Patent classifications
G06F3/0622
METHOD AND SYSTEM FOR A CONDITIONAL KEY STORAGE IN A HARDWARE RESOURCE MANAGER
A method for managing a storage system includes initiating, by a hardware resource manager, a boot-up of a storage controller managing the storage system comprising a plurality of storage devices, making a determination, by the storage controller, that the storage controller is in a secured mode, based on the determination: identifying a security state of each of the plurality of storage devices, determining that a storage device of the plurality of storage devices is in an unsecured state, and based on the unsecured state, sending, by the storage controller, a security operation request for securing the storage device, obtaining a secure state response from the hardware resource manager corresponding to securing the storage device, and based on the secure state response, resuming operation of the storage controller based on the secure mode.
System, device and method for writing data to protected region
A method of writing data to a protected region in response to a request from a host includes receiving a first write request including a first host message authentication code and a first random number from the host, verifying the first write request based on a write count, the first random number, and the first host message authentication code, updating the write count based on a result of verifying the first write request, generating a first device message authentication code based on the updated write count and the first random number, and providing the host with a first response including the first device message authentication code and a result of the verifying of the first write request.
Over-the-Air Programming of Sensing Devices
Embodiments described herein include a sensor control device configured for secure over-the-air (OTA) programming. Embodiments include a sensor control device that includes one or more processors, an analyte sensor, a communication module, and a memory. The memory includes a first set of storage blocks that are in a non-programmable state and a second set of blocks that are in a programmable state. The processors are configured to receive, using the communication module, instructions to write marking data to the memory to mark a first storage block from the first set of storage blocks as inaccessible and to write program data to a second storage block from the second set of storage blocks, causing the second storage block to be placed into the non-programmable state. The program data written to the second storage block includes instructions that cause the processors to process analyte data received from the analyte sensor.
BLOCKCHAIN-ENABLED STORAGE ARRAY
The present disclosure relates to establishing a tightly coupled integration between a decentralized blockchain network and a centralized storage array. In embodiments, a first set of storage operations on a snapshot of a storage array are performed. Further, data blocks generated from the snapshot are broadcast to at least one computing network for the at least one computing network's nodes to perform a second set of storage operations.
Immutable Nodes in a Container System
A node of a container system is made immutable to containers (e.g., to applications operating in the containers) running on the node. For example, the node may be made immutable by performing a method comprising: mounting, by a container runtime operating on a node within a container system, a volume comprising a container image, wherein the node comprises storage resources; creating, on the node and based on access to the volume, an instance of a container associated with the container image; and mapping, with respect to the container, accesses to the storage resources to one or more volumes stored remotely from the node, where the storage resources on the node are immutable to the container based on the mapping the accesses to the storage resources to the one or more volumes.
SYSTEMS AND METHODS FOR FLEXIBLE WRITING OF INTERNAL DATA OF REGULATED SYSTEM
An environment and non-transitory computer readable medium that provide runtime write access to a regulated system. A method of providing runtime write access to a regulated system comprising receiving an unauthorized input parameter, and generating a runtime instruction communication. The runtime instruction communication can be modified by an unauthorized function.
Artificial intelligence (AI) assisted anomaly detection of intrusion in storage systems
Artificial intelligence (AI) anomaly monitoring in a storage system. The AI anomaly monitoring may include writing commands into a log jointly with the execution of the commands on storage media of a drive. The log includes information regarding the operation of the drive including, at least, the commands. In turn, each drive in the storage system may include an AI processor core that may access the log and apply an AI analysis to the log to monitor for an anomaly regarding the operation of the drive. As each drive in the storage system may use the AI process core to detect anomalies locally to the drive, the computational and network resources needed to employ the AI monitoring may be reduced.
Semiconductor device with secure access key and associated methods and systems
Memory devices, systems including memory devices, and methods of operating memory devices are described, in which security measures may be implemented to control access to a fuse array (or other secure features) of the memory devices based on a secure access key. In some cases, a customer may define and store a user-defined access key in the fuse array. In other cases, a manufacturer of the memory device may define a manufacturer-defined access key (e.g., an access key based on fuse identification (FID), a secret access key), where a host device coupled with the memory device may obtain the manufacturer-defined access key according to certain protocols. The memory device may compare an access key included in a command directed to the memory device with either the user-defined access key or the manufacturer-defined access key to determine whether to permit or prohibit execution of the command based on the comparison.
Unified storage on block containers
An illustrative unified data storage method includes providing, by a data storage system, block containers that represent a linear address space of blocks; and using, by the data storage system, the block containers to store content for a plurality of different data storage services. In certain examples, the different data storage services include at least one of a file storage service, an object storage service, or a database service.
STORAGE DEVICE AND OPERATION METHOD THEREOF
An operation method of a storage device, which includes a nonvolatile memory device, includes receiving a first key-value (KV) command including a first key from an external host device; transmitting a first value corresponding to the first key from the nonvolatile memory device to the external host device as first user data, in response to the first KV command; receiving a second KV command including a second key, from the external host device; and performing a first administrative operation based on a second value corresponding to the second key, in response to the second KV command. The first KV command and the second KV command are KV commands of a same type.