Check patentability & draft patents in minutes with Patsnap Eureka AI!

Safety storage application

A storage device and security data technology, applied in computer security devices, preventing unauthorized use of memory, instruments, etc., can solve the problems of enterprises’ hesitation in using storage applications, and achieve the effect of protecting privacy and integrity

Inactive Publication Date: 2006-08-30
INT BUSINESS MASCH CORP
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But businesses may be hesitant to use storage applications if they are concerned about the security of their data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety storage application
  • Safety storage application
  • Safety storage application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] figure 1 A secure storage area network system 10 implementing the storage application of the present invention is shown. like figure 1 As shown, the data sources providing the plaintext data to be stored in the storage application 15 (implementing storage media, eg disk 21 and tape 22 ) are located eg in the server device 12 . It will be appreciated that other non-volatile types of storage media may be implemented, such as optical disks, magnetic disks, compacts, flash drives, etc., as well as volatile storage media. The data blocks to be written out to the storage application are encrypted according to the processing provided by the security software program 20 , which is executed on the server device 12 in order to generate the ciphertext stored in the storage application 15 . In one embodiment, server device 12 provides a network interface to operate on server device 12 according to a storage area network communication standard, such as Fiber Channel or iSCSI, over...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method implementing advanced cryptographic techniques to protect both the confidentiality and integrity of data sent to and received from a storage system or storage utility. Particularly, the system and method provides for the privacy and integrity of stored data. The integrity protection scheme employed defends against modification of data as well as 'replay' and 'relocation' of data since cryptographic integrity values are not only a function of the plaintext data and a cryptographic key, but also a function of the 'address' of the disk block and a 'whitening' value that defends against 'replay attacks'. The integrity scheme protects the integrity of an entire virtual disk while allowing incremental, random access updates to the blocks on the virtual disk.

Description

technical field [0001] The present invention relates to data storage systems, and more particularly to a novel storage utility in which the confidentiality and integrity of information is protected. Background technique [0002] Enterprise IT infrastructure must be flexible and "responsive" so that the enterprise can quickly adapt to changes in market and business conditions, and as IT infrastructure is increasingly becoming "mission-critical", it must be elastic. Storage applications can provide this kind of flexibility, responsiveness and elasticity, and it can allow enterprises to focus on their core competencies and outsource their storage to specialized companies. Storage applications can be flexible and dynamically respond to an enterprise's storage needs, providing more or less storage as needed, with a variable cost structure based on the amount of storage used. Storage applications can also provide resiliency through disk "mirroring" and backup and recovery service...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F21/00
CPCG06F21/64G06F21/80
Inventor 理查德·H·伯维威廉·埃里克·霍尔
Owner INT BUSINESS MASCH CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More