Systems and methods to provide secure storage
First Claim
Patent Images
1. A tangible computer readable storage medium comprising computer readable instructions which, when executed, cause a processor of a storage device to at least:
- receive a data integrity check command to perform a data integrity check from a remote agent via a secure tunnel;
responsive to the data integrity check command;
access a first data at the storage device;
identify a modification to the first data stored on the storage device by comparing the first data to second data on the storage device, the first data including at least one of trusted data and a hash of the trusted data, and the second data including at least one of untrusted data and a hash of the untrusted data; and
send results of the data comparison to the remote agent via the secure tunnel in response to the data integrity command sent from the remote agent.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and method to provide secure storage are disclosed. An example method includes establishing a secure tunnel between a storage device and an agent, provide a command from the agent to the storage device via the secure tunnel, access first data at the storage device in response to the command, and identify a modification to data stored on the storage device by comparing the first data to second data, wherein the comparison is done using the storage device.
-
Citations
20 Claims
-
1. A tangible computer readable storage medium comprising computer readable instructions which, when executed, cause a processor of a storage device to at least:
-
receive a data integrity check command to perform a data integrity check from a remote agent via a secure tunnel; responsive to the data integrity check command; access a first data at the storage device; identify a modification to the first data stored on the storage device by comparing the first data to second data on the storage device, the first data including at least one of trusted data and a hash of the trusted data, and the second data including at least one of untrusted data and a hash of the untrusted data; and send results of the data comparison to the remote agent via the secure tunnel in response to the data integrity command sent from the remote agent. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A storage device, comprising:
-
a secure storage area; a second storage area; and a processor, the processor responsive to a data integrity check command to perform a data integrity check to;
identify a modification to a first data stored in the second storage area by comparing second data stored in the secure storage area to the first data, the data integrity check command received from a remote agent via a secure tunnel; andsend results of the data comparison to the remote agent via the secure tunnel in response to the data integrity check command. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A method, comprising:
-
receiving a data integrity check command to perform a data integrity check from a remote agent via a secure tunnel; responsive to the data integrity check command received from a remote agent via a secure tunnel; accessing, with a processor, a first data at a storage device; and identifying, with the processor, a modification to the first data stored on the storage device by comparing the first data to second data on the storage device, the data integrity command sent from an agent to the storage device via the secure tunnel between the storage device and the remote agent, the first data including at least one of trusted data and a hash of the trusted data, and the second data including at least one of untrusted data and a hash of the untrusted data; and sending results of the data comparison to the remote agent via the secure tunnel. - View Dependent Claims (18, 19, 20)
-
Specification