Technology Assets
Primos Storage Technology has technologies in a number of areas. The first line of technologies are associated with issued US Patents.
OEM Ready Products & Product Concepts
Secure Redundancy Library
A portable yet high performance C library of routines for generating redundant representations, recovering original plaintext, widening/altering the representation, etc. Also has optional SIMD support on some CPUs. Provides a full function, object-oriented API.
This library is suitable for use in storage environments (for example RAID-like arrays, redundant backup tapes, etc.) and telecommunicaitons environments (for example forward error correction, splitting data over multiple paths, etc.).
Secure Laptop File system
A file system which stores a fraction of each bit remotely via the internet but keeps the majority of information on the local hard disk. The result is almost local hard disk speed with the advantages of remote location. Without access to the remote data, none of the secure information can be recovered. Remote access can be denied by policy on the remote server. Here are several scenarios which this technology addresses:
- A laptop is stolen in the field -- by storing 7/8ths of the data locally, none of the laptop's data can be recovered. Optionally, 9/8ths of the data can be stored remotely which would enable remote recovery of the lost data.
- The government wants to image a laptop's sensitive files in an airport -- copying the hard disk will not give access to any of the data. Furthermore, by policy, remote logins can be banned during flight hours so even if a gun is placed at the head of the user and the proper password is entered, no access to data occurs. (In fact, the data could, by policy be deleted on the backing server.)
This technology is in beta form, running on Linux and FreeBSD with a prototype under Windows. It is based upon fully issued patents.
Internationally Distributed Data Haven
A fraction of each bit can be stored in a different jurisdiction making it more difficult for prying eyes to access archival data. In some jurisdictions, the presence of less than 50% of a bit legally means the bit doesn't exist in that jurisdiction which may mean that the data can legally be made to disappear. However, by the redundancy, one can have much higher reliability for data.
For example, a law firm can choose to keep its confidential records in an internationally distributed data haven made up of 12 locations, any 8 of which are sufficient to recover the data. The odds of more than 4 remote storage facilities being offline at any point in time are negligible. However, the NSA will have to break into facilities in 8 different jurisdictions before any data is accessible. This will require cooperation of 8 of the 12 jurisdictions.
Issued US Patents
Entropy/Redundancy/Security Management through Coding
This technology family is based upon the use of finite fields and Galois manipulations to create and control redundant representations. On one hand, the technology is a powerful “secret sharing” system while on the other hand providing the basis for advanced recovery for data loss in storage and communications applications.
-
Redundant Disk Storage: Use of the basic technology to produce one or more redundant disk volumes such that the loss of one or several disks will not result in the loss of data
-
Redundant Secret Sharing Storage: Use of the secret sharing along with redundant storage allows the individual contents of storage devices to be useless without the required minimum devices, at which time all data is available.
Redundant (and potentially Secret Sharing) Backup/Archival storage: Application of the technology to backup media or equivalent for higher security of recovery and higher security against data theft.
-
Networked Transfers as a form of Forward Error Correction
-
(Internationally) Distributed Data Havens: Use of the secret sharing to store a portion of the information in different locations or havens. These havens could potentially be in multiple jurisdictions for greater physical and legal security.
Patents
12,032,835
Transaction-based storage system and method that uses variable sized objects to store data
11,901,917
11,630,589
Transaction-based storage system and method that uses variable sized objects to store data
11,265,024
11,048,415
Transaction-based storage system and method that uses variable sized objects to store data
10,599,344
Transaction-based storage system and method that uses variable sized objects to store data
10,439,654
Transaction-based storage system and method that uses variable sized objects to store data
9,965,204
Transaction-based storage system and method that uses variable sized objects to store data
9,680,508
9,483,197
Transaction-based storage system and method that uses variable sized objects to store data
9,164,855
Transaction-based storage system and method that uses variable sized objects to store data
9,128,877
8,677,065
Transaction-based storage system and method that uses variable sized objects to store data
8,566,680
Systems, methods and computer program products including features for coding and/or recovering data
8,312,356
Systems, methods and computer program products including features for coding and/or recovering data
8,078,944
Systems, methods and computer program products including features for coding and/or recovering data
Transaction Logging Object Storage
This family of patents describes techniques for extendable efficient high volume transaction logging streaming data storage systems. It also describes emulating various forms of data abstractions such as RAID or Virtual Disk space.
11,048,415
Transaction-based storage system and method that uses variable sized objects to store data
10,599,344
Transaction-based storage system and method that uses variable sized objects to store data
10,439,654
9,965,204
Transaction-based storage system and method that uses variable sized objects to store data
9,483,197
Transaction-based storage system and method that uses variable sized objects to store data
9,164,855
Transaction-based storage system and method that uses variable sized objects to store data
8,677,065
Transaction-based storage system and method that uses variable sized objects to store data
8,677,065
Transaction-based storage system and method that uses variable sized objects to store data
7,937,528
Transaction-based storage system and method that uses variable sized objects to store data
7,600,075
Transaction-based storage system and method that uses variable sized objects to store data
7,386,663
Transaction-based storage system and method that uses variable sized objects to store data
Storage Device Optimizations
This patent describes techniques for optimizing rotating disk storage performance and density by separating data and metadata and organizing data stripes for optimal access.
6,671,772
Hierarchical file system structure for enhancing disk transfer efficiency