3707 patents
Page 19 of 186
Utility
Access Control Using User Behavior Profile and Storage System-Based Multi-Factor Authentication
1 Dec 22
Techniques are provided for access control using user behavior profiles and storage system-based multi-factor authentication.
Tomer Shachar, Yevgeni Gehtman, Maxim Balin
Filed: 27 May 21
Utility
System for Query-based Interactive Risk Model Analysis for Secure Software Development
1 Dec 22
One example method includes receiving a user query that relates to a potential vulnerability of a product, and the product includes hardware and/or software, based on information in the user query, ingesting multiple different datasets from different respective data sources, using data in the datasets to generate a respective graph model corresponding to each dataset, identifying relationships among the datasets, and building, and presenting to a user, a visualization that graphically displays each graph model, and indicates relationships between the datasets, and relationships between the data sources.
Soumya Maity, Lokesh Balu Sudakar
Filed: 20 Jul 21
Utility
Method to Intelligently Manage the End to End Container Compliance In Cloud Environments
1 Dec 22
One example method includes collecting container information concerning a container, analyzing the container information to identify a security tool needed to perform a vulnerability scan of the container, accessing the security tool from a knowledge lake, running the security tool on the container information to identify a security vulnerability of the container, based on the running of the security tool, generating an alert indicating that the container has the security vulnerability, capturing the security vulnerability and, based on the captured security vulnerability, updating a container image that was used to spawn the container.
Suren Kumar, Vinod Durairaj
Filed: 22 Jul 21
Utility
Logical Storage Device Access Using Device-specific Keys In an Encrypted Storage Environment
1 Dec 22
An apparatus in one embodiment comprises at least one processing device comprising a processor coupled to a memory.
Amit Pundalik Anchi, Sanjib Mallick
Filed: 26 May 21
Utility
Edge Data Distribution Cliques
1 Dec 22
Techniques described herein relate to a method for model updating based on maximal cliques.
Paulo Abelha Ferreira, Pablo Nascimento da Silva, Vinicius Michel Gottin
Filed: 28 May 21
Utility
System and Method for Identifying and Remediating Unanswered Queries In Application Resolution Reports
1 Dec 22
A method for managing applications includes obtaining an application resolution report from an administrative system, wherein the application resolution report comprises a customer query and a response, applying a neural network algorithm on a set of tokens associated with the application resolution report to obtain a vector representation of the application resolution report, performing a probability analysis on each vector in the vector representation, based on the probability analysis, identifying an unanswered portion of the application resolution report, and in response to the unanswered portion of the application resolution report, performing a query resolution.
Shelesh Chopra, Vasanth D. Sathyanaraya, Parminder Singh Sethi, Akanksha Goel
Filed: 23 Jun 21
Utility
Write Pressure Throttling Based on Service Level Objectives
24 Nov 22
An apparatus comprises at least one processing device.
Sanjib Mallick, Vinay G. Rao, Arieh Don
Filed: 21 May 21
Utility
Log Data Management In a Streaming Data Storage System
24 Nov 22
The described technology is generally directed towards fine-grained data expiration to reduce storage capacity used in a streaming data storage system.
Mikhail Danilov, Andrei Paduroiu
Filed: 18 May 21
Utility
Data-driven Index for Identification and Ranking of Companies for a Selected Technology
24 Nov 22
One example method includes identifying companies involved in development and/or use of a technology, and identifying the companies includes identifying datasets from which features are to be extracted, wherein each feature comprises an aspect of one of the companies that relates to the technology, and extracting the features from the datasets.
Yaseen Tamer Refaie Moussa, Mohamed Ahmed Amr Abouzeid, Abdulrahman Mohamed Diaa Eldin, Osama Taha Mohamed Abdelbaky
Filed: 7 May 21
Utility
Techniques for Storage Management
17 Nov 22
Techniques for managing storage may comprise: receiving a request for a first amount of free capacity, wherein the request includes a first priority denoting a purpose for which the first amount of free capacity is requested; determining whether a current utilization of storage exceeds a first threshold associated with the first priority; responsive to determining the current utilization of storage is less than the first threshold associated with the first priority, performing first processing including: determining whether there is a sufficient amount of existing free capacity to grant the first amount; and responsive to determining there is a sufficient amount of existing free capacity to grant the first amount, granting the first amount of free capacity; and responsive to determining the current utilization of storage is not less than the first threshold associated with the first priority, rejecting the request and not granting the first amount of free capacity.
Vamsi K. Vankamamidi, Philippe Armangau, Shuyu Lee
Filed: 26 Jul 22
Utility
Accessing Data Using UUIDs with a RAID System
17 Nov 22
A first node of a plurality of nodes is determined based on a node UID that is included in a physical extent (PE) universally unique identifier (UUID).
Paul NEHSE, Michael THIELS, Devendra KULKARNI
Filed: 14 May 21
Utility
Method and System for Maximizing Performance of a Storage System
17 Nov 22
In a method used for maximizing performance of a storage system, saturation points of the storage system for I/O requests of different types and sizes are identified.
Shuyu Lee, Vamsi K. Vankamamidi, Jeffrey L. Grummon
Filed: 29 Jul 22
Utility
Cross-stream Transactions In a Streaming Data Storage System
17 Nov 22
The described technology is generally directed towards cross-stream transactions in a streaming data storage system, which allows a writer application to commit multiple events to distinct data streams in a single transaction.
Mikhail Danilov, Yohannes Altaye
Filed: 11 May 21
Utility
Techniques for Efficient Data Deduplication
10 Nov 22
Data deduplication techniques may use a fingerprint hash table and a backend location hash table in connection with performing operations including fingerprint insertion, fingerprint deletion and fingerprint lookup.
Peng Wu, Bin Dai, Rong Yu
Filed: 14 Jul 22
Utility
Detection of Anomalous Backup Files Using Known Anomalous File Fingerprints
10 Nov 22
Techniques are provided for detection of anomalous backup files using known anomalous file fingerprints (or other file-dependent values such as hash values, signatures and/or digest values).
Tomer Shachar, Maxim Balin, Yevgeni Gehtman
Filed: 5 May 21
Utility
Access Control of Protected Data Using Storage System-Based Multi-Factor Authentication
10 Nov 22
Techniques are provided for access control of protected data using storage system-based multi-factor authentication.
Yevgeni Gehtman, Maxim Balin, Tomer Shachar
Filed: 5 May 21
Utility
Detection of Anomalous Quantities in Data Records Using Predicted Quantities of Similar Entities
10 Nov 22
Techniques are provided for detecting anomalous quantities in data records using predicted quantities of similar entities.
Noga Gershon, Amihai Savir, Dhev Kollannur, Ivan Mlynek
Filed: 5 May 21
Utility
Tracking Data Mirror Differences
10 Nov 22
Methods, apparatus, and processor-readable storage media for tracking data mirror differences are provided herein.
Brian Lake, Victor Salamon
Filed: 4 May 21
Utility
Maintaining Replication Consistency During Distribution Instance Changes
10 Nov 22
An apparatus comprises a source system comprising a distribution layer, a management component and a plurality of replication components.
Adi Bar Shalom, Zeev Shusterman, Lior Zilpa, German Goft, Oren Ashkenazi
Filed: 5 May 21
Utility
Storage Layout of Protection Pool of a RAID Storage System
10 Nov 22
A redundant array of independent disks (raid) array can include one or more virtual disks representing a raid configuration of the raid array.
PAUL NEHSE, MICHAEL THIELS, DEVENDRA KULKARNI
Filed: 7 May 21