3707 patents
Page 21 of 186
Utility
Methods and Systems for Securing Data In a Distributed Storage System
3 Nov 22
A method for securing data, the method including obtaining, from a metadata node and by file system (FS) client executing on a client application node, a data layout and an encryption key, encrypting, by the client application node, the data stored on the client application node using the encryption key to obtain encrypted data, generating, by a memory hypervisor module executing on the client application node, at least one input/output (I/O) request, wherein the at least one I/O request specifies a location in a storage pool, wherein the location is determined using the data layout, and issuing, by the memory hypervisor module, the at least one I/O request to the storage pool, wherein processing the at least one I/O request results in at least a portion of the encrypted data being stored at the location.
Jean-Pierre Bono, Marc A. De Souter
Filed: 29 Apr 21
Utility
Methods and Systems for Methods and Systems for In-line Deduplication In a Distributed Storage System
3 Nov 22
A method for deduplicating data comprising: obtaining, from a metadata node and by file system client executing on a client application node, a data layout; generating, by the client application node, a fingerprint for the data stored on the client application node; generating, by a memory hypervisor module executing on the client application node, at least one input/output (I/O) request specifying a location in a storage pool, wherein the location is determined using the data layout; issuing, by the memory hypervisor module, the at least one I/O request to the storage pool, wherein processing the at least one I/O request results in at least a portion of the data being stored at the location; and after issuing the at least one I/O request to the storage pool, transmitting the fingerprint to the metadata node, wherein the metadata node attempts to deduplicate the data using the fingerprint.
Jean-Pierre Bono, Marc A. De Souter
Filed: 29 Apr 21
Utility
0vs3zh0fx57hjij sm86gzu40va9pkdyx0lh1x
3 Nov 22
A method for storing data, comprising receiving, by an offload component in a client application node, a first request from a client translation and bridging container, wherein the client translation and bridging container translates a second request originating from an application executing in an application container on the client application node to the first request, wherein the second request is specified using object semantics and the first request is specified using file semantics, wherein the first request is associated with data, and wherein the offload component is located in a hardware layer of the client application node; and processing, by the offload component, the first request by a file system (FS) client and a memory hypervisor module executing in a modified client FS container on the offload component, wherein processing the first request results in at least a portion of the data in a location in a storage pool.
Jean-Pierre Bono, Marc A. De Souter, Sitaram D. Pawar
Filed: 29 Apr 21
Utility
rsn4ih6s14 fp0vkp287
3 Nov 22
A model of an algorithm to be tested is created based on the steps that the algorithm uses to implement a particular function.
Jeffrey Wilson, Mordechai Grutman
Filed: 1 May 21
Utility
n03bnts5869lu9dp1c6ei9v 6q40k9hprqew24g6z3wxkdfh874c3kgr
3 Nov 22
An apparatus comprises a processing device configured to provide, to a given multi-path input-output driver of a given host device, obfuscated software code of at least a given portion of a given piece of software.
Surendra Singh Chauhan, Udit Tyagi
Filed: 3 May 21
Utility
hu8y6lfj0v0f5z7 xd3o7z
3 Nov 22
Techniques are provided for managing replication journals in a distributed replication system.
Rivka Matosevich, Roman Spiegelman, German Goft, Lior Zilpa
Filed: 3 May 21
Utility
izqpzzfsg47uad2zjmjzbx2zvumeuapa3q
3 Nov 22
A method for storing data, the method comprising receiving, by an offload component in a client application node, a request originating from an application executing in an application container on the client application node, wherein the request is associated with data and wherein the offload component is located in a hardware layer of the client application node, and processing, by the offload component, the request by a file system (FS) client and a memory hypervisor module executing in a modified client FS container on the offload component, wherein processing the request results in at least a portion of the data in a location in a storage pool.
Jean-Pierre Bono, JoonJack Yap, Adrian Michaud, Marc A. De Souter
Filed: 29 Apr 21
Utility
j24ywj13q6gfxhv1umrxgvhsff9l8w08gyk ygt0bpnep
27 Oct 22
Processing I/O operations may include: receiving, at a data storage system, an I/O operation from a host, wherein the I/O operation is directed to a logical address and includes an I/O tag used in connection with performing data reduction processing for first data stored at the logical address; and performing processing to back up a data set including the first data stored at the logical address.
Georges Brun-Cottan, Jehuda Shemer, Arieh Don
Filed: 21 Apr 21
Utility
9amn37qrjk7bjheydzqlzqt4c x8cr
27 Oct 22
Data migration from a legacy data storage system into an ordered event stream (OES) data storage system is disclosed.
Mikhail Danilov, Andrei Paduroiu, Maksim Vazhenin
Filed: 22 Apr 21
Utility
6rk57th2kxc89r34ykzi5s4ksvt gb6hrfb6m
27 Oct 22
A storage array updates snapshots of each of a plurality of storage objects of a storage group associated with a production volume on which an application image is logically stored and sends corresponding diff's to remote backup storage.
Yasemin Ugur-Ozekinci, Georges Brun-Cottan, Ken Owens
Filed: 21 Apr 21
Utility
a4b1g9t98mc30x cl5nuayd81jm37gmxtdf
27 Oct 22
Techniques for RAID reconstruction involve: determining, from a task list, multiple stripes in a RAID that are involved in a to-be-processed task within a current task window, the task list including an external I/O request task and an internal reconstruction I/O request task, and each stripe including data on a first number of data disks and data on a second number of parity disks; reading data from the multiple stripes into a read buffer; and if data of the first number of data disks in a stripe among the multiple stripes has already been read into the read buffer, performing the internal reconstruction I/O request task on the stripe.
Qian Wu, Bo Hu, Jing Ye
Filed: 17 Nov 21
Utility
910n7hsbxi l8rdgxz75jj585s1dhxvhmwcvd0zfp
27 Oct 22
A method for use in a first storage array, comprising: detecting whether a second storage array has designated the first storage array as a locally-preferred storage array, the detecting being performed when a first link between the second storage array and a witness node is down; setting a value of a first configuration setting to indicate that the first storage array is designated as a system-preferred storage array, the value of the first configuration setting being stored in a memory of the first storage array, the value of the first configuration setting being set only when the second storage array has designated the first storage array as a locally-preferred storage array; detecting, by the first storage array; and when the second link is down, assuming one of an active role or a passive role based, at least in part, on the value of the first configuration setting.
Sally Golan, Liran Loya, Yuval Harduf
Filed: 23 Apr 21
Utility
b6ydjr7pvwb3 bwm74sclxquavz11z75a98
27 Oct 22
Techniques described herein relate to a method for generating backups of assets.
Manish Sharma, Aaditya Rakesh Bansal, Shelesh Chopra, Sunil Yadav
Filed: 23 Apr 21
Utility
hzfclq0zcei8bvti0pecre3ixgu6noa1o1ha 8a2mwkb8lu
27 Oct 22
Snapshots from a first LSU (R1) on a first storage system (A1) may be replicated to a second replica LSU (R2) on a second storage system (A2), for example, concurrently to remotely replicating (e.g., synchronously) write operations for R1 to R2.
Bhaskar Bora, Deepak Vokaliga, Mark J. Halstead, Jeffrey Wilson, William R. Stronge, Ian Adams
Filed: 22 Apr 21
Utility
4y3iplla9y3bx0jw4m12d4yn83ioqof51smk0wyd23r
27 Oct 22
A method for providing data protection services to service devices that provide computer implemented services for clients and host resources used to provide the computer implemented services to the clients includes obtaining a resource discovery request for a service device of the service devices.
Asif Khan, Jayashree B. Radha, Ashish Kumar, Pati Mohan, Pawan Singh, Yasemin Ugur-Ozekinci, Shelesh Chopra, Amrit Lal Jain
Filed: 21 Apr 21
Utility
9ptor12qotv16h6gro67jv4cmpjglxejjum88ke43mbj0zejrzua6y175lo2
27 Oct 22
A method is provided for use in a storage processor, the method comprising: receiving a write request, the write request including a request to store user data in an array that includes a plurality of solid-state drives (SSD); executing the write request by: identifying metadata that is associated with the write request, and writing the user data and the metadata to different data streams that are opened on the plurality of SSDs; wherein writing the user data and the metadata to different data streams causes: (i) the user data to be stored in one or more first erase units of any of the plurality of SSDs, and (ii) the metadata to be stored in one or more second erase units of any of the plurality of SSDs, such that no part of the metadata is stored on any of the one or more first erase units, and no part of the user data is stored on any of the one or more second erase units.
Amitai Alkalay, Lior Kamran, Steven Morley
Filed: 23 Apr 21
Utility
zzn2a4843dob2d9dlgw2k2w yo2hgy113rv5
27 Oct 22
Techniques described herein relate to a method for generating backups of virtual machines.
Sunil Yadav, Manish Sharma, Aaditya Rakesh Bansal, Shelesh Chopra
Filed: 23 Apr 21
Utility
eny6j0t bmkknbmic6ybefvs95yg01a
27 Oct 22
Snapshots may be remotely replicated asynchronously from a first LSU (R1) on a first storage system (A) to a second replica LSU (R2) on a second storage system (A2).
Ian Adams, Bhaskar Bora, Jeffrey Wilson
Filed: 22 Apr 21
Utility
xnn9iqngsjfsrsst64ifrnnzoc kbkbb9tkybd0k3qlna1e
27 Oct 22
Embodiments for recording application program interface (API) calls through an API recorder component or process that captures API calls as they are used by a number of users.
Mark Malamut, Adam Brenner, Arun Murti
Filed: 21 Apr 21
Utility
8ax2oni7435zbddympy5ekx7bn
27 Oct 22
Snapshots may be used to implement remote replication, for example, asynchronously, between a first storage system, A1, and a second storage system, A2.
Bhaskar Bora, Mark J. Halstead, Deepak Vokaliga, Benjamin Yoder, William R. Stronge
Filed: 22 Apr 21