G06F3/0637

System and method to protect digital content on external storage
11531626 · 2022-12-20 · ·

An example authentication device disclosed herein is to access a message received via a wireless interface from an adapter, the message to indicate that a host device has connected to the adapter, the host device different from the authentication device. The disclosed example authentication device is also to determine whether to allow the host device to access a storage device. The disclosed example authentication device is further to transmit authentication data to the adapter via the wireless interface, the authentication data to specify whether the host device is allowed to access the storage device.

Controlling public access of resources in a secure distributed storage system

A method for controlling public access of resources in a secure distributed storage system using an API level model. A request to access a volume is checked for authentication. If the request does not include an authentication token ID, a guest role is created and assigned to the requestor. The guest role can only access public volumes or owned volumes that specifically allow public access. The guest role can be updated using API management.

SECURE NETWORK ACCESS DEVICE
20220400123 · 2022-12-15 ·

Systems and techniques for securing network communications are described. A network device comprises a network interface and at least one accelerator. The network device inspects obtained data using the accelerator. The network device determines, based on the inspection, that the data is indicative of a violation of a security policy, and generates a response to the violation.

Secure wireless dataloading using in-flight entertainment connectivity systems

Devices, systems and methods for enhancing aircraft maintenance are disclosed. An exemplary method for improving dataloading in an airplane includes retrieving, from an in-flight entertainment connectivity (IFEC) system, at least one avionics software, the IFEC system comprising a mass storage device comprising a first storage segment and a second storage segment, the first storage segment being a secure storage segment configured to store the at least one avionics software, and the second storage segment being configured to store media content, and loading, using a wireless network converter coupled to a wired legacy port, the at least one avionics software onto a target avionics system.

Sharing data in an organized storage system
11526281 · 2022-12-13 · ·

A method including determining, by a first user device, a sharing encryption key based at least in part on a folder access private key associated with a folder and an assigned public key associated with a second user device; encrypting the folder access private key associated with the folder utilizing the sharing encryption key; and transmitting the encrypted folder access private key to enable the second user device to access the folder. Various other aspects are contemplated.

DYNAMIC PERMISSION MANAGEMENT OF STORAGE BLOCKS

A method, a computer program product, and a system of dynamically managing permissions of storage blocks. The method includes predicting at least one storage block that will be accessed by a user on a storage device and predicting a time window when the storage block will be accessed the user. The predictions can be performed by a machine learning model trained using the historical accesses and access times of the user. The method also includes granting the user an access to the storage block during the time window and monitoring whether the storage block is accessed by the user. The method also includes determining, based on the monitoring, that the user accessed the storage block, and revoking the access to the storage block granted to the user after a predetermined access time.

Selective boot sequence controller for resilient storage memory

A storage device for booting a host computing device includes a first storage memory region having a first storage memory controller, a second storage memory region having a second storage memory controller, and a resilient boot controller. The resilient boot controller is configured to store boot code in the first storage memory region, prevent write access by the host computing device through the first storage memory controller to the first storage memory region, detect a reset of the host computing device through the input/output interface, copy at least a portion of the boot code from the first storage memory region to the second storage memory region, responsive to detection of the reset of the host computing device, and enable read access of the copied boot code by the host computing device through the second storage memory controller of the second storage memory region, responsive to the copy operation.

Root of trust assisted access control of secure encrypted drives
11513698 · 2022-11-29 · ·

A system for data protection includes a computing device comprising a processor, a Hardware Root of Trust (HRoT) module and a storage device. The HRoT device is configured to: validate integrity of the computing device; authenticate the computing device to communicate with the storage device; and take over control of storage device access and behaviour whenever suspicious or unauthorized data access from local or remote computing devices is detected. The HRoT device is further configured to, in response to detecting a security risk to at least one of the computing device and the storage device, block communication of the storage device.

MANAGED METASTORAGE
20220374532 · 2022-11-24 ·

The present application discloses a method, system, and computer system for providing access to information stored on system for data storage. The method includes receiving a data request from a user, determining data corresponding to the data request, determining whether the user has requisite permissions to access the data, and in response to determining that the user has requisite permissions to access the data: determining a manner by which to provide access to the data, wherein the data comprises a filtered subset of stored data, and generating a token based at least in part on the user and the manner by which access to the data is to be provided.

MANAGING LIFECYCLE OF VIRTUALIZATION SOFTWARE RUNNING IN A STANDALONE HOST

Virtualization software installed in a standalone host is remediated according to a desired state model using a desired image of a virtualization software that is used to remediate virtualization software running in hosts which are logically grouped as a cluster of hosts not including the standalone host. The method of remediating the virtualization software installed in the standalone host includes the steps of generating a desired image of the virtualization software of the standalone host from a desired image of the virtualization software of the hosts in the cluster, and upon detecting a difference between an image of the virtualization software currently running in the standalone host and the desired image of the virtualization software of the standalone host, instructing the standalone host to remediate the image of the virtualization software currently running therein to match the desired image of the virtualization software of the standalone host.