Thadikaran
Paul Thadikaran, Rancho Cordova, CA US
Patent application number | Description | Published |
---|---|---|
20130340088 | ANTI-MALWARE PROTECTION OPERATION WITH INSTRUCTION INCLUDED IN AN OPERAND - Disclosed is a system and method for extending anti-malware protection to systems having multiple storage devices, such as RAID. In embodiments, a trusted connection may be established between a host and a controller of the multiple storage devices. The trusted connection may use various information encryption techniques to undermine attempts by malware to preserve malware-infected locations on the storage devices by redirecting anti-malware protection related operations by the host. Through an encrypted and trusted connection between the host and a controller of the multiple storage devices, anti-virus and/or anti-malware software (hereinafter, AVS) may transmit encrypted anti-malware protection related operations to the controller of the multiple storage devices, overcoming detection and/or diversion by the malware. Other embodiments may be described and claimed. | 12-19-2013 |
Paul J. Thadikaran, Portland, OR US
Patent application number | Description | Published |
---|---|---|
20130283380 | USER CONTROLLABLE PLATFORM-LEVEL TRIGGER TO SET POLICY FOR PROTECTING PLATFORM FROM MALWARE - Embodiments of systems, apparatuses, and methods to protect data stored in a storage system of a device from malware alternation are described. In some embodiments, a system receives an indication that the data is to be protected. In addition, the system further triggers an interrupt of the device and secures the data from the malware alternation. | 10-24-2013 |
Paul J. Thadikaran, Ranch Cordova, CA US
Patent application number | Description | Published |
---|---|---|
20140096260 | SYSTEMS AND METHODS TO PROVIDE SECURE STORAGE - Systems and method to provide secure storage are disclosed. An example method includes establishing a secure tunnel between a storage device and an agent, transferring first data from the storage device to the agent via the secure tunnel, the secure tunnel to prevent software executing in an operating system from modifying the data, and identifying a data modification by comparing the first data to second data. | 04-03-2014 |