DIGITAL LIFEBOAT, INC. Patent applications |
Patent application number | Title | Published |
20120246420 | INTERACTING WITH DATA IN HIDDEN STORAGE - Unused storage space within a data storage is utilized to store data while effectively making it appear to the operating system, other programs, and the user that the space is still available or unused. The space used to store the hidden data remains available for use by the operating system, other programs and uses upon a request. File system requests are monitored such that the hidden storage area remains hidden from unauthorized processes as well as to restrict operations within the hidden storage area that are attempted by unauthorized processes. | 09-27-2012 |
20100100587 | SYSTEMS AND METHODS FOR A DATA MANAGEMENT RECOVERY IN A PEER-TO-PEER NETWORK - Data Protection Services (DPS) can protect stored device resources and can ensure that a device's normal usages are not degraded or impinged while in use. Additionally, DPS can protect a user of the device from any and all complexities associated with joining a network and utilizing the network's storage capability (e.g., via Remote Storage Technology). DPS also can insure that a device joining the network can be self configured and that the relationship and\or utilization of a device's resources can be handled without burdening a user with additional associated decisions and configurations. Essentially, the DPS technology resident on a device, can automatically connect the device to a network and allow the device to operate in a manner that a typical user would not be confused by. | 04-22-2010 |
20100095082 | INTERACTING WITH DATA IN HIDDEN STORAGE - Unused storage space within a data storage is utilized to store data while effectively making it appear to the operating system, other programs, and the user that the space is still available or unused. The space used to store the hidden data remains available for use by the operating system, other programs and uses upon a request. File system requests are monitored such that the hidden storage area remains hidden from unauthorized processes as well as to restrict operations within the hidden storage area that are attempted by unauthorized processes. | 04-15-2010 |