Dell products l.p. (20240345741). SYSTEM AND METHOD FOR MANAGING DATA STORAGE TO IDENTIFY UNDESIRED DATA MODIFICATION simplified abstract

From WikiPatents
Revision as of 02:15, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

SYSTEM AND METHOD FOR MANAGING DATA STORAGE TO IDENTIFY UNDESIRED DATA MODIFICATION

Organization Name

dell products l.p.

Inventor(s)

CHING-YUN Chao of Austin TX (US)

EFI Levi of Be'er Sheva (IL)

LIOR Benisty of Be'er Sheva (IL)

ARIEH Don of Newton MA (US)

SYSTEM AND METHOD FOR MANAGING DATA STORAGE TO IDENTIFY UNDESIRED DATA MODIFICATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240345741 titled 'SYSTEM AND METHOD FOR MANAGING DATA STORAGE TO IDENTIFY UNDESIRED DATA MODIFICATION

Simplified Explanation: The patent application discusses methods and systems for managing data storage by implementing a framework to check if requested data payloads have been modified before storage. This involves using integrity verification data generated by an application to perform these checks.

  • Data storage management system
  • Framework for checking data payload modifications
  • Integrity verification data generated by an application
  • Checks performed using integrity verification data
  • Directed storage of payloads and integrity verification data

Potential Applications: 1. Cloud storage services 2. Database management systems 3. File sharing platforms

Problems Solved: 1. Ensuring data integrity before storage 2. Preventing unauthorized modifications to data 3. Enhancing data security measures

Benefits: 1. Improved data reliability 2. Enhanced data security 3. Streamlined data storage processes

Commercial Applications: The technology could be applied in industries such as cloud computing, cybersecurity, and data management services, offering enhanced data protection and integrity verification capabilities.

Prior Art: Readers interested in prior art related to this technology may explore research on data storage integrity verification systems and methods.

Frequently Updated Research: Researchers are continually exploring advancements in data storage security and integrity verification technologies, which may offer further insights into this field.

Questions about Data Storage Management: 1. How does the framework for checking data payload modifications enhance data security? 2. What are the potential implications of using integrity verification data in data storage management systems?


Original Abstract Submitted

methods and systems for managing data storage are disclosed. the storage of data may be managed by implementing a framework for checking whether payloads requested for storage have been modified prior to storage. the checks may be performed using integrity verification data that is based on corresponding payloads. the payloads and integrity verification data may be generated by an application, and both may be directed to storage. once received, the storage may perform the checks using the integrity verification data.