US 12,204,767 B2
System and method for managing data storage to identify undesired data modification
Ching-Yun Chao, Austin, TX (US); Efi Levi, Be'er Sheva (IL); Lior Benisty, Be'er Sheva (IL); and Arieh Don, Newton, MA (US)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Apr. 13, 2023, as Appl. No. 18/299,919.
Prior Publication US 2024/0345741 A1, Oct. 17, 2024
Int. Cl. G06F 3/06 (2006.01)
CPC G06F 3/0619 (2013.01) [G06F 3/0659 (2013.01); G06F 3/067 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for managing storage of data, the method comprising:
obtaining the data for storage, the data being associated with a first entity and generated by an application hosted by a computing device associated and transmitted by the computing device to a storage for storage;
identifying a first portion of the data corresponding to integrity verification data;
performing a verification operation using the first portion of the data corresponding to the integrity verification data to identify an integrity state of a second portion of the data corresponding to a payload;
in a first instance of the verification operation where the integrity state indicates that the second portion of the data has not been modified by the computing device without knowledge of the first entity after being generated by the application and before being transmitted to the storage:
storing the data in storage to service a request to store the data; and
in a second instance of the verification operation where the integrity state indicates that the second portion of the data has been modified after generation by the application:
rejecting a request to store the data.