G06F3/062

Communication device and communication method used in decentralized network
11595187 · 2023-02-28 · ·

A communication device provides data to a data acquiring node based on a consensus of a plurality of participating nodes. The communication device includes a processor. The processor divides the data into N data components. N is an integer equal to or larger than two. When the N data components are stored in different storage areas, the processor encrypts addresses of storage areas in which the data components are respectively stored with respective public keys of N participating nodes among the plurality of participating nodes. The processor transmits access right information that indicates the data acquiring node has a right to access the data and the encrypted N addresses to the plurality of participating nodes.

Verification method and system

The application discloses a verification method and system. The verification method is for verifying content of a first volatile read-write memory of a chip. A first non-volatile read-write memory of the chip stores a firmware image, including predetermined calculation value. The chip includes a second volatile read-write memory. The verification method includes: at a bootloader mode, loading a first portion and a second portion of the firmware image to the first volatile read-write memory and the second volatile read-write memory respectively; performing a first specific operation to the first portion and the second portion to obtain a first calculation value; performing a second specific operation to the first calculation value to obtain a second calculation value and storing the second calculation value in the second volatile read-write memory.

Memory system and control method
11586377 · 2023-02-21 · ·

According to one embodiment, a memory system includes a non-volatile memory with a plurality of blocks. The minimum unit of a data erasing operation in the memory system is a block. A controller is electrically connected to the non-volatile memory and configured to execute, in response to a first command from a host requesting a secure erase of secure erase target data stored in a first logical area identified by a first logical area identifier, a copy operation copying valid data other than any secure erase target data from one or more first blocks of the plurality in which the secure erase target data is stored to one or more copy destination blocks of the plurality. The controller executes the data erasing operation on the one or more first blocks after the copy operation.

Access revocation messaging mechanism

An access revocation system for removing user data from a service provider device includes a processing device and a memory storing instructions for performing an access revocation method. The method includes receiving user data from a user device via a data channel, storing the user data in a data storage module, and receiving an access revocation message via a request channel separate from the data channel. The method also includes decrypting the access revocation message and performing at least one action defined by the access revocation message, the at least one action including scrubbing of user data from the data storage module.

Multiple interface data exchange application for use in process control

A multiple interface data exchange system utilizes a persistent in-memory storage in asynchronous data communication with a plurality of interfaces. Each interface is configured to communicate with at least one application using a particular communication protocol. The persistent in-memory storage stores tuple data sets received from applications transmitting data to the connected interface in a canonical (universal) format, automatically creating new tuples and updating existing tuples. The canonical format of the data is quickly queried in the persistent in-memory storage and available to other applications in connection with the multiple interface data exchange system regardless of the communication protocol used by a requesting application.

MODULAR DATA PROCESSING AND STORAGE SYSTEM
20230043361 · 2023-02-09 · ·

A system enables entities to access a single platform in order to utilize electronic data storage for storing different types of information. One or more computers may operate an electronic data storage processing network that entities can access when updating information in electronic data storage. The electronic data storage processing network may operate a plurality of electronic data storage processing modules, which can include an aggregator module, a formatter module, an operator signer module, and a validator module. Based on the specific use case for which electronic data storage is utilized, recordable data that is to be added to the electronic data storage can be processed by the appropriate aggregating, formatting, signing, and validating functions provided by the electronic data storage processing modules.

MEMORY PHYSICAL PRESENCE SECURITY IDENTIFICATION
20230041373 · 2023-02-09 ·

A system includes a memory component and a processing device, operatively coupled with the memory component, to generate a physical presence security identification (PSID) for the memory component using a statistically random number generator. The processing device, operatively coupled with the memory component, can securely retrieve the PSID and revert the memory component to an original state using the PSID.

APPLICATION-SPECIFIC COMPUTER MEMORY PROTECTION
20230099543 · 2023-03-30 · ·

Systems and methods herein secure computer memory from potential hacks. In one embodiment, a system includes a computer memory, and a memory protection module communicatively coupled to the computer memory. The memory protection module is operable to assign a counter value to a write Input/Output (I/O) request, to encrypt data of the write I/O request based on the counter value, and to write the encrypted data to a location of the computer memory. The counter value comprises a version number of the write I/O request and, for example, the location of the computer memory to where the data of the write I/O request is being written in the computer memory. The memory protection module is further operable to compute the version number based on memory access patterns of an application writing to the computer memory.

DATA PROTECTION METHOD FOR MEMORY AND STORAGE DEVICE THEREOF
20230103004 · 2023-03-30 ·

The present disclosure provides a system. The system includes a memory device configured to store memory data. The memory device includes a plurality of valid memory blocks that comprises a first valid memory block and a second valid memory block. The system also includes a controller, having a processor and a memory, operatively coupled to the first and second valid memory blocks. The controller is configured to, in an operation on redundant array of independent disks (RAID), generate an address chain in a check code factor of the plurality of valid memory blocks, the address chain comprising a first address point pointing to the first valid memory block. The controller is also configured to generate, in the first valid memory block, a second address pointer, the second address pointer pointing to the second valid memory block.

Storage System with Blockchain Based Features

An illustrative method includes a monitoring system obtaining event data describing an event within a distributed compute and storage system, generating an event block for the event based on the event data, and attaching the event block to an event blockchain associated with the distributed compute and storage system, the event blockchain being immutable and indicating one or more events within the distributed compute and storage system in a chronological order of the one or more events. The event blockchain is used to provide one or more features of a storage system.