Data migration from a non-raid volume to a raid volume
    22.
    发明授权
    Data migration from a non-raid volume to a raid volume 有权
    数据从非raid卷迁移到raid卷

    公开(公告)号:US07418548B2

    公开(公告)日:2008-08-26

    申请号:US10716932

    申请日:2003-11-18

    IPC分类号: G06F12/00

    摘要: In one embodiment, a method is provided that may include, issuing a read request to request reading of at least one portion of data stored in a first storage device and issuing a write request to request writing of the at least one portion of the data into a second storage device or at least one location in the first storage device. The at least one location may be comprised in a volume of a redundant array of inexpensive disks (RAID), the at least one portion of data being stored in a non-RAID volume in the first storage device. The method of this embodiment also may include, if a request to access one or more other portions of the data is received and/or issued by one or more operating system processes while the reading and/or the writing is occurring, issuing an access request to request accessing of the one or more other portions of the data. Of course, many modifications are possible without departing from this embodiment.

    摘要翻译: 在一个实施例中,提供了一种方法,其可以包括:发出读取请求以请求读取存储在第一存储设备中的数据的至少一部分,并发出写入请求,以请求将至少一部分数据写入到 第二存储设备或第一存储设备中的至少一个位置。 所述至少一个位置可以包括在廉价磁盘(RAID)的冗余阵列的卷中,所述至少一部分数据被存储在所述第一存储设备中的非RAID卷中。 该实施例的方法还可以包括,如果在读取和/或写入正在发生时由一个或多个操作系统进程接收和/或发出访问数据的一个或多个其他部分的请求,则发出访问请求 以请求访问数据的一个或多个其他部分。 当然,在不偏离本实施例的情况下,可以进行许多修改。

    Method for dynamically exposing backup and restore volumes
    23.
    发明申请
    Method for dynamically exposing backup and restore volumes 审中-公开
    动态显示备份和恢复卷的方法

    公开(公告)号:US20070150651A1

    公开(公告)日:2007-06-28

    申请号:US11317505

    申请日:2005-12-22

    IPC分类号: G06F12/16

    摘要: A method and apparatus for storing and protecting a restore environment is provided. The restore environment is stored in a redundant array of independent disks (RAID) volume which is hidden from an operating system during runtime operations. Upon detecting that a restore operation is required due to a corrupted or missing image, the RAID volume storing the restore environment is dynamically exposed so that it can be accessed by the restore operation.

    摘要翻译: 提供了一种用于存储和保护恢复环境的方法和装置。 恢复环境存储在独立磁盘(RAID)卷的冗余阵列中,在运行时操作期间从操作系统隐藏。 检测到由于损坏或丢失图像而需要还原操作时,存储还原环境的RAID卷将被动态公开,以便可以通过还原操作进行访问。

    MULTINODE HUBS FOR TRUSTED COMPUTING
    25.
    发明申请
    MULTINODE HUBS FOR TRUSTED COMPUTING 有权
    用于信息计算的MULTINODE HUBS

    公开(公告)号:US20150281237A1

    公开(公告)日:2015-10-01

    申请号:US14225140

    申请日:2014-03-25

    IPC分类号: H04L29/06

    摘要: Embodiments of multinode hubs for trust operations are disclosed herein. In some embodiments, a multinode hub may include a plurality of memory regions, a trapping module, and a trusted platform module (TPM) component. Each memory region may be associated with and receive trust operation data from a coherent computing node. The trapping module may generate trap notifications in response to accesses to the plurality of memory regions by the associated coherent computing nodes. The trap notifications may indicate which of the plurality of memory locations has been accessed, and the TPM component may process the trust operation data in a memory region indicated by a trap notification. Other embodiments may be disclosed and/or claimed.

    摘要翻译: 本文公开了用于信任操作的多节点集线器的实施例。 在一些实施例中,多节点集线器可以包括多个存储器区域,陷阱模块和可信平台模块(TPM)组件。 每个存储器区域可以与相干计算节点相关联并接收来自相干计算节点的信任操作数据。 捕获模块可以响应于相关联的相干计算节点对多个存储器区域的访问而产生陷阱通知。 陷阱通知可以指示已经访问了多个存储器位置中的哪一个,并且TPM组件可以处理由陷阱通知指示的存储器区域中的信任操作数据。 可以公开和/或要求保护其他实施例。

    CPU-BASED MEASURED BOOT
    26.
    发明申请
    CPU-BASED MEASURED BOOT 有权
    基于CPU的测量引导

    公开(公告)号:US20150149751A1

    公开(公告)日:2015-05-28

    申请号:US14091026

    申请日:2013-11-26

    IPC分类号: G06F21/57

    CPC分类号: G06F21/575

    摘要: A measured boot process for an electronic device includes taking a measurement of the early system start up instructions of the electronic device upon a reboot or start-up of the device. A representation of the measurement is stored in a trusted platform module of the electronic device prior to initialization of the trusted platform module. Access is granted to the representation of the measurement stored in the trusted platform module prior to initialization of the trusted platform module thereby enabling the representation of the measurement to serve as the core root of trust for measurement.

    摘要翻译: 用于电子设备的测量引导过程包括在设备重新启动或启动时对电子设备的早期系统启动指令进行测量。 在可信平台模块的初始化之前,测量的表示被存储在电子设备的可信平台模块中。 在可信平台模块的初始化之前,访问被存储在可信平台模块中的测量的表示,从而使得测量的表示能够用作用于测量的信任的核心根。

    UNAUTHORIZED ACCESS AND/OR INSTRUCTION PREVENTION, DETECTION, AND/OR REMEDIATION, AT LEAST IN PART, BY STORAGE PROCESSOR
    28.
    发明申请
    UNAUTHORIZED ACCESS AND/OR INSTRUCTION PREVENTION, DETECTION, AND/OR REMEDIATION, AT LEAST IN PART, BY STORAGE PROCESSOR 有权
    未经授权的访问和/或指令的预防,检测和/或修复,至少由存储处理器

    公开(公告)号:US20140109170A1

    公开(公告)日:2014-04-17

    申请号:US13995244

    申请日:2012-10-17

    IPC分类号: G06F21/55

    摘要: An embodiment may include a storage processor that may be comprised, at least in part, in a host. The host may include at least one host central processing unit (CPU) to execute at least one host operating system (OS). The storage processor may execute at least one operation in isolation from interference from and control by the at least one host CPU and the at least one host OS. The at least one operation may facilitate, at least in part: (1) prevention, at least in part, of unauthorized access to storage, (2) prevention, at least in part, of execution by the at least one host CPU of at least one unauthorized instruction, (3) detection, at least in part, of the at least one unauthorized instruction, and/or (4) remediation, at least in part, of at least one condition associated, at least in part, with the at least unauthorized instruction.

    摘要翻译: 一个实施例可以包括可以至少部分地包括在主机中的存储处理器。 主机可以包括至少一个主机中央处理单元(CPU),以执行至少一个主机操作系统(OS)。 存储处理器可以与至少一个主机CPU和至少一个主机OS的干扰和控制隔离起来执行至少一个操作。 所述至少一个操作可以至少部分地促进:(1)至少部分地防止非法访问存储,(2)至少部分地防止所述至少一个主机CPU执行 至少一个未经授权的指令,(3)至少部分地至少检测至少一个未经授权的指令,和/或(4)至少部分地至少部分地与 至少未经授权的指令。

    REPLACEABLE ENCRYPTION KEY PROVISIONING
    29.
    发明申请
    REPLACEABLE ENCRYPTION KEY PROVISIONING 审中-公开
    可更换加密关键提供

    公开(公告)号:US20140010365A1

    公开(公告)日:2014-01-09

    申请号:US13543453

    申请日:2012-07-06

    IPC分类号: H04L9/08

    CPC分类号: H04L9/0861 H04L9/0877

    摘要: Embodiments of an invention for replaceable encryption key provisioning are disclosed. In one embodiment, a processor includes a global key, encryption hardware, and firmware. The encryption hardware is to perform an encryption algorithm using the global key, wherein the global key is accessible only as an input to the encryption hardware. The firmware is to store a constant and instructions to cause the encryption hardware to generate a private key by decrypting the constant using the global key.

    摘要翻译: 公开了用于可替换的加密密钥供应的发明的实施例。 在一个实施例中,处理器包括全局密钥,加密硬件和固件。 加密硬件是使用全局密钥执行加密算法,其中全局密钥只能作为加密硬件的输入访问。 固件是存储常数和指令,以使加密硬件通过使用全局密钥解密常数来生成私钥。

    METHOD AND APPARATUS FOR POLICY-BASED CONTENT SHARING IN A PEER TO PEER MANNER USING A HARDWARE BASED ROOT OF TRUST
    30.
    发明申请
    METHOD AND APPARATUS FOR POLICY-BASED CONTENT SHARING IN A PEER TO PEER MANNER USING A HARDWARE BASED ROOT OF TRUST 有权
    使用基于硬件的信托基础的对等方式与对等人共享的基于策略的内容的方法和装置

    公开(公告)号:US20130283392A1

    公开(公告)日:2013-10-24

    申请号:US13997320

    申请日:2011-12-08

    IPC分类号: G06F21/10

    摘要: Securely sharing content between a first system and a second system is provided. A hardware-based root of trust is established between the first system and a server. Content requested by a user and an encrypted license blob associated with the content is received by the first system from the server. A first agent on the first system connects with a second agent on the second system. The encrypted license blob and a sub-license request are sent from the first agent to a security processor on the first system. The first security processor decrypts the encrypted license blob, validates the sub-license request, and if allowed, creates a sub-license to allow the second system to play the content. The first security processor sends the sub-license to a security processor on the second system. The first system provides access to the content to the second system for future playback according to the sub-license.

    摘要翻译: 提供了在第一系统和第二系统之间安全地共享内容。 在第一个系统和服务器之间建立基于硬件的信任根。 由用户请求的内容和与该内容相关联的加密许可证blob由第一系统从服务器接收。 第一系统上的第一代理与第二系统上的第二代理连接。 加密的许可证blob和子许可证请求从第一代理程序发送到第一个系统上的安全处理器。 第一个安全处理器解密加密的许可证blob,验证子许可证请求,如果允许,则创建一个允许第二个系统播放内容的子许可证。 第一个安全处理器将子许可证发送到第二个系统上的安全处理器。 第一系统根据子许可证提供对第二系统的内容的访问以供将来播放。