Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure storage device

A storage device and secure storage technology, applied in computer security devices, instruments, transmission systems, etc., can solve problems such as loss of data and sensitive information, identity theft, productivity, loss, etc.

Pending Publication Date: 2020-04-10
BITDEFENDER IPR MANAGEMENT
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Malicious programs in their many forms such as computer viruses, worms, Trojan horses, and spyware present a serious risk to millions of computer users, making them vulnerable to loss of data and sensitive information, identity theft, and loss of productivity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure storage device
  • Secure storage device
  • Secure storage device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In the following description, it should be understood that all recited connections between structures may be direct operative connections, or indirect operative connections through intermediate structures. A component set contains one or more components. Any reference to an element should be understood to mean at least one element. A plurality of elements includes at least two elements. Unless otherwise required, any described method steps do not necessarily have to be performed in the particular illustrated order. Deriving a first element (eg, data) from a second element encompasses that the first element is equal to the second element, and that the first element is generated by processing the second element and optionally other data. Making a determination or decision based on parameters encompasses making a determination or decision based on parameters and optionally other data. Unless otherwise specified, an indicator of a quantity / data may be the quantity / data i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Described systems and methods allow protecting a host system against computer security threats, and in particular against ransomware and unauthorized access to private data. In some embodiments, a conventional non-volatile storage unit (e.g., magnetic, optical, or solid state drive) is paired with a dedicated security processor, forming a secure storage device which may connect to the primary processor of the host system via a conventional storage interface, such as a SATA, PCI, or USB connector. The primary processor and the security processor exchange messages and data via the storage interface. The security processor controls access of the primary processor to the storage unit, and may execute security and data encryption operations.

Description

[0001] Related applications [0002] This application claims the benefit of the filing date of US Provisional Patent Application No. 62,541,505, filed 08 / 04 / 2017, entitled "Secure Storage Device," the entire contents of which are incorporated herein by reference. Background technique [0003] The present invention relates to computer security, and in particular, to protecting computers from malicious software (malware). [0004] Malware affects a large number of computer systems around the world. Malicious programs, in their many forms such as computer viruses, worms, Trojan horses, and spyware, present a serious risk to millions of computer users, making them vulnerable to loss of data and sensitive information, identity theft, and loss of productivity. Ransomware is a particularly dangerous type of malicious program that encrypts a set of files found on a storage medium, such as a computer's hard drive, and then demands payment from the owner of the files to restore the co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/56G06F3/06H04L29/06G06F16/16
CPCG06F21/566H04L63/0428G06F21/80G06F3/0661G06F3/0673G06F21/56G06F21/602G06F3/0658G06F3/0622G06F3/0623G06F21/6218G06F3/0676G06F3/0679G06F3/0677G06F3/065G06F3/0655
Inventor 山多尔·卢卡奇达恩-克里斯蒂安·图里库
Owner BITDEFENDER IPR MANAGEMENT
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More