Mark S. Day - Saratoga CA, US Dominic B. Giampaolo - Mountain View CA, US Puja D. Gupta - Sunnyvale CA, US
International Classification:
G06F 11/07
US Classification:
714 54, 714E11021
Abstract:
Methods, systems and machine readable media for file system error detection and protection are described. In one aspect, an embodiment of a method includes collecting first data identifying at least one error in performing at least one of reading or writing data to a storage device and determining, through an association between the first data and file identifiers, a set of files which are effected by the at least one error. The collecting may be performed automatically as a background process. In another aspect, an embodiment of a method includes detecting at least one error in file system metadata for a storage device, the detecting being performed automatically as a background process, and storing state information automatically in response to the detecting; the state information indicates that upon next mounting of the storage device, the data processing system will automatically cause the running of a file system check of the file system metadata.
File System Error Detection And Recovery Framework
Mark S. Day - Saratoga CA, US Dominic B. Giampaolo - Mountain View CA, US Puja D. Gupta - Sunnyvale CA, US
International Classification:
G06F 11/07
US Classification:
714 45, 714E11025
Abstract:
In one aspect, an embodiment of file system error detection and protection includes collecting first data identifying at least one error in performing at least one of reading or writing data to a storage device and determining, through an association between the first data and file identifiers, a set of files which are effected by the at least one error. The collecting may be performed automatically as a background process. In another aspect, an embodiment includes detecting at least one error in file system metadata for a storage device, the detecting being performed automatically as a background process, and storing state information automatically in response to the detecting; the state information indicates that upon next mounting of the storage device, the data processing system will automatically cause the running of a file system check of the file system metadata.
Conrad Sauerwald - Mountain View CA, US Daniel J. Post - Campbell CA, US Eric Brandon Tamura - Mountain View CA, US Matthew J. Byom - San Jose CA, US Puja Dilip Gupta - Sunnyvale CA, US
Assignee:
Apple Inc. - Cupertino CA
International Classification:
G06F 12/14
US Classification:
713193, 713189
Abstract:
Systems and methods are disclosed for secure relocation of encrypted files for a system having non-volatile memory (“NVM”). A system can include an encryption module that is configured to use a temporary encryption seed (e.g., a randomly generated key and a corresponding initialization vector) to decrypt and encrypt data files in an NVM. These data files may have originally been encrypted with different encryption seeds. Using such an approach, data files can be securely relocated even if the system does not have access to the original encryption seeds. In addition, the temporary encryption seed allows the system to bypass a default key scheme.
Verifying Integrity Of File System Data Structures
Mark Steven Day - Saratoga CA, US Wenguang Wang - Cupertino CA, US Puja Dilip Gupta - Sunnyvale CA, US Christopher Yoshito Emura - Santa Clara CA, US
Assignee:
Apple Inc. - Cupertino CA
International Classification:
G06F 7/00 G06F 17/00
US Classification:
707690
Abstract:
Systems, methods, computer program products, and means are provided for verifying the integrity of data structures. A system includes a first data structure, a second data structure, and a fingerprint block. The first data structure has a first set of unique identifiers. The second data structure has a second set of unique identifiers. The fingerprint block verifies correspondence between the first and second data structures by performing a mathematical function on the first and second sets of unique identifiers to produce a result indicative of correspondence.
- Cupertino CA, US Joseph R. Auricchio - San Francisco CA, US Puja D. Gupta - Sunnyvale CA, US Ananthakrishna Ramesh - Cupertino CA, US Timothy P. Hannon - Mountain View CA, US
Systems and methods are disclosed for implementing an educational mode on a portable computing device, such as a tablet computer, that is a single-user system, used serially by multiple users. Each user can have a separate user storage that may be encrypted. The computing device boots as a system user to a login screen. A first student user enters user credentials into the login screen. The computing device can reboot the user-space processes, while leaving the kernel running, rebooting the computing device as the first student user. When the first student user logs out, data to be synchronized to, e.g., the cloud, can be synchronized for the first student user while a second student user is logged into the device.