SYSTEMS AND METHODS TO PROVIDE SECURE STORAGE
First Claim
Patent Images
1. A tangible computer readable storage medium comprising computer readable instructions which, when executed, cause a processor of a storage device to at least:
- responsive to a command from an agent to the storage device via a secure tunnel between the storage device and the agent, access first data at the storage device; and
identify a modification to data stored on the storage device by comparing the first data to second data on the storage device, the first data including at least one of trusted data and a hash of the trusted data, and the second data including at least one of untrusted data and a hash of the untrusted data.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and method to provide secure storage are disclosed. An example method includes establishing a secure tunnel between a storage device and an agent, provide a command from the agent to the storage device via the secure tunnel, access first data at the storage device in response to the command, and identify a modification to data stored on the storage device by comparing the first data to second data, wherein the comparison is done using the storage device.
13 Citations
20 Claims
-
1. A tangible computer readable storage medium comprising computer readable instructions which, when executed, cause a processor of a storage device to at least:
-
responsive to a command from an agent to the storage device via a secure tunnel between the storage device and the agent, access first data at the storage device; and identify a modification to data stored on the storage device by comparing the first data to second data on the storage device, the first data including at least one of trusted data and a hash of the trusted data, and the second data including at least one of untrusted data and a hash of the untrusted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A storage device, comprising:
-
a secure storage area; a second storage area; and a processor, the processor responsive to a command received from an agent via a secure tunnel, the processor to identify a modification to first data stored in the second storage area by comparing second data stored in the secure storage area to the first data in response to the command. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A method, comprising:
-
responsive to a command from an agent to the storage device via a secure tunnel between the storage device and the agent, accessing, with a processor, first data at the storage device; and identifying, with the processor, a modification to data stored on the storage device by comparing the first data to second data on the storage device, the first data including at least one of trusted data and a hash of the trusted data, and the second data including at least one of untrusted data and a hash of the untrusted data. - View Dependent Claims (18, 19, 20)
-
Specification