Patent classifications
G06F3/0637
Controlling access to application data
A method, system and computer-readable storage medium for controlling access to application data associated with an application configured on a computing device. The method comprises: storing data comprising, for each of a plurality of access levels associated with the application, first data indicative of a combination of one or more credentials associated with the respective access level and an access level key corresponding to the respective access level, the access level key being encrypted by the combination of one or more credentials associated with the respective access level; determining, based on the first data, an access level in the plurality of access levels corresponding to a combination of one or more credentials available to the application; decrypting the access level key in the stored data corresponding to the determined access level using the combination of one or more credentials available to the application; and providing access to encrypted application data associated with the application and corresponding to the determined access level using, at least in part, the decrypted access level key corresponding to the determined access level.
DATA TRANSMISSION MANAGEMENT
Methods, apparatuses, and non-transitory machine-readable media associated with data transmission are described. Data transmission management can include receiving, from an edge device via a radio at a first device, instructions associated with data transmission between a second device in communication with the first device and a cloud service in communication with the first device. Data transmission management can also include managing, at the first device and based on the instructions from the edge device, data received from a memory resource of the second device for transmission to the cloud service and data received from the cloud service for transmission to the memory resource of the second device. Data transmission management can further include enabling transmission of some, none, or all of the data between the cloud service and the memory resource of the second device and vice versa based on the management of the data.
DISTRIBUTED STORAGE SYSTEM AND VOLUME MIGRATION METHOD
A volume to which a storage function is applied is migrated without copying data written to a volume as a migration object between computers while maintaining functionality of the storage function. A plurality of computers are accessibly connected to each of one or more physical storage devices. Each computer migrates ownership of the volume as the migration object to a computer as a destination. When the migration object volume from a first computer to a second computer is an owner volume to which a storage function is applied, the storage function requiring control data for I/O of data, the control data being metadata other than domain mapping data (indicating a relationship between a volume region and a storage region and being metadata for the owner volume), in place of or in addition to the domain mapping data.
ACCESS CONTROL CONFIGURATIONS FOR SHARED MEMORY
Methods, systems, and devices for access control configurations for inter-processor communications are described to support reconfiguration of a dynamic access control configuration at a device. The configuration may support additional configuration fields that may be added to existing access control rules of the device. A processor of the device may request creation of a new shared memory resource, using a subregion of an existing memory resource, where the additional fields may indicate a parent memory resource for the new memory resource. The additional fields may also include a value which may indicate a processor which has write permission for a respective memory region of the shared memory, where other processors of the device may be prevented from writing to the memory region. The additional fields may further indicate a chain of delegation, or a history, of which processors have been assigned the exclusive write permission for the respective memory region.
GENERATING NAMES FOR CLOUD STORAGE CONTAINERS
Embodiments of the present disclosure include systems and methods for generating names for cloud storage containers. A unique identifier associated with a user of the client device is received from the client device. Next, a hash value is generated based on the unique identifier associated with the user of the client device. A character encoding scheme is then used to encode the hash value into a first encoded value. Instances of a first character in the encoded value is replaced with a defined second character to form a second encoded value. Finally, the second encoded value is sent to a cloud storage service for the cloud storage service to create a storage container using the second encoded value as a name of the storage container.
CONTROLLING ACCESS TO RESOURCES DURING TRANSITION TO A SECURE STORAGE SYSTEM
An example computer-implemented method of controlling access to a storage system includes using, in response to a request to access a resource of the storage system during a transitional state associated with a transition of the storage system to use a security protocol to control access to the storage system, a guest role to control access to the resource of the storage system when the request does not include a token identifier
ACCESS VERIFICATION ON PORTABLE MASS STORAGE DEVICES
Aspects include receiving, at a portable storage device, a file from a digital device. The file is stored into an unprotected storage area on the portable storage device and a storage policy associated with the digital device is accessed by the portable storage device. It is determined, by the portable storage device, based at least in part on the portable storage policy, whether to store a copy of the file in a protected storage area on the storage device. Access to the protected storage area is restricted to authenticated users. A copy of the file is stored in the protected storage area in response to determining that a copy of the file should be stored in the protected storage area.
ADAPTIVE RAS PLATFORM BASED ON CORRELATIVE PREDICTION
An embodiment of an electronic apparatus may comprise one or more substrates and a controller coupled to the one or more substrates, the controller including circuitry to apply a reliability, availability, and serviceability (RAS) policy for access to a memory in accordance with a first RAS scheme, change the applied RAS policy in accordance with a second RAS scheme at runtime, where the second RAS scheme is different from the first RAS scheme, and access the memory in accordance with the applied RAS policy. Other embodiments are disclosed and claimed.
ELECTRONIC DEVICE FOR MANAGING STORAGE SPACE AND METHOD OF OPERATING THE SAME
An electronic device may include a display, a memory, and at least one processor. The at least one processor may be configured to identify a first account and a second account associated with a user of the electronic device, store at least one first file associated with the first account in a first area of the memory, store at least one second file associated with the second account in a second area of the memory, identify a first memory usage of the first area of the memory associated with the first account, based on the first account, identify a second memory usage of the second area of the memory associated with the second account, based on the first account, and display a first execution screen including first information about the first memory usage and second information about the second memory usage on the display.
COMPUTING DEVICE AND CONTROL METHOD
According to one embodiment, a computing device executes an application including processing of inputting information from a nonvolatile memory unit and outputting information to the nonvolatile memory unit. The computing device includes a processing unit. The processing unit executes processing of receiving an I/O request to the nonvolatile memory unit from the application and generating one or more control commands for controlling the nonvolatile memory unit based on the I/O request. The processing unit executes processing of acquiring authorization information from a server. The processing unit executes processing of inserting or associating the acquired authorization information into or with the I/O request or the one or more control commands.