Patent classifications
G06F11/1469
Secure Firmware Update through a Predefined Server
The disclosed embodiments relate to securely booting firmware images. In one embodiment, a method is disclosed comprising receiving, by a memory device, a firmware update; validating, by the memory device, a signature associated with the firmware update; copying, by the memory device, an existing firmware image to an archive location, the archive location storing a plurality of firmware images sorted by version identifiers; booting, by the memory device, and executing the firmware update; and replacing, by the memory device, the firmware update with the existing firmware image stored in the archive location upon detecting an error while booting the firmware update.
ELECTRONIC DEVICE AND OPERATION METHOD THEREOF
An electronic device includes a display, a memory, and a processor operatively connected to the display and the memory. The memory stores instructions that, when executed, cause the processor to receive backup data from an external electronic device, identify characteristics of the external electronic device based on the backup data, identify characteristics of the electronic device based on the backup data, at least partially change the backup data based on the characteristics of the electronic device, and display a result of performing a restoring operation based on the at least partially changed backup data on the display.
COMPUTE PLATFORM FOR MACHINE LEARNING MODEL ROLL-OUT
There are provided systems and methods for a compute platform for machine leaning model roll-out. A service provider, such as an electronic transaction processor for digital transactions, may provide intelligent decision-making through decision services that execute machine learning models. When deploying or updating machine learning models in these engines and decision services, a model package may include multiple models, each of which may have an execution graph required for model execution. When models are tested from proper execution, the models may have non-performant compute items, such as model variables, that lead to improper execution and/or decision-making. A model deployer may determine and flag these compute items as non-performant and may cause these compute items to be skipped or excluded from execution. Further, the model deployer may utilize a pre-production computing environment to generate the execution graphs for the models prior to deployment or upgrading.
Disaster recovery systems and methods with low recovery point objectives
Data recovery systems and methods utilize object-based storage for providing a data protection and recovery methodology with low recovery point objectives, and for enabling both full recovery and point-in-time based recovery. Data generated at a protected site (e.g., via one or more virtual machines) is intercepted during write procedures to primary storage. The intercepted data is replicated via a replication log, provided as data objects, and transmitted to an object based storage system. During recovery, data objects may be retrieved through point-in-time based recovery directly by the systems of the protected site, and/or data objects may be provided via full recovery, for example, within a runtime environment of a recovery site, with minimal data loss and operation interruption by rehydrating data objects within the runtime environment via low-latency data transfer and rehydration systems.
Snapshot and backup copy operations for individual virtual machines
System and techniques for performing snapshot and backup copy operations for individual virtual machines in a shared storage. The system can also include one or more shared physical computer storage devices communicatively coupled to the hypervisor to store the plurality of virtual machines. A plurality of storage volumes can be provided in the one or more shared physical computer storage devices where each storage volume uniquely corresponding to one of the virtual machines. The system can issue a command to a hypervisor to perform a snapshot or backup copy operation with a particular information management policy.
Data query method and apparatus
This disclosure provides a data query method and apparatus. The method includes: dividing an object storage system into a plurality of storage spaces based on time slices, establishing a mapping relationship between the storage spaces, the time slices, and operation records, recording time slice information corresponding to a snapshot after generating the snapshot, and implementing services such as a read-only service, a snapshot rollback service, and an object change service based on the snapshot, so as to improve query performance without adding extra storage overheads.
Past-state backup generator and interface for database systems
An interface for requesting, and technique for generation of, a backup of a past state of a database table are provided. Changes made to a database table are accumulated, in durable storage, and snapshots of partitions of the table are obtained. The accumulated changes and the successive partition snapshots are used to generate a past state of the database at any point in time across a continuum between successive snapshots. Although each partition of the table may have a snapshot that was generated at a time different from when other partition snapshots were generated, changes from respective change logs may be selectively log-applied to distinct partitions of a table to generate backup in the past of the entire table at common point-in-time across partitions.
System and method of preventing malware reoccurrence when restoring a computing device using a backup image
Disclosed herein are systems and method for preventing malware reoccurrence when restoring a computing device using a backup image. In one exemplary aspect, a method may identify, from a plurality of backup images for a computing device, a backup image that was created most recently before the computing device was compromised. The method may mount the backup image as a disk and scanning the disk for malicious software. The method may disable all ports and services on the computing device to prevent unauthorized network connections and service launches. The method may restore data to the computing device from the mounted disk. The method may update software on the computing device and applying latest patches, and reopen the ports and restart the services on the computing device subsequent to updating the software and applying the latest patches.
Hybrid firmware code protection
A firmware protection module implements a hybrid firmware protection scheme on a computing device. The firmware protection module intercepts a message from a processor to a memory of the computing device. The message includes a command and an address in the memory corresponding to a firmware module stored in the module. The firmware protection module determines whether the command in the message is prohibited and whether the address in the message is protected. Responsive to a determination that the command is prohibited and the address is protected, the firmware protection module prevents at least a portion of the message from reaching the memory.
Reporting control information errors
Methods, systems, and devices for reporting control information errors are described. A state of a memory array may be monitored during operation. After detecting an error (e.g., in received control information), the memory device may enter a first state (e.g., a locked state) and may indicate to a host device that an error was detected, the state of the memory array before the error was detected, and/or at least a portion of a control signal carrying the received control information. The host device may diagnose a cause of the error based on receiving the indication of the error and/or the copy of the control signal. After identifying and/or resolving the cause of the error, the host device may transmit one or more commands (e.g., unlocking the memory device and returning the memory array to the original state) based on receiving the original state from the memory device.