Patent application number | Description | Published |
20080288811 | Multi-node replication systems, devices and methods - Replication techniques are presented. According to an embodiment of a method, a node of a replicated storage network is assigned to be an owner of a data block to issue write memory block commands. The network includes at least two nodes including the node assigned to be the owner. If a read memory block command is received to read the data block, a read_lock is issued for the data block, the data block is read, and the read_lock for the data block is released. If a write memory block command is received to write new data to the data block, a write_lock is issued for the data block, the data block is written and a version associated with the data block is incremented, and the write_lock for the data block is released. | 11-20-2008 |
20090006869 | Techniques for synchronizing and archive-versioning of encrypted files - Techniques are presented for synchronizing and archive-versioning encrypted files. Blocks of encrypted data are managed and metadata is maintained for the blocks. The metadata identifies a maximum number of blocks and an index or parameter string. The string includes transaction identifiers and relative block numbers. The metadata is used as parameter information to a hash algorithm along with a hash key to acquire a unique initialization vector for each block. Each initialization vector when supplied to a cipher service along with a particular block of data produces an encrypted version of the data supplied or supplies a decrypted version of the data supplied. The techniques are also applied to files being archived and versioned from a storage volume. | 01-01-2009 |
20090204700 | COORDINATED PEER-TO-PEER (P2P) REPLICATED BACKUP AND VERSIONING - Techniques are presented for peer-to-peer (P2P) replicated backup and versioning. Peer clients register and share storage with one another for purposes of P2P data replication, data versioning, and/or data restoration via a P2P server. The P2P server also provides security and management between the peer clients. Moreover, the P2P sever can audit behaviors of the peer clients and take punitive actions against any of the peer clients that violate policy. | 08-13-2009 |
20090265302 | TECHNIQUES TO SUPPORT DISPARATE FILE SYSTEMS - Techniques for supporting disparate file systems are provided. A native file system is managed so as to be capable of supporting a protocol associated with access attempts to files of the file system, wherein the protocol is associated with a non-native and disparate file system. The files are managed, maintained, and served from the native file system to a plurality of similar and disparate operating systems and to similar and disparate file systems. | 10-22-2009 |
20090271620 | TECHNIQUES FOR SECURE DATA MANAGEMENT IN A DISTRIBUTED ENVIRONMENT - Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel application to access a secure hard drive of the secure server. The hard drive comes prepackaged with a service public and private key pair for encryption and decryption services with other secure servers of a network. The hard drive also comes prepackaged with trust certificates to authenticate the other secure servers for secure socket layer (SSL) communications with one another, and the hard drive comes with a data encryption key, which is used to encrypt storage of the secure server. The kernel application is used during data restores, data backups, and/or data versioning operations to ensure secure data management for a distributed network of users. | 10-29-2009 |
20090307689 | VIRTUAL MACHINE COMMUNICATIONS - Apparatus, systems, and methods may operate to emulate a virtual device with bidirectional communication capability using a hypervisor. A virtual machine, started by the hypervisor, is capable of receiving hypervisor information from, and transmitting virtual machine information to the hypervisor via the bidirectional communication capability. Further activity may include detecting the existence of the hypervisor information by detecting a logical connection of the virtual device, and masking the existence of the virtual device from a virtual machine user inside the virtual machine. Additional apparatus, systems, and methods are disclosed. | 12-10-2009 |
20090320014 | SYSTEM AND METHOD FOR OFFLINE UPDATION OF SOFTWARE IN VIRTUAL MACHINE (VM) IMAGES - System and method for offline management of software in VM images are described. In one embodiment, the method includes obtaining updation-related information from the software application and an operating system in which the software application runs while the software application is in an online mode, writing the updation-related information to a first set of files of a virtual machine (VM) image while the software application is in the online mode, reading the updation-related information from the first set of files of the VM image while the software application is in an offline mode; using the read updation-related information to update the software application while the software application is in the offline mode; and writing post-updation files to a second set of files of the VM image using the updation-related information read from the first set of files while the software application is in the offline mode. | 12-24-2009 |
20100017422 | FILE SYSTEM INTERFACE FOR CIM - Systems and methods for managing systems using common information models (CIM) are presented. According to a method embodiment, CIM functions are provided, and a file system interface for the CIM functions is provided. An embodiment of a method receives file operation commands through a client interface and performs CIM functions corresponding to the received file operation commands based on a mapping of the file operation commands to the CIM functions. | 01-21-2010 |
20100125819 | SIMULTANEOUS SCREEN SAVER OPERATIONS - Apparatus, systems, and methods may operate to execute a plurality of screen saver program instances to display a plurality of separately visible screen saver images using a single display device at substantially the same time. In some embodiments, some or all of the screen saver images are displayed in a plurality of non-overlapping display compartments. The images may be selectively assigned a dominant color, or color scheme. The compartments may have boundaries that can be selectively revised. Additional apparatus, systems, and methods are disclosed. | 05-20-2010 |
20100135497 | COMMUNICATION WITH NON-REPUDIATION - Apparatus, systems, and methods may operate to compare a first hashed value of at least a first decryption key, the first decryption key received from a sender, to a second hashed value of at least a second decryption key that has been received as a signed value from a receiver. Further operations may include sending the first decryption key to the receiver and sending the signed value to the sender upon determining that the first hashed value matches the second hashed value. Additional apparatus, systems, and methods are disclosed. | 06-03-2010 |
20110185170 | COMMUNICATION WITH NON-REPUDIATION AND BLIND SIGNATURES - Apparatus, systems, and methods may operate to receive, at a trusted third party (TTP), a signed disguised message as a disguised receiver signature from a receiver that has signed a disguised message using a blind signature process to transform the disguised message into the signed disguised message. Additional activities may include sending, from the TTP, an undisguised version of the disguised message to the receiver, and the receiver signature to a sender of the undisguised version, after determining that the receiver signature is valid. Additional apparatus, systems, and methods are disclosed. | 07-28-2011 |
20110246767 | SECURE VIRTUAL MACHINE MEMORY - Apparatus, systems, and methods may operate to allocating encrypted memory locations to store encrypted information, the information to be encrypted and decrypted using a single hypervisor. Further activity may include permitting access to a designated number of the encrypted memory locations to a single application executed by an associated virtual machine (VM) subject to the hypervisor, and denying access to the designated number of the encrypted memory locations to any other application executed by the associated VM, or any other VM. In some embodiments, the operational state of the associated VM may be restored using the encrypted information. Additional apparatus, systems, and methods are disclosed. | 10-06-2011 |
20120060005 | TECHNIQUES FOR COPYING ON WRITE - Techniques for copying on write are provided. Snapshots are managed and maintained for a source volume via sparse files. Metadata defines the sparse files and operations of a file system are used to create, define, and manipulate the metadata. | 03-08-2012 |
20120072692 | DATA ACCESS MANAGEMENT - Apparatus, systems, and methods may operate to assert a first semi-exclusive write lock with respect to a storage medium area by storing lock information when assertion of another semi-exclusive write lock with respect to the area is not detected. Additional activities may include writing data to the area by a writing entity that has asserted the first semi-exclusive write lock after determining the lock information has not changed, while substantially simultaneously de-asserting the first semi-exclusive write lock. Reading from the area may be determined as successful by determining that the semi-exclusive write lock was not asserted prior to or during the reading by checking the status of the lock information. Additional apparatus, systems, and methods are disclosed. | 03-22-2012 |
20120183145 | RECEIVER NON-REPUDIATION VIA A SECURE DEVICE - Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and exchanges certificates with a sender via the receiver. The sender encrypts data in a communication with the receiver. Separately, the sender sends an encrypted version of a decryption key to the receiver. The receiver presents the encrypted version of the key to the secure device and the secure device supplies the decryption key for use by the receiver to decrypt the previously sent encrypted data. | 07-19-2012 |
20120207301 | SYSTEMS AND METHODS FOR ENCRYPTING DATA - Data encryption techniques are presented. According to an embodiment of a method, a cryptographic hash of unencrypted data for data block X−1 is generated, and a hash of an encryption key is generated. An initialization vector for data block X is generated using the cryptographic hash and the hash of the encryption key. Data block X−1 and data block X are logically contiguous and data block X−1 logically precedes data block X. Encryption data for data block X is generated from unencrypted data for data block X using the initialization vector. | 08-16-2012 |
20130013562 | MULTI-NODE REPLICATION SYSTEMS, DEVICES AND METHODS - Replication techniques are presented. According to an embodiment of a method, a node of a replicated storage network is assigned to be an owner of a data block to issue write memory block commands. The network includes at least two nodes including the node assigned to be the owner. If a read memory block command is received to read the data block, a read_lock is issued for the data block, the data block is read, and the read_lock for the data block is released. If a write memory block command is received to write new data to the data block, a write_lock is issued for the data block, the data block is written and a version associated with the data block is incremented, and the write_lock for the data block is released. | 01-10-2013 |
20130156197 | SECURE BROADCASTING AND MULTICASTING - Techniques are presented for secure broadcasting and multicasting. Communications for multicasting and broadcasting are encrypted and decrypted using a secure communication key. The secure communication key is represented in a broadcast value that is sent to selected parties. The broadcast value represents the product of unique prime numbers and an additional number plus the secure communication key. Each party is represented by one of the unique prime numbers. Each party can acquire the secure communication key by dividing the broadcast value by its particular prime number to obtain a remainder, which is the secure communication key. | 06-20-2013 |
20140019772 | TECHNIQUES FOR SECURE DATA MANAGEMENT IN A DISTRIBUTED ENVIRONMENT - Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel application to access a secure hard drive of the secure server. The hard drive comes prepackaged with a service public and private key pair for encryption and decryption services with other secure servers of a network. The hard drive also comes prepackaged with trust certificates to authenticate the other secure servers for secure socket layer (SSL) communications with one another, and the hard drive comes with a data encryption key, which is used to encrypt storage of the secure server. The kernel application is used during data restores, data backups, and/or data versioning operations to ensure secure data management for a distributed network of users. | 01-16-2014 |
20140164791 | SECURE VIRTUAL MACHINE MEMORY - Apparatus, systems, and methods may operate to restore an operational state of an associated virtual machine (VM) using encrypted information stored in encrypted memory locations. A single hypervisor may be used to encrypt and decrypt the information. Access may be permitted to a designated number of the encrypted memory locations only to a single application executed by the associated VM subject to the hypervisor. Access may be denied to any other application executed by the associated VM, or any other VM. | 06-12-2014 |