The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 25, 2025

Filed:

Aug. 05, 2024
Applicant:

Dell Products, L.p., Hopkinton, MA (US);

Inventors:

Peter Callewaert, Eernegem, BE;

Dennis J. Trulli, Jr., Hudson, MA (US);

Paul Linstead, Shrewsbury, MA (US);

David Goncalves, Acushnet, MA (US);

Melissa Flynn, North Attleboro, MA (US);

Brett Quinn, Cotuit, MA (US);

Kevin Heasley, Dewey, AZ (US);

Assignee:

Dell Products, L.P., Hopkinton, MA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/54 (2013.01); G06F 21/00 (2013.01); G06F 21/44 (2013.01); G06F 21/78 (2013.01);
U.S. Cl.
CPC ...
G06F 21/54 (2013.01); G06F 21/78 (2013.01); G06F 21/00 (2013.01); G06F 21/44 (2013.01);
Abstract

A secure physical vault is used in connection with cyber protection automation to ensure that initial configuration and all configuration changes to the cyber protection environment are only implemented by a host that is locally physically connected to the cyber vault. By requiring the host to be locally physically connected to the cyber vault, it is possible to prevent remote modifications to the cyber protection environment configuration, thus preventing a remote attack on the cyber protection afforded by the cyber protection environment. The Operating System of a storage system implementing the cyber vault may be flagged to prevent any syscall from being processed that is not received from a host that is locally physically connected to the cyber vault. Host controller software can also be used to ensure that the initial configuration and all configuration changes to the cyber protection environment configuration are only processed if locally received.


Find Patent Forward Citations

Loading…