IBM DBCA-204860 Hard Drive Specifications - Page 142

Identifier, DBCA-206480, DBCA-204860, DBCA-203240

Page 142 highlights

Identifier Zero indicates that the device should check the supplied password against the user password stored internally. One indicates that the device should check the given password against the master password stored internally. The Security Erase Unit command erases all user data and disables the security mode feature (device lock function). So after completing this command, all user data will be initialized to zero with write operation. At this time, it is not verified with read operation whether the sector of data is initialized correctly. Also, the defective sector information and the reassigned sector information for the device are not updated. The security erase prepare command should be completed immediately prior to the Security Erase Unit command. If the device receives a Security Erase Unit command without a prior Security Erase Prepare command the device aborts the security erase unit command. This command disables the security mode feature (device lock function), however the master password is still stored internally within the device and may be re-activated later when a new user password is set. If you execute this command on disabling the security mode feature (device lock function), the password sent by the host is N O T compared with the password stored in the device for both the Master Password and the User Password, and then the device only erases all user data. The execution time of this command is shown below. DBCA-206480 DBCA-204860 DBCA-203240 about 15 min about 12 min about 8 min 134 OEM Specifications of DBCA-2xxxxx 2.5 inch H D D

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190

Identifier
Zero indicates that the device should check the supplied password against the user
password stored internally. One indicates that the device should check the given pass-
word against the master password stored internally.
The Security Erase Unit command erases all user data and disables the security mode feature (device lock
function).
So after completing this command, all user data will be initialized to zero with write operation.
At this time, it is not verified with read operation whether the sector of data is initialized correctly.
Also, the
defective sector information and the reassigned sector information for the device are not updated.
The secu-
rity erase prepare command should be completed immediately prior to the Security Erase Unit command. If
the device receives a Security Erase Unit command without a prior Security Erase Prepare command the
device aborts the security erase unit command.
This command disables the security mode feature (device lock function), however the master password is still
stored internally within the device and may be re-activated later when a new user password is set.
If you
execute this command on disabling the security mode feature (device lock function), the password sent by
the host is NOT compared with the password stored in the device for both the Master Password and the
User Password, and then the device only erases all user data.
The execution time of this command is shown below.
DBCA-206480
about 15 min
DBCA-204860
about 12 min
DBCA-203240
about 8 min
134
OEM Specifications of DBCA-2xxxxx 2.5 inch HDD