Storage Application Note: Encrypting Drives Compliant with Opal SSC

Date Published: February, 01, 2010

This document provides examples of the communication between a host and a storage device implementing the TCG Storage Security Subsystem Class: Opal SSC and the TCG Storage Architecture Core Specification.

Examples are provided for the following scenarios:.

  • Discovering whether a storage device supports Opal SSC
  • Taking ownership of the storage device
  • Activating the Locking SP
  • Changing the Admin1 PIN in the Locking SP and adding users
  • Configuring Locking Objects (LBA ranges)
  • Unlocking ranges
  • Erasing a range
  • Enabling the MBR shadow
  • Un-shadowing the MBR
  • Reverting the TPer
  • Reverting the Locking SP
  • Using the DataStore table

Latest Revision:


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.