G06F2212/171

System and method to protect digital content on external storage
10628334 · 2020-04-21 · ·

An adapter is configured to sit between an external storage device and another device configured to read and write to the external storage device. The adapter encrypts data written to the external storage device and decrypts data read from the external device. The adapter determines whether to allow reading from or writing to the external storage device responsive to instructions received from an authenticating device.

Flushing in file system

The subject matter described herein relates to a file system with adaptive flushing for an electronic device. The file system keeps data in memory much longer and its policy for flushing in-memory write cache to storage is application-aware and adaptive. More specifically, what parts of the cached data are ready for flushing could be determined according to the access characteristic of an application. In addition, when to do flushing can be selected flexibly at least partly based on user input interactions with an application of the electronic device or with the electronic device. Further, a multi-priority scheduling mechanism for scheduling data units that are ready to be flushed could be employed, which ensures fairness among applications and further improves flushing performance.

SYSTEM AND METHOD FOR THE COMBINATION OF APP DATA AND EXTERNAL DATA KEEPING THEM SEPARATE AND INDEPENDENT
20200065312 · 2020-02-27 ·

A system and method is introduced for extracting application data and binding the application data and external existing data for generating actions and events. The scanning of application output data may be done independently of the applications and no data is revealed to the applications solving privacy issues, security issues as well as revenue sharing issues. Furthermore, application behavior is monitored based on its output to reveal anomalies. Such anomalies may be mitigated or sent to SOC for whitelisting or blacklisting. This mitigation may allow time to handle crisis situations and buy time for security firms to solve problems while allowing messages to arrive from the vendor rather than from an attacker. User input may be added to the extracted application data to reveal application bugs, issues and hacking attempts. Digital signs may be monitored and their display mitigated in case of a hacking attacks on the content displayed by the digital signs.

AUDIO RENDERING SYSTEM
20200053460 · 2020-02-13 · ·

An audio rendering device includes: at least one wireless communications interface configured to receive a first plurality of audio packets from a wireless communication device, the first plurality of audio packets including frames of audio data for a first audio channel from a set of one or more audio channels; and a processing unit; wherein the audio rendering device is configured to release, at respective first buffer release times, the frames of the audio data for the first audio channel from a first buffer for rendering by the processing unit; wherein the audio rendering device is configured to receive one or more messages from an other audio rendering device; and wherein the audio rendering device is configured to synchronize the first buffer release times with second buffer release times associated with the other audio rendering device based on the received one or more messages.

Using a projected out of memory score to selectively terminate a process without transitioning to a background mode

Methods and apparatus such as a processor platform to manage a process under a memory constraint are disclosed herein. An example method includes detecting that a process is to transition from a foreground mode of operation to a background mode of operation. Without transitioning the process to the background mode of operation, a projected out of memory score is calculated. The projected out of memory score is compared to a score threshold, and the process is terminated when the projected out of memory score is greater than the score threshold. When the projected out of memory score is less than or equal to the score threshold, the process is allowed to transition to the background mode of operation. A priority adjustor may determine a projected adjustment value, for example by determining a default adjustment value, or by performing a lookup of an adjustment value currently associated with a second process operating in the background mode. The background mode of operation may be at least one of a visible application, a secondary server, a hidden application, a content provider, or an empty application. Freeing up memory in advance of a subsequent low memory check ensures that low memory conditions are avoided more promptly.

Method, apparatus and system for processing data

Embodiments of the present application provide a method, apparatus and system for processing data, the method is applicable to an electronic device, wherein the electronic device is connected to a memory card that has been formatted in a proprietary manner in advance and the memory card includes at least one cold data area. The method includes: obtaining the number C.sub.R of reads for data stored in a target cold data area C stored locally; determining whether the number C.sub.R of reads reaches a preset threshold T.sub.CR for reading failure of cold data; if the number C.sub.R of reads reaches a preset threshold T.sub.CR for reading failure of cold data, transmitting a start address and a end address of the data stored in the target cold data area C to a controller of the memory card, and initializing the number C.sub.R of reads for processing the stored data by the controller according to the start address and the end address. By applying the embodiments of the present application, the calculation amount of a memory card is reduced, and thereby the reading and writing performance for data of the memory card is improved.

Smart cover components for security policy enforcement
10437988 · 2019-10-08 · ·

Systems, apparatuses, methods, and computer readable mediums for utilizing smart components to monitor connected devices. In one embodiment, a system includes a computing device and a covering device which covers at least a portion of the computing device. The computing device includes one or more input/output (I/O) interfaces. The covering device may be a smart cover, a security screen protector, or other type of smart covering component. The covering device intercepts, via a first I/O interface, a signal generated by the computing device. The covering device analyzes the signal to determine if a security policy is being violated. The covering device performs a security action responsive to determining that a security policy is being violated. In one embodiment, the covering device covers a display of the computing device and the covering device utilizes photoresistor technology to read the display of the computing device on a pixel-by-pixel basis.

Secure Garbage Collection on a Mobile Device

Methods and systems for performing garbage collection involving sensitive information on a mobile device are described herein. Secure information is received at a mobile device over a wireless network. The sensitive information is extracted from the secure information. A software program operating on the mobile device uses an object to access the sensitive information. Secure garbage collection is performed upon the object after the object becomes unreachable.

STORAGE DEVICE PREDICTING ACCESS AND REPRODUCING DATA
20240176743 · 2024-05-30 ·

A storage device comprising a nonvolatile memory device, and a storage controller configured to control the nonvolatile memory device wherein the storage controller is configured to, detect a logical address pattern repeatedly requested by a host, divide the logical address pattern into input logical addresses and predictive logical addresses, and generate a reproduction model for generating reproduction data corresponding to the predictive logical addresses in the data pattern when the predictive logical addresses are input using machine learning, and in response to a read request for the input logical addresses from the host, predict the predictive logical addresses using the input logical addresses, generate the reproduction data by inputting the predictive logical addresses into the reproduction model, and prefetch the generated reproduction data to a buffer memory included in the storage controller.

MEMORY MANAGEMENT UNIT PERFORMANCE THROUGH CACHE OPTIMIZATIONS FOR PARTIALLY LINEAR PAGE TABLES OF FRAGMENTED MEMORY

A MMU may read page descriptors (using virtual addresses as an index) in a burst mode from page tables in a system memory. The page descriptors may include intermediate physical addresses (IPAs, in stage 1) and corresponding physical addresses (PAs, in stage 2). The virtual address in conjunction with page table base address register is used to index page descriptors into main memory. The MMU may identify a first group of contiguous IPAs beginning at a base IPA and a second group of contiguous IPAs beginning at an offset from the base IPA. The first and second groups may be separated by at least one IPA not contiguous with either the first or second group. The MMU may read a first PA from the page tables that corresponds to the base IPA. The MMU may store an entry in a buffer that includes the PA and a first linearity tag.