Methods For Data-Smuggling
First Claim
1. A method for an application, running on a host system, to access a restricted portion of a storage device, the storage device also including a non-restricted portion, the method comprising the steps of:
- (a) providing a file system for running on the host system;
(b) permitting access to the storage device, by said file system, via only the restricted portion;
(c) sending an indication, from the application to the storage device, that data being sent by the application to the storage device via said file system is intended for the restricted portion;
(d) detecting said indication in the storage device; and
(e) in accordance with said indication, storing said data in the storage device in a manner that involves addressing both the restricted portion and the non-restricted portion.
6 Assignments
0 Petitions
Accused Products
Abstract
The present invention discloses methods for an application, running on a host system, to access a restricted area of a storage device, the method including the steps of: providing a file system for running on the host system; restricting access, by the file system, to the restricted area; sending an indication, from the application to the storage device, that data being sent by the application to the storage device via the file system is intended for the restricted area; detecting the indication in the storage device; and making the data, residing in the restricted area, available for reading by the application upon receiving an application request. Preferably, the method further includes the step of: releasing wasted areas, of the storage device, for use by the file system. Preferably, the method further includes the step of: copying non-restricted data from a non-restricted area into the restricted area.
12 Citations
6 Claims
-
1. A method for an application, running on a host system, to access a restricted portion of a storage device, the storage device also including a non-restricted portion, the method comprising the steps of:
-
(a) providing a file system for running on the host system; (b) permitting access to the storage device, by said file system, via only the restricted portion; (c) sending an indication, from the application to the storage device, that data being sent by the application to the storage device via said file system is intended for the restricted portion; (d) detecting said indication in the storage device; and (e) in accordance with said indication, storing said data in the storage device in a manner that involves addressing both the restricted portion and the non-restricted portion. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification