US 11,736,517 B2
Data storage device with security module
Michael H. Miller, Eden Prairie, MN (US)
Assigned to SEAGATE TECHNOLOGY LLC, Fremont, CA (US)
Filed by Seagate Technology LLC, Cupertino, CA (US)
Filed on Feb. 10, 2020, as Appl. No. 16/786,368.
Prior Publication US 2021/0250374 A1, Aug. 12, 2021
Int. Cl. H04L 9/32 (2006.01); G06F 9/00 (2006.01); H04L 9/40 (2022.01); G06F 21/78 (2013.01); H04L 9/08 (2006.01); H04L 67/1097 (2022.01)
CPC H04L 63/1466 (2013.01) [G06F 21/78 (2013.01); H04L 9/0869 (2013.01); H04L 63/1416 (2013.01); H04L 63/1433 (2013.01); H04L 67/1097 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
connecting an attack module to distributed data storage system, the distributed data storage system comprising at least one host connected to a first data storage device and a second data storage device via a network controller;
identifying a susceptibility to a future third-party attack in the distributed data storage system with the attack module;
identifying, with the attack module, a time range for the susceptibility to the future third-party attack;
generating an attack counter strategy with the attack module in response to the identified susceptibility, the attack counter strategy comprising at least one proactive action directed at preventing a future third-party attack during the identified susceptibility time range; and
executing the at least one proactive action of the attack counter strategy prior to a third-party attack and during the identified susceptibility time range.