1653 patents
Page 56 of 83
Utility
Using flash storage devices with different sized erase blocks
27 Jul 21
A method of using flash storage devices with different sized erase blocks is provided.
Eric D. Seppanen, Andrew R. Bernat, Timothy W. Brennan, Mark L. McAuliffe, Neil Buda Vachharajani
Filed: 2 Dec 19
Utility
Forwarding data amongst cooperative computing devices of a massive data ingestion system
20 Jul 21
A method begins with a first group of computing devices of a plurality of computing devices of a storage network receiving data objects having a first data type identifier of a plurality of data type identifiers, where the plurality of data type identifiers correspond to a plurality of data types associated with the data objects.
S. Christopher Gladwin, Greg R. Dhuse, Timothy W. Markison, Wesley B. Leggette, Jason K. Resch, Gary W. Grube
Filed: 28 Apr 20
Utility
Communication in a distributed architecture
20 Jul 21
A method for authorizing I/O (input/output) commands in a storage cluster is provided.
Robert Lee, John Hayes
Filed: 29 Mar 19
Utility
Storage management in a cloud data store
20 Jul 21
Storage management within a cloud-based data store, including: receiving one or more data objects for storage; selecting, based at least upon a storage policy and upon one or more characteristics of storage data, one or more storage classes from among a plurality of storage classes of one or more data storage services; and storing the one or more data objects to the selected one or more storage classes of the one or more data storage services.
Dirk Meister, Subramaniam Periyagaram, Reese Robertson, Prudhvi Lokireddy
Filed: 2 Jul 19
Utility
Storing a credential in a storage network
20 Jul 21
A method for execution by a computing device of a storage network begins by obtaining a credential to be added to a local authentication list, where the credential authenticates, during a first time period, at least one of an access request and a requesting device, and where the local authentication list is stored in temporary memory of the computing device and is stored as a plurality of sets of encoded authentication slices in a set of storage units.
Wesley B. Leggette, Bart R. Cilfone
Filed: 2 Mar 20
Utility
Proactively rebuilding data in a storage cluster
20 Jul 21
A method for proactively rebuilding user data in a plurality of storage nodes of a storage cluster in a single chassis is provided.
John Hayes, John Colgrove, Robert Lee, Joshua Robinson, Rusty Sears
Filed: 4 Jun 14
Utility
Data resiliency with heterogeneous storage
20 Jul 21
A method of operating a storage system is provided.
Ying Gao, Faissal Sleiman, Matthew D. Fleming
Filed: 11 Oct 18
Utility
Method and System for Accessing a File
15 Jul 21
A method for accessing a file in a storage system is provided.
John Hayes, Robert Lee, Igor Ostrovsky, Peter Vajgel
Filed: 26 Mar 21
Utility
Proactive Data Rebuild Based On Queue Feedback
15 Jul 21
A storage cluster is provided.
John D. Davis, John Hayes, Hari Kannan, Nenad Miladinovic, Zhangxi Tan
Filed: 26 Mar 21
Utility
Optimized Migration of Data Between File Systems of a Storage Array
15 Jul 21
A request is received from an initiator application to migrate data from a plurality of blocks of a storage area network (SAN) volume resident on a storage array to a network attached storage (NAS) volume resident on the storage array.
Ethan Miller, Lydia Do, John Colgrove
Filed: 31 Mar 21
Utility
Adjustable Error Correction Based on Memory Health in a Storage Unit
15 Jul 21
A method for adjustable error correction in a storage cluster is provided.
John D. Davis, John Hayes, Zhangxi Tan, Hari Kannan, Nenad Miladinovic
Filed: 26 Mar 21
Utility
Mitigation of Malicious Operations with Respect to Storage Structures
15 Jul 21
An exemplary method includes a monitoring system detecting that a storage system receives a request to perform an operation that affects a capacity of a storage structure within the storage system, identifying an attribute of at least one of the request and the storage system, determining, based on the attribute, that the request is indicative of a malicious action, and performing, in response to the determining that the request is indicative of the malicious action, a remedial action with respect to the requested operation.
David A. Grunwald, Matthew Paul Fay, Ronald Karr, David Huskisson, Andrew Kutner
Filed: 11 Dec 19
Utility
Extensible Attack Monitoring by a Storage System
15 Jul 21
An illustrative method includes a storage system receiving attribute data representative of one or more attributes of a known attack against data maintained by a target system other than the storage system, updating an extensible attack monitoring process executed by the storage system with the attribute data, and monitoring, using the extensible attack monitoring process updated with the attribute data, storage operation requests of the storage system for one or more attributes that match the one or more attributes of the known attack.
Ronald Karr
Filed: 30 Sep 20
Utility
Multi-Layer Security Threat Detection for a Storage System
15 Jul 21
An illustrative method includes a data protection system performing, for a storage system, a first security threat detection process, determining, based on the performing of the first security threat detection process, that the storage system is possibly being targeted by a security threat, and performing a second security threat detection process, the second security threat detection process providing higher confidence threat detection than the first security threat detection process.
Patrick D. Lee, Ronald Karr, Andrew Kutner, Andrew Miller, David Huskisson
Filed: 30 Jun 20
Utility
Inter-I/O Relationship Based Detection of a Security Threat to a Storage System
15 Jul 21
An illustrative method includes a data protection system identifying one or more input operations and one or more output operations performed between a source and a storage system, identifying an anomaly in a relationship between the one or more input operations and the one or more output operations, and determining, based on the identifying of the anomaly, that the storage system is possibly being targeted by a security threat.
Ethan L. Miller, Ronald Karr, Alexandre Xavier Duchâteau, Constantine P Sapuntzakis
Filed: 30 Sep 20
Utility
Recovery Point Determination for Data Restoration in a Storage System
15 Jul 21
An illustrative method includes a data protection system detecting, for a storage system, a potential data corruption in the storage system, analyzing, in response to the detecting of the potential data corruption, one or more metrics of the storage system, and determining, based on the analyzing of the one or more metrics of the storage system, a corruption-free recovery point for potential use to recover from the potential data corruption.
David Huskisson, Ronald Karr, Andrew Kutner, Andrew Miller, Patrick D. Lee, Cynthia Dote
Filed: 30 Jun 20
Utility
Logical Address Based Authorization of Operations with Respect to a Storage System
15 Jul 21
An illustrative method includes a data protection system detecting a request provided by a source to perform an operation with respect to a storage system, the request including a logical address that comprises a logical element representative of a storage location within the storage system, determining whether the logical address further comprises an authorization element indicating that the source is authorized to initiate operations with respect to the storage system, and performing, based on the determining whether the logical address includes the authorization element, an action with respect to the operation.
Ethan L. Miller, Ronald Karr
Filed: 30 Sep 20
Utility
Recovery Dataset Management For Security Threat Monitoring
15 Jul 21
An illustrative method includes a data protection system directing a storage system to generate recovery datasets over time in accordance with a data protection parameter set, the recovery datasets usable to restore data maintained by the storage system to a state corresponding to a selectable point in time, determining that the storage system is possibly being targeted by a security threat, and modifying, in response to the determining that the storage system is possibly being targeted by the security threat, the data protection parameter set for one or more of the recovery datasets.
Andrew Kutner, Ronald Karr, Andrew Miller, Patrick D. Lee, David Huskisson, Brian Carpenter
Filed: 30 Jun 20
Utility
Selective Throttling of Operations Potentially Related to a Security Threat to a Storage System
15 Jul 21
An illustrative method includes a data protection system detecting a request to perform an operation with respect to a storage system, identifying one or more attributes of the request, determining, based on the one or more attributes, that the request is possibly related to a security threat against the storage system, and throttling, based on the determining that the request is possibly related to the security threat against the storage system, a performance of the operation.
Ethan L. Miller, Ronald Karr
Filed: 30 Sep 20
Utility
Hardware Token Based Management of Recovery Datasets for a Storage System
15 Jul 21
An illustrative method includes a data protection system detecting a request to perform a restricted operation with respect to a recovery dataset configured to be used by a storage system to recover from a data corruption event within the storage system, monitoring, in response to the request, for an occurrence of a predetermined set of one or more authorization events performed with one or more hardware tokens, and preventing the restricted operation from being executed until the each of the one or more authorization events included in the predetermined set occurs.
Ethan L. Miller, Ronald Karr
Filed: 30 Sep 20