Patent classifications
G06F3/0623
Creating a replica of a storage system
Creating a replica of a storage system, including: receiving, by a first storage system from a computing device, data to be stored on the first storage system; reducing, by the first storage system, the data using one or more data reduction techniques; sending, from the first storage system to the second storage system, the reduced data, wherein the reduced data is encrypted; and sending, from the second storage system to a third storage system, the reduced data, wherein the reduced data is encrypted.
Secure wireless dataloading using in-flight entertainment connectivity systems
Devices, systems and methods for enhancing aircraft maintenance are disclosed. An exemplary method for improving dataloading in an airplane includes retrieving, from an in-flight entertainment connectivity (IFEC) system, at least one avionics software, the IFEC system comprising a mass storage device comprising a first storage segment and a second storage segment, the first storage segment being a secure storage segment configured to store the at least one avionics software, and the second storage segment being configured to store media content, and loading, using a wireless network converter coupled to a wired legacy port, the at least one avionics software onto a target avionics system.
TRACKING DATA LOCATIONS FOR IMPROVED MEMORY PERFORMANCE
Methods, systems, and devices for tracking data locations for improved memory performance are described. A logical address space may be partitioned into ranges of logical addresses. A group of designators may be provided for each physical partition. Each designator may correspond to a respective logical partition. The memory system may determine the logical partition associated with data written to a physical partition and set the corresponding designator, if it is not already set, in the group associated with the physical partition. Upon receipt of a command (e.g., from a host device) to perform a purge on physical partitions containing data associated with a particular logical partition, the memory system may determine the affected physical partitions based on the designator corresponding to the logical partition being set in the respective groups and may perform the selective purge on those physical partitions.
LOGICAL STORAGE DEVICE ACCESS USING PER-VM KEYS IN AN ENCRYPTED STORAGE ENVIRONMENT
An apparatus in an illustrative embodiment comprises at least one processing device comprising a processor and a memory, with the processor coupled to the memory. The at least one processing device is configured to receive in a storage system, from a host device, information that identifies (i) a particular virtual machine implemented by the host device and (ii) a key specific to the virtual machine, to utilize at least a portion of the received information to obtain in the storage system the key specific to the virtual machine from a key management server external to the storage system, to store the obtained key in the storage system in association with one or more parts of the received information, and to utilize the obtained key to process input-output operations that are received in the storage system from the host device and that are identified as being associated with the virtual machine.
CONFIGURATION DATA DELETION BASED ON TAMPER STATUS
An example storage medium includes instructions that, when executed, cause a processor of a computing device to read, during start-up of the computing device, first configuration data from a first storage device of the computing device; read second configuration data from a second storage device of the computing device; determine that there is an inconsistency between the first configuration data and the second configuration data; check a tamper status of the computing device; based on the tamper status and the determination that there is an inconsistency between the first configuration data and the second configuration data: (i) clear a secure storage location of the computing device, the secure storage location storing data to access protected data; or (ii) replace the first configuration data on the first storage device of the computing device based on second data and continue the start-up of the computing device.
Cryptographic memory ownership table for secure public cloud
A computer-readable medium comprises instructions that, when executed, cause a processor to execute an untrusted workload manager to manage execution of at least one guest workload. The instructions, when executed, also cause the processor to (i) receive a request from a guest workload managed by the untrusted workload manager to access a memory using a requested guest address; (ii) obtain, from the untrusted workload manager, a translated workload manager-provided hardware physical address to correspond to the requested guest address; (iii) determine whether a stored mapping exists for the translated workload manager-provided hardware physical address; (iv) in response to finding the stored mapping, determine whether a stored expected guest address from the stored mapping matches the requested guest address; and (v) if the stored expected guest address from the stored mapping matches the requested guest address, enable the guest workload to access contents of the translated workload-manager provided hardware physical address.
RE-DUPLICATION OF DE-DUPLICATED ENCRYPTED MEMORY
Technology for performing data duplication on data that was previously consolidated (e.g., deduplicated or merged). An example method may involve receiving a request to modify a memory page; causing the data at a first storage location to be decrypted using location dependent cryptographic input and then encrypted using a location independent cryptographic input; copying the encrypted data of the memory page from the first storage location to a second storage location; causing the encrypted data at the first and second storage locations to be decrypted using location independent cryptographic input and to each be encrypted using a different location dependent cryptographic input; updating, by the supervisor, one of the references of the plurality of memory pages from pointing to the first storage location in the physical memory to pointing to the second storage location; and modifying the memory page by altering data in the physical memory.
DATA INVALIDATION FOR MEMORY
Methods, systems, and devices for memory operations are described. First scrambling sequences may be generated for first addresses of a memory device after an occurrence of a first event, where the first addresses may be associated with commands received at the memory device. Portions of the memory array corresponding to the first address may be accessed based on the first scrambling sequences. After an occurrence of a subsequent event, second scrambling sequences may be generated for the first addresses, where the second scrambling sequences may be different than the first set of scrambling sequences. After the occurrence of the subsequent event, the portions of the memory array may be accessed based on the second scrambling sequences.
Memory system and method of controlling nonvolatile memory
According to one embodiment, when data is to be written to a first physical storage location that is designated by a first physical address, a memory system encrypts the data with the first physical address and a first encryption key, and writes the encrypted data to the first physical storage location. When the encrypted data is to be copied to a second physical storage location, the memory system decrypts the encrypted data with the first physical address and the first encryption key, and re-encrypts the decrypted data with a second encryption key and a copy destination physical address indicative of the second physical storage location.
Fast purge on storage devices
A memory device comprises a memory array including memory cells, a communication interface to a host device, and a memory control unit operatively coupled to the memory array and the communication interface. The memory control unit is configured to encrypt write data received via the communication interface to produce encrypted data, program a portion of the memory cells of the memory array with the encrypted data, read the encrypted data from the portion of the memory cells in response to a memory read request, decrypt the read encrypted data to produce read decrypted data only for portions of the read encrypted data not stored in purged regions of the memory array.