US 12,443,767 B2
Systems and methods for identifying peripheral devices and logging operations performed thereon
Naveen Gopalakrishna, Bangalore (IN); and Avesta Hojjati, Austin, TX (US)
Assigned to DigiCert, Inc., Lehi, UT (US)
Filed by DigiCert, Inc., Lehi, UT (US)
Filed on Nov. 28, 2023, as Appl. No. 18/520,691.
Claims priority of application No. 202341069977 (IN), filed on Oct. 16, 2023.
Prior Publication US 2025/0124177 A1, Apr. 17, 2025
Int. Cl. G06F 21/85 (2013.01); G06F 21/44 (2013.01); G06F 21/60 (2013.01)
CPC G06F 21/85 (2013.01) [G06F 21/44 (2013.01); G06F 21/604 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A method, implemented by a host machine, comprising steps of:
responsive to a peripheral device being coupled to the host machine and responsive to being granted access to data on the peripheral device, determining a presence of a change log on the peripheral device;
responsive to a lack of the presence of the change log on the peripheral device, preventing access to the peripheral device;
responsive to the presence of the change log on the peripheral device, allowing access to the peripheral device based on the change log; and
subsequent to the allowing access, writing updates to the change log based on one or more actions performed on the data on the peripheral device, wherein the updates are persisted to the change log stored on the peripheral device.