Patent classifications
G06F21/805
METHOD TO GENERATE PATTERN DATA OVER GARBAGE DATA WHEN ENCRYPTION PARAMETERS ARE CHANGED
A memory device is provided that includes a memory location configured to store information representing data written using a first encryption/decryption method, a read channel configured to read and decrypt information using a second encryption/decryption method and an apparatus configured to prevent the read channel from reading the memory location using the second encryption/decryption method.
Large network attached storage encryption
Techniques for storing encrypted data using a storage service system are described herein. A computer system of a computation layer of the storage service system receives an encrypted key manifest, which is then decrypted using a cryptoprocessor of the computer system of the computation layer to produce a partition key. The partition key is then provided to a file system abstraction layer so that, as data is provided to the computation layer for storage, the file system abstraction layer can use the partition key to encrypt data and store the encrypted data in the storage layer.
Retrieving a hypertext markup language file from a dispersed storage network memory
A method begins by a dispersed storage (DS) processing module receiving a request for a hypertext markup language (HTML) file, wherein the HTML file is encoded using a dispersed storage (DS) error coding function to produce a plurality of sets of encoded data slices, wherein the plurality of sets of encoded data slices is stored in a dispersed storage network (DSN) memory, and wherein the request includes a universal record locator (URL) associated with the HTML file. The method continues with the DS processing module translating the URL into a source name associated with the plurality of sets of encoded data slices. The method continues with the DS processing module requesting retrieval of a plurality of sets of at least a decode threshold number of encoded data slices of the plurality of sets of encoded data slices from the DSN memory in accordance with the source name.
DATA INTEGRITY VERIFICATION IN A NON-VOLATILE MEMORY
A method for performing a secure boot of a data processing system, and the data processing system are provided. The method includes: processing a command issued from a processor of the data processing system, the command directed to a memory; determining that the command is a command that causes the memory to be modified; performing cryptographic verification of the memory; and incrementing a first counter in response to the determining that the command is a command that causes the memory to be modified. The data processing system includes a processor, a memory, and a counter. The memory is coupled to the processor, and the memory stores data used by a bootloader during a secure boot. The counter is incremented by a memory controller in response to a command being a type of command that modifies the data stored by the memory.
Utilizing a dispersed storage network access token module to acquire digital content from a digital content provider
A method begins with a computing device receiving a request to acquire digital content from a digital content provider and forwarding the request to a dispersed storage network (DSN) pre-paid module. The method continues with the DSN pre-paid module validating the request, generating a plurality of sets of at least a threshold number of digital content read requests, and sending the plurality of sets of the at least a threshold number of digital content read requests to the digital content provider via the computing device when the request to acquire the digital content is validated. The method continues with at least one of the DSN pre-paid module and the computing device receiving a plurality of sets of at least a decoded threshold number of encoded data slices and decoding the plurality of sets of the at least a decoded threshold number of encoded data slices to produce the digital content.
Method to generate pattern data over garbage data when encryption parameters are changed
A memory device including at least one memory location for storing information representing data written using a first encryption/decryption method, and a read channel using a second encryption/decryption method for reading and decrypting information as written is disclosed. The memory device also includes an apparatus that prevents the reading of the at least one memory location using the second encryption/decryption method, in response to an indication that the at least one memory location was written using the first encryption/decryption method. In another embodiment, a reading of a predefined or custom code is returned in response to an indication of another encryption/decryption method.
SLICE REBUILDING IN A DISPERSED STORAGE NETWORK
A processing system associated with a dispersed storage network is configured to detect a plurality of encoded data slices to be rebuilt, wherein the plurality of encoded data slices are associated with the DST execution unit; identify a plurality of slice names associated with the plurality of encoded data slices; obtain a slice name to slice memory device mapping for the DST execution unit; determine a schedule of rebuilding the plurality of encoded data slices, based on the mapping; and facilitate rebuilding the plurality of encoded data slices in accordance with the schedule of rebuilding.
STORAGE PROTECTION UNIT
Technology is disclosed that provides security for data stored in a non-volatile memory device. The non-volatile memory device may be embedded in a host system. The host system may further have a host controller that is configured to obtain a memory access message from an initiator to access the non-volatile memory. The host controller may be further configured to provide the memory access message to the memory controller. The memory access message may contain an identifier of the initiator, which may be verified by the host controller. The memory controller may be configured to access the identifier of the initiator from the memory access message, and grant or deny non-volatile memory access to the initiator based on whether the initiator has access rights to a region of the non-volatile memory to which the initiator seeks access.
Slice rebuilding in a dispersed storage network
A processing system associated with a dispersed storage network is configured to detect a plurality of encoded data slices to be rebuilt, wherein the plurality of encoded data slices are associated with the DST execution unit; identify a plurality of slice names associated with the plurality of encoded data slices; obtain a slice name to slice memory device mapping for the DST execution unit; determine a schedule of rebuilding the plurality of encoded data slices, based on the mapping; and facilitate rebuilding the plurality of encoded data slices in accordance with the schedule of rebuilding.
System for performing parallel forensic analysis of electronic data and method therefor
System and method for conducting a forensic analysis of electronic data having files and information indicative of a location of each of the files. The system has processors and a controller. The controller is configured to characterize the electronic data based, at least in part, on the files and the information indicative of the location of each of the files to obtain a characterization and distribute segments of the electronic data to the processors based, at least in part, on the characterization, each of the processors corresponding to at least one of the segments and each of the segments corresponding to at least one of the processors. Each one of the processors is configured to process each corresponding one of the segments to identify at least one characteristic of each corresponding one of the segments.