-
1.
公开(公告)号:US20070113078A1
公开(公告)日:2007-05-17
申请号:US11406175
申请日:2006-04-18
申请人: Russell Witt , Timothy Bruce , David Helsley , Osvaldo Ridner , John Casey
发明人: Russell Witt , Timothy Bruce , David Helsley , Osvaldo Ridner , John Casey
IPC分类号: H04L9/00
CPC分类号: G06F21/78 , G06F21/602
摘要: Systems and methods are provided for encrypting data without regard to applications writing the data to, or reading the data from, encrypted data storage devices. An operating system intercept detects information indicating that a file will be encrypted and, in respond, sets device-level flags indicating encryption and also establishes one or more encryption keys to be used in the encryption process. A second intercept detects an input/output event and, in response, calls an encryption application to encrypt (or decrypt) the data before it is written to (or read from) the data storage device.
摘要翻译: 提供用于加密数据的系统和方法,而不考虑将数据写入加密数据存储设备或从加密数据存储设备读取数据的应用。 操作系统拦截检测指示文件将被加密的信息,并且在响应中设置指示加密的设备级标志,并且还建立要在加密过程中使用的一个或多个加密密钥。 第二个拦截检测输入/输出事件,作为响应,调用加密应用程序在将数据写入数据存储设备(或从其读取)之前加密(或解密)数据。
-
公开(公告)号:US20070113104A1
公开(公告)日:2007-05-17
申请号:US11405936
申请日:2006-04-18
申请人: Russell Witt , Timothy Bruce , David Helsley , Osvaldo Ridner , John Casey
发明人: Russell Witt , Timothy Bruce , David Helsley , Osvaldo Ridner , John Casey
CPC分类号: G06F21/78 , G06F21/602
摘要: Systems and methods are provided for encrypting data, generating encryption keys, and generating encryption indicators. The encryption indicators may be stored on a storage medium in a location separate from the location of stored encrypted data. The encryption indicator includes information indicative of the encryption key used for encrypting and decrypting the data. In one example, the storage medium is a tape, and the encryption indicator is stored in the user header label of the tape.
摘要翻译: 提供了用于加密数据,生成加密密钥和生成加密指示符的系统和方法。 加密指示符可以存储在与存储的加密数据的位置分开的位置的存储介质上。 加密指示符包括指示用于加密和解密数据的加密密钥的信息。 在一个示例中,存储介质是磁带,并且加密指示符存储在磁带的用户标题标签中。
-
公开(公告)号:US20070112677A1
公开(公告)日:2007-05-17
申请号:US11558252
申请日:2006-11-09
申请人: Russell Witt , Timothy Bruce , David Helsley , Osvaldo Ridner , John Casey
发明人: Russell Witt , Timothy Bruce , David Helsley , Osvaldo Ridner , John Casey
IPC分类号: G06Q99/00
摘要: The present invention is directed to a method and system for intercepting transactions for encryption. In accordance with a particular embodiment of the present invention, an application for a storage device is monitored. A transaction for the storage device is intercepted. An encryption request within the transaction is identified. Performance of the transaction is emulated by performing the encryption request in a predetermined exit point of the application.
摘要翻译: 本发明涉及用于截取用于加密的事务的方法和系统。 根据本发明的特定实施例,监视存储设备的应用。 存储设备的事务被拦截。 确定事务中的加密请求。 通过在应用的预定出口点执行加密请求来模拟事务的性能。
-
公开(公告)号:US10237115B2
公开(公告)日:2019-03-19
申请号:US14937261
申请日:2015-11-10
申请人: Alvin Yoon Lee , Kenneth Ellington , Lawrence Lee , David Helsley , Ryan Cerrato , Faisal Rabbani , Leland Townsend , Aaron McKay , Walter Brekeen, Jr. , Ronnie Mathes
发明人: Alvin Yoon Lee , Kenneth Ellington , Lawrence Lee , David Helsley , Ryan Cerrato , Faisal Rabbani , Leland Townsend , Aaron McKay , Walter Brekeen, Jr. , Ronnie Mathes
摘要: A method is described for determining automatically, via a network protocol, a system topology of a network system, wherein the network system comprises a plurality of network components, wherein each of the network components support a directory protocol, and wherein the system topology comprises a respective address of each of the plurality of network components. The system topology is mapped via the directory protocol. Finally, a role-based access credential is configured for a user, via the directory protocol, wherein the role-based access credential determines which of the plurality of network components are accessible to the user.
-
公开(公告)号:US09477696B2
公开(公告)日:2016-10-25
申请号:US14206467
申请日:2014-03-12
申请人: David Helsley , Lawrence Lee
发明人: David Helsley , Lawrence Lee
IPC分类号: G06F17/30
CPC分类号: G06F17/30289 , G06F17/30345
摘要: A method includes identifying a first value of a lock word corresponding to a data structure, by a process in a plurality of processes that each have access to the data structure. The method also includes copying the data structure to a corresponding shadow record. The method additionally includes modifying the shadow record with a desired update for the data structure, and atomically updating the data structure and the lock word, by the process, using a hardware built-in function. The updating includes identifying a second value of the lock word and determining whether the first value of the lock word and the second value of the lock word are equivalent. The method additionally includes, in response to determining that the first value of the lock word and the second value of the lock word are equivalent, replacing the data structure with the shadow record and incrementing the lock word.
摘要翻译: 一种方法包括通过多个进程中的每个都能访问数据结构的过程来识别对应于数据结构的锁定字的第一值。 该方法还包括将数据结构复制到相应的阴影记录。 该方法还包括用数据结构的期望更新来修改影子记录,并且通过使用硬件内置功能的过程来原子地更新数据结构和锁字。 所述更新包括识别所述锁定字的第二值并且确定所述锁定字的所述第一值和所述锁定字的所述第二值是否相等。 该方法还包括响应于确定锁定字的第一值和锁定字的第二值是等效的,用阴影记录替换数据结构并递增锁定字。
-
公开(公告)号:US09304707B1
公开(公告)日:2016-04-05
申请号:US14067396
申请日:2013-10-30
申请人: David Helsley , Lawrence Lee
发明人: David Helsley , Lawrence Lee
CPC分类号: G06F3/0655 , G06F3/061 , G06F3/0619 , G06F3/065 , G06F3/0659 , G06F3/067 , G06F3/0674
摘要: A method includes receiving, at a logical partition, a series of messages. Each message in the series of messages includes a respective block of data. The method further includes, in response to receiving the first message of the series of messages, suspending further processing of the series of messages. The method also includes identifying, from a header of the first message, a respective buffer address for each block of data. The method still further includes resuming processing of the series of messages. The method additionally includes, for each respective block of data, storing the respective block of data at the respective buffer address, and transferring the respective block of data from the corresponding buffer address to an open storage disk.
摘要翻译: 一种方法包括在逻辑分区处接收一系列消息。 一系列消息中的每个消息包括相应的数据块。 该方法还包括响应于接收到该系列消息的第一消息,暂停对该系列消息的进一步处理。 该方法还包括从第一消息的报头识别每个数据块的相应缓冲器地址。 该方法还包括恢复一系列消息的处理。 该方法还包括对于每个相应的数据块,将各个数据块存储在相应的缓冲器地址处,并将相应的数据块从相应的缓冲器地址传送到打开的存储盘。
-
公开(公告)号:US20150261790A1
公开(公告)日:2015-09-17
申请号:US14206467
申请日:2014-03-12
申请人: David Helsley , Lawrence Lee
发明人: David Helsley , Lawrence Lee
IPC分类号: G06F17/30
CPC分类号: G06F17/30289 , G06F17/30345
摘要: A method includes identifying a first value of a lock word corresponding to a data structure, by a process in a plurality of processes that each have access to the data structure. The method also includes copying the data structure to a corresponding shadow record. The method additionally includes modifying the shadow record with a desired update for the data structure, and atomically updating the data structure and the lock word, by the process, using a hardware built-in function. The updating includes identifying a second value of the lock word and determining whether the first value of the lock word and the second value of the lock word are equivalent. The method additionally includes, in response to determining that the first value of the lock word and the second value of the lock word are equivalent, replacing the data structure with the shadow record and incrementing the lock word.
摘要翻译: 一种方法包括通过多个进程中的每个都能访问数据结构的过程来识别对应于数据结构的锁定字的第一值。 该方法还包括将数据结构复制到相应的阴影记录。 该方法还包括用数据结构的期望更新来修改影子记录,并且通过使用硬件内置功能的过程来原子地更新数据结构和锁字。 所述更新包括识别所述锁定字的第二值并且确定所述锁定字的所述第一值和所述锁定字的所述第二值是否相等。 该方法还包括响应于确定锁定字的第一值和锁定字的第二值是等效的,用阴影记录替换数据结构并递增锁定字。
-
-
-
-
-
-