4565 patents
Page 133 of 229
Utility
Data access threat detection and prevention
1 Jun 21
Data access threat detection and prevention modules are implemented proximate to data storage, e.g. in disk array controllers.
Victor Salamon, John Afaganis
Filed: 20 Apr 17
Utility
User authentication with acoustic fingerprinting
1 Jun 21
Methods, apparatus, and processor-readable storage media for user authentication with acoustic fingerprinting are provided herein.
Stas Khoroshevsky, Christina Tkachenko, Chen Gantz, Julia Petukhov, Rei Maoz, Liat Ben-Porat
Filed: 28 Jan 19
Utility
Real-time compression of log data
1 Jun 21
Techniques are provided for compression and decompression of log data.
Amihai Savir, Oshry Ben-Harush, Omer Sagi
Filed: 29 Mar 18
Utility
Identification and control of malicious users on a data storage system
1 Jun 21
Identification and control of malicious users on a data storage system is described herein.
Jai Prakash Gahlot, Amit Kumar Chauhan, Shiv Shankar Kumar
Filed: 19 Dec 18
Utility
Distributed network internet protocol (IP) address management in a coordinated system
1 Jun 21
A dynamic ownership model is utilized for Internet protocol (IP) address allocation and management.
Patrick Andrew, Alexander Bahm
Filed: 31 Oct 18
Utility
Method, apparatus and computer program product for performing authentication using multiple user devices
1 Jun 21
There are disclosed techniques for use in authentication.
Salah Machani, Naveen Naga Sunkavally
Filed: 30 Dec 16
Utility
Decentralized identities for access to multiple computing resource systems
1 Jun 21
At least one identity for a given entity is established in accordance with a decentralized identity management system maintained in accordance with a distributed ledger, wherein the identity of the given entity and a set of attributes relating to the identity are defined by a secure token file.
Stephen Todd, Mark A. O'Connell
Filed: 26 Jul 17
Utility
Data centric resource management for edge cloud systems
1 Jun 21
A resource management framework is provided for edge-cloud systems that supports heterogeneity of devices and application requirements.
Tiago Salviano Calmon, Ana Cristina Bernardo de Oliveira, Flavia Coimbra Delicato, Paulo F. Pires, Marcelo Pitanga, Igor Leão dos Santos
Filed: 2 May 19
Utility
Method and system for backing up and restoring data
1 Jun 21
A method and system for backing up and restoring data includes: determining, at a server storage area network (SAN) node, an LUN required for protection within a server SAN node based on communication between a backup agent and a logic unit number (LUN) agent in the server SAN node; determining a target backup device based on communication between the backup agent and respective target agent of a plurality of backup devices, the plurality of backup devices being connected with the server SAN node; and transmitting a virtual disk control command to the target backup device in response to the backup or restoration being triggered, such that data in the LUN required for protection is backed up to the target backup device or restored from the target backup device via an activated virtual disk interface of the target backup device.
Ried Ruifang Liu, Yong Zou, Man Lv, Tao Xu
Filed: 4 Jun 18
Utility
Generating summaries of messages associated with assets in an enterprise system
1 Jun 21
A method includes obtaining messages associated with assets in an enterprise system, splitting each of the messages into a set of tokens, determining a count of a number of occurrences of each of the tokens, and assigning weights to the tokens based at least in part on the counts of the number of occurrences of the tokens.
Sashka T. Davis, Kevin J. Arunski, Zulfikar A. Ramzan, Scott Moore, Abram Q. Thielke, Ed G. Quackenbush, Matthew D. Tharp
Filed: 3 May 19
Utility
Secure storage access utilizing multi-path layer of host device to identify processes executed on the host device with authorization to access data of a storage system
25 May 21
An apparatus comprises a host device configured to communicate over a network with a storage system comprising a plurality of storage devices.
Vinay G. Rao, Sanjib Mallick, Stephen D. Smaldone, Arieh Don
Filed: 25 Jul 19
Utility
Self-contained disaster detection for replicated multi-controller systems
25 May 21
Self-contained disaster detection for replicated multi-controller systems is described herein.
Bharadwaj R. Sathavalli, Shampavman Chenjeri Gururajarao
Filed: 3 May 19
Utility
Virtual block redirection clean-up
25 May 21
Virtual block redirection clean-up is accomplished for a virtual block in a mapper tree for a logical volume that is redirected to a destination virtual block in the mapper tree.
Alex Soukhman, Vladimir Shveidel, Ronen Gazit, Uri Shabi
Filed: 11 Jul 19
Utility
Method and apparatus for processing object metadata
25 May 21
A distributed object store can expose object metadata, in addition to object data, to distributed processing systems, such as Hadoop and Apache Spark.
Stephen G. Graham, Eron D. Wright
Filed: 31 Mar 15
Utility
Method, device, and computer program product for reading data
25 May 21
Techniques are directed to reading data.
Hongpo Gao, Jian Gao, Xinlei Xu, Geng Han, Jianbin Kang
Filed: 9 Jul 19
Utility
Storage drivers for remote replication management
25 May 21
A method is used in providing remote replication management.
Evgeny Roytman, Shreesha PaiManoor
Filed: 30 Oct 17
Utility
Host device with controlled cloning of input-output operations
25 May 21
An apparatus in an illustrative embodiment comprises a host device configured to communicate over a network with at least first and second storage systems each comprising a plurality of storage devices.
Amit Pundalik Anchi, Madhu Tarikere
Filed: 19 Jul 19
Utility
Reducing overhead of managing cache areas
25 May 21
Maintaining multiple cache areas in a storage device having multiple processors includes loading data from a specific portion of non-volatile storage into a local cache slot in response to a specific processor of a first subset of the processors performing a read operation to the specific portion of non-volatile storage, where the local cache slot is accessible to the first subset of the processors and is inaccessible to a second subset of the processors that is different than the first subset of the processors and includes converting the local cache slot into a global cache slot in response to one of the processors performing a write operation to the specific portion of non-volatile storage, wherein the global cache area is accessible to the first subset of the processors and to the second subset of the processors.
Venkata Khambam, Jeffrey R. Nelson, Brian Asselin, Rong Yu
Filed: 23 Jan 20
Utility
Handling weakening of hash functions by using epochs
25 May 21
Techniques to manage the use of hash functions are disclosed.
Mahadev Satyanarayanan, Niraj Tolia, Andrew Gaul
Filed: 7 Feb 19
Utility
Dual-splitter for high performance replication
25 May 21
An aspect of performing dual splitting functions in a data replication system include receiving an I/O from a host computer.
Saar Cohen, Assaf Natanzon, Kirill Shoikhet
Filed: 28 Mar 19