G06F3/062

System and Method for Validating Actions to be Performed on a Storage System Objects
20220334729 · 2022-10-20 ·

A method, computer program product, and computing system for receiving a request to perform an action on an object within a storage system and may determine whether the action is valid for performing on the object based upon, at least in part, one or more conditions associated with performing the action and one or more parameters of a validation annotation associated with the one or more conditions. In response to determining that the action is valid, the action may be performed on the object. In response to determining that the action is invalid, one or more errors may be generated based upon, at least in part, the one or more parameters of the validation annotation associated with the one or more conditions.

COMPUTING DEVICE AND CONTROL METHOD
20230072444 · 2023-03-09 ·

According to one embodiment, a computing device executes an application including processing of inputting information from a nonvolatile memory unit and outputting information to the nonvolatile memory unit. The computing device includes a processing unit. The processing unit executes processing of receiving an I/O request to the nonvolatile memory unit from the application and generating one or more control commands for controlling the nonvolatile memory unit based on the I/O request. The processing unit executes processing of acquiring authorization information from a server. The processing unit executes processing of inserting or associating the acquired authorization information into or with the I/O request or the one or more control commands.

METHOD TO EFFICIENTLY TRANSFER SUPPORT AND SYSTEM LOGS FROM AIR-GAPPED VAULT SYSTEMS TO REPLICATION DATA SOURCES BY RE-UTILIZING THE EXISTING REPLICATION STREAMS
20230125145 · 2023-04-27 ·

One example method includes, at a replication data source, initiating a replication process that includes transmitting a replication stream to a replication destination vault, and data in the replication stream is transmitted by way of a closed airgap between the replication data source and the replication destination vault, switching, by the replication data source, from a transmit mode to a receive mode, receiving, at the replication data source, a first checksum of a file, and the first checksum and file were created at the replication destination vault, receiving, at the replication data source, the file, calculating, at the replication data source, a second checksum of the file, and when the second checksum matches the first checksum, ending the replication process.

Systems and methods for breach-proof, resilient, compliant data in a multi-vendor cloud environment and automatically self heals in the event of a ransomware attack
11636217 · 2023-04-25 · ·

A cloud-based system for securely storing data, the system having a processor which obtains a source data file; splits it into at least three fragments; and uses an encryption key associated with the fragments to encrypt the fragments and distributes the encrypted fragments among at least three cloud storage providers, creates a pointer file containing information for retrieving the encrypted fragments. When a system user requests access to the data, the system uses the information stored in the pointer file to retrieve the stored encrypted fragments from the plurality of clouds; decrypts the fragments and reconstructs the data, and provides data access to the system user.

Integrity verification of lifecycle-state memory using multi-threshold supply voltage detection

An Integrated Circuit (IC) includes a non-volatile memory (NVM) and secure power-up circuitry. The NVM is configured to store an operational state of the IC. The secure power-up circuitry is configured to (i) during a power-up sequence of the IC, perform a first readout of the operational state from the NVM while a supply voltage of the IC is within a first voltage range, (ii) if the operational state read from the NVM in the first readout is a state that permits access to a sensitive resource of the IC, verify that the supply voltage is within a second voltage range, more stringent than the first voltage range, and then perform a second readout of the operational state from the NVM, and (iii) initiate a responsive action in response to a discrepancy between the operational states read from the NVM in the first readout and in the second readout.

System and method for validating actions to be performed on a storage system objects

A method, computer program product, and computing system for receiving a request to perform an action on an object within a storage system and may determine whether the action is valid for performing on the object based upon, at least in part, one or more conditions associated with performing the action and one or more parameters of a validation annotation associated with the one or more conditions. In response to determining that the action is valid, the action may be performed on the object. In response to determining that the action is invalid, one or more errors may be generated based upon, at least in part, the one or more parameters of the validation annotation associated with the one or more conditions.

INFORMATION PROCESSING APPARATUS, AUTHENTICITY VERIFICATION METHOD, AND PROGRAM
20230119196 · 2023-04-20 · ·

Whether a connected drive is an unauthorized drive or not can be judged before it becomes possible for the connected drive to access a memory for a storage controller. When a storage device is connected, an information processing apparatus forms a first communication channel via a first interface incapable of accessing a built-in memory even when the communication connection is established; and a second communication channel via a second interface capable of accessing the built-in memory when the communication connection is established. At a specified timing when the communication connection via the second communication channel is not established, a processor executes authenticity verification processing for verifying authenticity of the storage device on the basis of information acquired from the storage device by using the first communication channel and permits establishment of the communication connection via the second communication channel when the authenticity is confirmed by the authenticity verification processing.

Method for Determining the Legal Basis for Transfer of a Data Object

A method for execution by one or more processing modules of one or more computing devices of a storage network, the method comprises receiving a data object for processing, determining whether the data object is to be transferred to one or more remote storage location, determining whether one or more legal restrictions are associated with the data object. Based on a determination that one or more legal restrictions are associated with the data object, the method continues by determining whether the one or more legal restrictions allow transfer of the data object to a storage unit of the one or more remote storage locations. The method continues by segmenting the data object into a plurality of data segments, dispersed error encoding a data segment of the plurality of data segments in accordance with dispersed error encoding parameters to produce a set of encoded data slice and transmitting a write requests for an encoded data slice of the set of encoded data slices to the storage location for processing.

Data protection method, with disk array tags, memory storage device and memory control circuit unit

A data protection method, a memory storage device and a memory control circuit unit are provided. The method includes: setting a plurality of disk array tags corresponding to a plurality of word lines and a plurality of memory planes, and the plurality of disk array tags corresponding to one of the word lines connected to one of the memory planes are at least partially identical to the plurality of disk array tags corresponding to another one of the word lines connected to another one of the memory planes; receiving a write command and data corresponding to the write command from a host system; and sequentially writing the data into the plurality of word lines and the plurality of memory planes corresponding to the plurality of disk array tags.

Selective throttling of operations potentially related to a security threat to a storage system
11625481 · 2023-04-11 · ·

An illustrative method includes a data protection system detecting a request to perform an operation with respect to a storage system, identifying one or more attributes of the request, determining, based on the one or more attributes, that the request is possibly related to a security threat against the storage system, and throttling, based on the determining that the request is possibly related to the security threat against the storage system, a performance of the operation.