Patent application number | Description | Published |
20130219172 | SYSTEM AND METHOD FOR PROVIDING A SECURE BOOK DEVICE USING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS SECURE NETWORKS - A gateway device is used to control the flow of data to and from a network. To ensure that a message is not transmitted beyond the edge of an intranet without authorization such as outside of a private network, or to a device within the private network without authorization, a gateway will only establish a communication session with a computing device within the private network that possess a requisite community-of-interest key. If either the gateway device or computing device does not possess a matching community-of-interest key then a communication session cannot be established between the computing device and gateway device. Other aspects include transmitting a message destined for another network by converting it into a format in which it can be received outside the private network without knowledge of the type of security measures used within the private network. | 08-22-2013 |
20130311789 | BLOCK-LEVEL DATA STORAGE SECURITY SYSTEM - A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. The secure storage appliance is configured to present to a client a virtual disk, the virtual disk mapped to the plurality of physical storage devices. The secure storage appliance is capable of executing program instructions configured to generate a plurality of secondary blocks of data by performing splitting and encrypting operations on a block of data received from the client for storage on the virtual disk and reconstitute the block of data from at least a portion of the plurality of secondary blocks of data stored in shares on corresponding physical storage devices in response to a request from the client. | 11-21-2013 |
20140108796 | STORAGE OF CRYPTOGRAPHICALLY-SPLIT DATA BLOCKS AT GEOGRAPHICALLY-SEPARATED LOCATIONS - A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. The secure storage appliance is configured to present to a client a virtual disk, the virtual disk mapped to the plurality of physical storage devices. The secure storage appliance is capable of executing program instructions configured to generate a plurality of secondary data blocks by performing splitting and encrypting operations on a primary data block received from the client for storage on the virtual disk. For security, the secondary data blocks are stored at geographically-distributed locations. The secure storage appliance is also capable of executing program instructions configured to reconstitute the primary data block from at least a portion of the plurality of secondary data blocks stored in shares on corresponding physical storage devices in response to a request from the client. | 04-17-2014 |
20140108797 | STORAGE COMMUNITIES OF INTEREST USING CRYPTOGRAPHIC SPLITTING - Methods and systems of presenting data in a secure data storage network are disclosed. One method includes defining a community of interest capable of accessing data stored in a secure data storage network, the community of interest including a plurality of users desiring access to a common set of data. The method also includes associating the community of interest with a workgroup key. and, upon identification of a client device as associated with a user from among the plurality of users in the community of interest, presenting a virtual disk to the client device, the virtual disk associated with the workgroup key and a volume containing the common set of data, the volume including a plurality of shares stored on a plurality of physical storage devices. | 04-17-2014 |
20140122778 | RAPID NETWORK DATA STORAGE TIERING SYSTEM AND METHODS - Systems and methods are disclosed herein to a data storage tiering system comprising at least one storage array; at least one solid state storage unit; and a storage controller in communication with the at least one storage array and the at least one solid state storage unit and configured to combine the at least one storage array and the at least one solid state storage unit into one business tier data container using a virtualization layer and present the business tier data container on a storage area network as one storage array to a server, wherein the storage controller creates a business data tier by combining a partition of the solid state storage unit with the at least one storage array. | 05-01-2014 |
20140122876 | SYSTEM AND METHOD FOR PROVIDING A SECURE BOOK DEVICE USING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS SECURE NETWORKS - Portions of split data belonging to a set of data are sent over different data paths to their destinations. The data set is cryptographically spat into portions of the data set, and each portion is transported over a choice of multiple data paths to its destination. For example, a message is physically separated into portions of a message which are encrypted and sent over more than one network path to reach a destination. As a result, a snooper in a network may only be able view a partial set of random, disjoint, and incoherent portions of the message which are also encrypted. The portions of the message are split up in such a way that even if the snooper captured some of the portions of data, it would be difficult to reconstruct the message without also capturing most other partial portions of the message spread throughout the entire infrastructure of the network. | 05-01-2014 |
20140129844 | STORAGE SECURITY USING CRYPTOGRAPHIC SPLITTING - Methods and systems for storing data securely in a secure data storage network are disclosed. One method includes receiving at a secure storage appliance a block of data for storage on a volume, the volume associated with plurality of shares distributed across a plurality of physical storage devices. The method also includes cryptographically splitting the block of data received by the secure storage appliance into a plurality of secondary data blocks. The method further includes encrypting each of the plurality of secondary data blocks with a different session key, each session key associated with at least one of the plurality of shares. The method also includes storing each data block and associated session key at the corresponding share, remote from the secure storage appliance. | 05-08-2014 |
20140136688 | OPTIMIZING PARTITION PLACEMENT IN VIRTUALIZED ENVIRONMENTS - Application performance in cloud-based virtualized environments may be improved by migrating partitions executing within the cloud between servers. When an application spans multiple related partitions spread out on different servers within the cloud, related partitions may be migrated to the same server or nearby servers to reduce input/output (I/O) delay in communications between the related partitions. A method for improving performance may include analyzing a network traffic log to identify related partitions. Then, communications costs may be calculated for the related partitions and a partition selected for migration to a new location in the cloud. | 05-15-2014 |
20140181437 | EQUALIZING WEAR ON MIRRORED STORAGE DEVICES THROUGH FILE SYSTEM CONTROLS - Data stored in file blocks and storage blocks of a storage device may be tracked by the file system. The file system may track a number of writes performed to each file block and storage block. The file system may also track a state of each storage block. The file system may use information, such as the write count and the block state, to determine locations for updated data to be stored on the storage device. Placement of data by the file system allows the file system to manage wear on storage devices, such as solid state storage devices. | 06-26-2014 |
20140285443 | METHOD AND SYSTEM FOR KEYGLOVE FINGERMAPPING AN INPUT DEVICE OF A COMPUTING DEVICE - An input device and system for a computing device. The input device includes a plurality of touch-sensitive registration elements for positioning at various locations of at least one finger of at least one hand of a user of the computing device. The plurality of registration elements are configured to be coupled to a processor of the computing device. Also, the plurality of registration elements are configured to provide, in response to being touched by the user, a signal to the processor of the computing device indicative of the location of the touch-sensitive registration element. | 09-25-2014 |