration is non-volatile and it will be in effect until the next set of configuration overwrites it.
5.3.2 ATA Secure Erase
Accomplished by the Secure Erase (SE) command, which added to the open ANSI standards that control
disk drives, “ATA Secure Erase” is built into the disk drive itself and thus far less susceptible to malicious
software attacks than external software utilities. It is a positive easy-to-use data destroy command,
amounting to electronic data shredding. Executing the command causes a drive to internally completely
erase all possible user data. This command is carried out within disk drives, so no additional software is
required. Once executed, neither data nor the erase counter on the device would be recoverable, which
blurs the accuracy of device lifespan. The process to erase will not be stopped until finished while
encountering power failure, and will be continued when power is back on.
购买、咨询产品请填写询价信息:(3分钟左右您将得到回复)
询价型号*数量*批号封装品牌其它要求
删除
删除
删除
删除
删除
增加行数
  •  公司名:
  • *联系人:
  • *邮箱:
  • *电话:
  •  QQ:
  •  微信:

  • 关注官方微信

  • 联系我们
  • 电话:13714778017
  • 周一至周六:9:00-:18:00
  • 在线客服:

天天IC网由深圳市四方好讯科技有限公司独家运营

天天IC网 ( www.ttic.cc ) 版权所有©2014-2023 粤ICP备15059004号

因腾讯功能限制,可能无法唤起QQ临时会话,(点此复制QQ,添加好友),建议您使用TT在线询价。

继续唤起QQ 打开TT询价