Browse Prior Art Database

Storage Locking for Security

IP.com Disclosure Number: IPCOM000257848D
Publication Date: 2019-Mar-15
Document File: 2 page(s) / 39K

Publishing Venue

The IP.com Prior Art Database

Related People

Girish Kumar: AUTHOR [+2]

Abstract

these switches must be controlled to protect the privacy and the intellectual property of the company. Given the nature of the information being stored, network switches are the preferred attack target. Currently, the problem is addressed by providing limited access to a few privileged administrative users and deploying security software. The following solution uses storage locking to prevent changes to persistent memory. Comparisons are made of all persistent memory at system runtime to evaluate whether modifications have occurred. This approach is different from other solutions because it completely locks the persistent memory.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 61% of the total text.

1 |P a g e IN82018004- Storage Locking for Security ©2018 ALE International

Docket Number IN82018004

Date Aug. 20, 2018

Title Storage Locking for Security

Contributors Girish Kumar

Sabarinathan Vachiravel

Muthu Krishnan Veeraraghavan

Company ALE International

Invention

Network switches collect, compile and store an increasing amount of sensitive information. Access

to these switches must be controlled to protect the privacy and the intellectual property of the

company. Given the nature of the information being stored, network switches (including switch

software, configuration, EEPROM content), are the preferred attack target.

Currently, this security issue is addressed by providing limited access to a few privileged

administrative users and deploying security software. The following solution uses storage locking to

prevent changes to persistent memory. Comparisons are made of all persistent memory at system

runtime to evaluate whether modifications have occurred. This approach is different from other

solutions because it completely locks the memory.

Once the solution is deployed, periodically the memory binary is extracted from the device and

compared against the original master copy in the server, which was taken when first installed. If

there is any difference, it is considered a security breach and data is presumed compromised. The

device is then removed from the network.

Benefits

The storage locking feature helps users to:

• Lock or unlock the storage system so that any...

Processing...
Loading...