1653 patents
Page 17 of 83
Utility
Prioritizing highly performant storage systems for servicing a synchronously replicated dataset
27 Jun 23
Prioritizing highly performant storage systems for servicing a synchronously replicated dataset: detecting a communication fault between two or more storage systems that are synchronously replicating a dataset; identifying a preferred storage system for winning mediation, including determining that the preferred storage system winning mediation would result in better performance than other storage systems winning mediation; and requesting, by the preferred storage system, mediation from a mediation target.
Ronald Karr, John Colgrove, Ganesh Ramanarayanan, David Grunwald
Filed: 21 Jun 22
Utility
Load balancing reset packets
27 Jun 23
A method of resetting a stateful connection in a storage cluster with stateless load-balancing is provided.
Jayesh Patel, Prabhath Sajeepa, Daniel Talayco
Filed: 12 Nov 21
Utility
Mirroring data to survive storage device failures
30 May 23
Ensuring resiliency to storage device failures in a storage system, including: determining a number of storage device failures within a particular write group that are to be tolerated by the storage system; for a plurality of datasets stored within the storage system, writing each dataset to at least a predetermined number of storage devices within the particular write group, wherein the predetermined number of storage devices is greater than the number of storage device failures within the particular write group that are to be tolerated by the storage system; and responsive to recovering from a system interruption: determining a number of readable storage devices that contain a copy of the dataset; and if the number of readable storage devices that contain a copy of the dataset is not greater than the number of failures that are to be tolerated, writing the dataset to one or more additional storage devices.
Mark McAuliffe, Neil Vachharajani, Farhan Abrol
Filed: 28 Feb 22
Utility
Metadata management in a storage system
30 May 23
A system and method for efficiently maintaining metadata stored among a plurality of solid-state storage devices.
Marco Sanvido, Richard Hankins, Mark McAuliffe, Neil Vachharajani
Filed: 9 Feb 22
Utility
Parity in a vast storage system using alternate memory
30 May 23
A method begins by a processing module of a storage network analyzing storage network memory for a level of usability and based on the analyzing, selecting alternative memory available for receipt of encoded data slices stored in current memory, where a data object is segmented into a plurality of data segments and a data segment of the plurality of data segments is dispersed error encoded in accordance with dispersed error encoding parameters to produce a set of encoded data slices.
Gary W. Grube, Jason K. Resch, Timothy W. Markison, Ilya Volvovski, Manish Motwani
Filed: 24 Jun 21
Utility
Writing data using references to previously stored data
30 May 23
A system and method comprising: receiving a request to write data stored at a first range of a first volume to a second range of a second volume, where first metadata for the first range of the first volume is associated with a range of physical addresses where the data is stored in the storage system; and responsive to receiving the request: creating second metadata for the second range of the second volume, wherein the second metadata is associated with the range of physical addresses where the data is stored in the storage system; and associating the second volume with the second metadata.
Ethan Miller, Jianting Cao, John Colgrove, Christopher Golden, John Hayes, Cary Sandvig, Grigori Inozemtsev
Filed: 19 Aug 21
Utility
Method for Determining the Legal Basis for Transfer of a Data Object
25 May 23
A method for execution by one or more processing modules of one or more computing devices of a storage network, the method comprises receiving a data object for processing, determining whether the data object is to be transferred to one or more remote storage location, determining whether one or more legal restrictions are associated with the data object.
Russell P. Kennedy, Robert C. McCammon, Jason K. Resch, Thomas F. Shirley, JR.
Filed: 9 Jan 23
Utility
Utilizing Metadata To Represent Data
25 May 23
A system and method for efficiently storing data in a storage system.
MARCO SANVIDO, RICHARD HANKINS, JOHN HAYES, STEVE HODGSON, FENG WANG, SERGEY ZHURAVLEV, ANDREW KLEINERMAN
Filed: 23 Jan 23
Utility
File deletion in a distributed system
23 May 23
A method of distributed file deletion, performed by a storage system, is provided.
Ronald Karr, Robert Lee, Igor Ostrovsky
Filed: 30 Apr 20
Utility
Deallocation within a storage system
23 May 23
Failure information associated with a plurality of blocks of a solid-state storage device of a plurality of solid-state storage devices is received.
Damian Yurzola, Gordon James Coleman, Vidyabhushan Mohan, Melissa Kimble
Filed: 12 Nov 21
Utility
Compressibility metric-based detection of a ransomware threat to a storage system
23 May 23
An illustrative method includes a data protection system determining a first compressibility metric associated with write traffic processed by a storage system, the first compressibility metric indicating an amount of storage space saved if the write traffic is compressed; determining a second compressibility metric associated with read traffic processed by a storage system, the second compressibility metric indicating an amount of storage space saved if the read traffic is compressed; determining, based on a comparison of the first compressibility metric with the second compressibility metric, that the write traffic is less compressible than the read traffic; determining, based on the write traffic being less compressible than the read traffic, that the storage system is possibly being targeted by a security threat; and performing, based on the determining that the storage system is possibly being targeted by the security threat, a remedial action with respect to the storage system.
Andrew Miller, Ronald Karr, Andrew Kutner, Patrick D. Lee, David Huskisson, John Colgrove, Jean-Luc Degrenand
Filed: 20 Apr 22
Utility
Copy using metadata representation
23 May 23
A virtualized copy-by-reference includes: receiving, from a first computer system, a request for reference information for source data within a source volume; providing, to the first computer system, the reference information, wherein the reference information corresponds to a metadata representation of the source data; receiving, from a second computer system, a request to write the source data to a target volume, and wherein the request to write the source data indicates the reference information; and copying, using the reference information, the metadata representation of the source data to the target volume.
Roland Dreier, Rachel Shanava, Krishna Kant
Filed: 10 Sep 21
Utility
Retrieval of data objects with a common trait in a storage network
23 May 23
A method includes identifying an independent data object of a plurality of independent data objects for retrieval from dispersed storage network (DSN) memory.
Jason K. Resch, Greg Dhuse, Andrew Baptist
Filed: 28 Jul 21
Utility
Storage cluster memory characterization
23 May 23
In some embodiments, a method for die-level monitoring is provided.
John D. Davis, John Hayes, Hari Kannan, Nenad Miladinovic, Zhangxi Tan
Filed: 24 Nov 21
Utility
Snapshot delta metric based determination of a possible ransomware attack against data maintained by a storage system
23 May 23
An illustrative method includes a data protection system determining a delta metric between a first recovery dataset generated by a storage system at a first time and a second recovery dataset generated by the storage system at a second time subsequent to the first time and determining, based on the delta metric, whether data maintained by the storage system is possibly being targeted by a security threat.
Daniel Pendlebury, Ronald Karr
Filed: 8 Jun 21
Utility
Processing Access Anomalies in a Storage Network
18 May 23
A processing system operates by: storing a data segment as a set of encoded data slices, wherein the set of encoded data slices are dispersed storage error encoded and stored in at least one storage unit of a storage network; receiving, from a requestor, an access request associated with the data segment; detecting an access anomaly associated with the access request, the access anomaly having one of a plurality of anomaly types; denying the access request in response to detecting the access anomaly; generating, based on the one of the plurality of anomaly types, an anomaly detection indicator identifying the requestor; and sending the anomaly detection indicator to other devices of the storage network.
Jason K. Resch
Filed: 3 Jan 23
Utility
Pattern matching using hash tables in storage system
16 May 23
A system and method for managing tables in a storage system is described.
John Colgrove, Joseph S. Hasbani, John Hayes, Ethan Miller, Cary Sandvig
Filed: 22 Apr 22
Utility
Extensible attack monitoring by a storage system
16 May 23
An illustrative method includes a storage system receiving attribute data representative of one or more attributes of a known attack against data maintained by a target system other than the storage system, updating an extensible attack monitoring process executed by the storage system with the attribute data, and monitoring, using the extensible attack monitoring process updated with the attribute data, storage operation requests of the storage system for one or more attributes that match the one or more attributes of the known attack.
Ronald Karr
Filed: 30 Sep 20
Utility
Failure abatement approach for a failed storage unit
16 May 23
A method for execution by a vault management device of a storage network includes determining a failure impact level to vaults of the storage network based on a failed storage unit within the vaults, where the vaults include a first vault that is associated with a first set of storage units and a first decode threshold number, and a second vault that is associated with a second set of storage units and a second decode threshold number, and where the failure impact level is based on the number of non-failed storage units within each of the vaults.
Asimuddin Kazi, Jason K. Resch
Filed: 14 Jul 21
Utility
Generating estimated efficiency models for selecting a processing unit in a storage network
16 May 23
A method for execution by a computing device of a storage network begins or continues by generating a plurality of estimated efficiency models associated with a plurality of processing units of the storage network, where an estimated efficiency model of the plurality of estimated efficiency models includes estimated efficiency probabilities, and where the estimated efficiency probabilities correspond to data access request types for a processing unit of the plurality of processing units.
Ravi V. Khadiwala, Jason K. Resch
Filed: 31 Mar 22