SYSTEMS AND METHODS FOR PROVIDING ANTI-MALWARE PROTECTION AND MALWARE FORENSICS ON STORAGE DEVICES
First Claim
Patent Images
1. A system, comprising:
- an operating system for performing operations on the system;
a storage device to communicate with the operating system, the storage device comprises, firmware to provide features for protection against malware; and
memory having configurable secure storage that is configured to monitor activity or restrict activity in the secure storage.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for providing features that enable anti-malware protection on storage devices are described. In one embodiment, a storage device includes a controller, firmware, and memory. The controller manages input/output operations for the storage device. The firmware provides features for protection against malware. The memory includes secure storage that is configured to provide a set of storage operations.
18 Citations
20 Claims
-
1. A system, comprising:
-
an operating system for performing operations on the system; a storage device to communicate with the operating system, the storage device comprises, firmware to provide features for protection against malware; and memory having configurable secure storage that is configured to monitor activity or restrict activity in the secure storage. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A storage device comprising:
-
a controller to manage input/output operations for the storage device; firmware being implemented with the controller, the firmware to provide features for protection against malware; and memory communicatively coupled to the controller, the memory having secure storage that is configured to provide a set of storage operations. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method, comprising:
-
initiating a secure log with firmware of a storage device of a system based on the detection of a specified event; maintaining active logging for a specific period of time following the occurrence of the specified event; completing the secure log; and storing the secure log in a secure area in the storage device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification