1653 patents
Page 13 of 83
Utility
Sharing Encryption Information Amongst Storage Devices In A Storage System
10 Aug 23
Sharing encryption information amongst storage devices in a storage system, including: detecting that one or more source storage devices has been designated for removal from the storage system; and responsive to detecting that the source storage devices have been designated for removal from the storage system: encrypting a device key for each remaining storage device using a master secret to generate an encrypted device key for each remaining storage device; generating, for each write group, a first plurality of shares from the master secret; creating, from each share of the first plurality of shares, a second plurality of shares equal to a minimum number of the remaining storage devices required from each write group for a quorum to boot the storage system; and storing, for each remaining storage device, the encrypted device key and a respective share of the second plurality of shares in the remaining storage devices.
ANDREW BERNAT, ETHAN MILLER
Filed: 18 Apr 23
Utility
Efficient Replication Based On Dataset Versioning
10 Aug 23
Synchronizing snapshots between storage systems, including: receiving, from a source storage system, an identification of a snapshot to be replicated to a destination storage system, wherein the source storage system and the destination storage system are of different types; identifying, from hint information stored on the destination storage system, a most recent version of the snapshot that is stored on the destination storage system; issuing, to the source storage system, a request for an identification of the differences between the snapshot to be replicated to the destination storage system and the most recent version of the snapshot that is stored on the destination storage system; receiving, from the source storage system, the identification of the differences; and issuing a request to transfer, from the source storage system to the destination storage system, data associated with the differences.
VINAY PERNETI, DEEPAK CHAWLA, JOHN COLGROVE, TERENCE NOONAN, JIKUI SU
Filed: 27 Mar 23
Utility
Inferred nonsequential prefetch based on data access patterns
8 Aug 23
Nonsequential readahead based on data access patterns, the method comprising: determining a set of access patterns for stored content; determining, based on the set of access patterns, a list of storage locations for content expected to be used; and prefetching, based on the list of storage locations for content expected to be used, one or more data objects.
Bennett Amodio, Emily Potyraj, Brian Gold
Filed: 25 Feb 20
Utility
Encryption indicator-based retention of recovery datasets for a storage system
8 Aug 23
An illustrative method includes determining an encryption indicator for a first recovery dataset by determining a difference in an amount or percentage of incompressible data associated with the first recovery dataset compared to an amount or percentage of incompressible data associated with a second recovery dataset that temporally precedes the first recovery dataset, the encryption indicator representative of data within or represented by the first recovery dataset that cannot be compressed more than a threshold amount; and performing, based on the encryption indicator for the first recovery dataset, an action with respect to the second recovery dataset, wherein the second recovery dataset is usable to restore data maintained by a storage system to a second state corresponding to a second point in time that temporally precedes a first point in time corresponding to the first recovery dataset.
Benjamin P Borowiec, Ronald Karr
Filed: 3 Nov 22
Utility
Hardware token based management of recovery datasets for a storage system
8 Aug 23
An illustrative method includes a data protection system detecting a request to perform a restricted operation with respect to a recovery dataset configured to be used by a storage system to recover from a data corruption event within the storage system, monitoring, in response to the request, for an occurrence of a predetermined set of one or more authorization events performed with one or more hardware tokens, and preventing the restricted operation from being executed until the each of the one or more authorization events included in the predetermined set occurs.
Ethan L. Miller, Ronald Karr
Filed: 30 Sep 20
Utility
Inter-I/O relationship based detection of a security threat to a storage system
8 Aug 23
An illustrative method includes a data protection system identifying one or more input operations and one or more output operations performed between a source and a storage system, identifying an anomaly in a relationship between the one or more input operations and the one or more output operations, and determining, based on the identifying of the anomaly, that the storage system is possibly being targeted by a security threat.
Ethan L. Miller, Ronald Karr, Alexandre Xavier Duchâteau, Constantine P Sapuntzakis
Filed: 30 Sep 20
Utility
Storage cluster address resolution
8 Aug 23
A method of address resolution broadcasting in a networked device is provided.
Jayesh Patel, Prabhath Sajeepa, Daniel Talayco
Filed: 23 Dec 19
Utility
Communication paths for storage devices having differing capacities
8 Aug 23
A storage system is provided.
Par Botes, John Hayes, Zhangxi Tan
Filed: 10 Dec 21
Utility
Deallocated Block Determination
3 Aug 23
A first data block on a storage device including a data structure of deallocated data blocks on the storage device and a corresponding program erase count value for each of the deallocated data blocks is identified.
ERIC D. SEPPANEN, NEIL BUDA VACHHARAJANI, NIDHI PANKAJ DOSHI
Filed: 6 Apr 23
Utility
Selecting Storage Resources Based On Data Characteristics
3 Aug 23
Selecting storage resources based on data characteristics, including: determining, for data that is stored within a storage system that includes multiple types of data storage, a storage type to use for the data, wherein: the data is associated with one more snapshots that are stored in the storage system, and the determination is based on whether the data that is stored in at least one volume in the storage system, wherein one storage type is selected if the data is stored in at least one volume and another storage type is selected if the data is not stored in at least one volume; and storing the data in a storage device associated with the determined storage type.
ANDREW BERNAT, ZOLTAN DEWITT, JOHN COLGROVE
Filed: 6 Apr 23
Utility
Transitioning Between Source Data Repositories For A Dataset
3 Aug 23
Transitioning between replication sources for data replication operations, including: delaying a transition from using a first data repository as a source for data replication to using a second data repository as the source for data replication after detecting that one or more storage operations directed to the first data repository have not been replicated to the second data repository; and promoting the second data repository as the source for data replication such that storage operations received after completing the transition are directed to the second data repository.
DAVID GRUNWALD, THOMAS GILL, CONNOR BROOKS, LARRY TOUCHETTE, SAURABH SHUKLA
Filed: 10 Apr 23
Utility
Intra-block Error Correction
3 Aug 23
Intra-block error correction including generating reconstructed sub-portions of a portion of a dataset that is distributed into a plurality of portions that are stored on different storage devices of the storage system, wherein the dataset indicates a first number of errors that is greater than a second number of parity data portions of the dataset, determining that a sub-portion of the dataset does not match a corresponding reconstructed sub-portion of the dataset; and based on the determination, replacing the sub-portion of the dataset with the reconstructed sub-portion of the dataset.
Ethan Miller, John Colgrove, Yuhong Mao
Filed: 31 Jan 22
Utility
Recover Corrupted Data Through Speculative Bitflip And Cross-Validation
3 Aug 23
Recovering corrupted data through speculative bitflip and cross-validation, including altering a first data portion stored in a storage device, wherein the first data portion contains an error; calculating a hash value using the altered first data portion; comparing the hash value calculated using the altered first data portion to a stored hash value for the first data portion; and based on the comparing, determining whether the altering corrects the error in the first data portion.
MATTHEW FAY, RUNMIN WANG, RANDY ZHAO, ANDREW BERNAT
Filed: 10 Nov 22
Utility
Optimized data resiliency in a modular storage system
1 Aug 23
A redundant array of independent drives (RAID) stripe is formed across a set of storage controllers of a plurality of storage controllers, wherein the RAID stripe comprises two or more of a plurality of modular storage devices of at least one of the set of storage controllers.
Hari Kannan, Robert Lee, Yuhong Mao, Ronald Karr, Boris Feigin
Filed: 8 Jun 20
Utility
Intra-device redundancy scheme
1 Aug 23
In one implementation, storage system includes embedded storage devices, where each embedded storage device includes a direct-mapped solid state drive (SSD) storage portion and storage system controllers.
Peter E. Kirkpatrick, Ronald Karr
Filed: 16 Aug 21
Utility
Storage system accommodating varying storage capacities
1 Aug 23
A plurality of storage nodes in a single chassis is provided.
John Hayes, John Colgrove, John D. Davis
Filed: 30 Apr 20
Utility
Performing partial redundant array of independent disks (RAID) stripe parity calculations
1 Aug 23
A method of performing partial redundant array of independent disks (RAID) stripe parity calculations is disclosed.
Constantine Sapuntzakis, Marco Sanvido, Timothy Brennan
Filed: 13 Jul 22
Utility
Tiered storage of data in a storage network
1 Aug 23
Apparatus for tiered storage of data in a storage network.
S. Christopher Gladwin, Timothy W. Markison, Greg R. Dhuse, Thomas F. Shirley, Jr., Wesley B. Leggette, Jason K. Resch, Gary W. Grube
Filed: 30 Sep 22
Utility
Maintaining storage of data slices in accordance with a slice reduction scheme
1 Aug 23
A method for execution by a computing device of a storage network includes determining an encoded data slice reduction scheme for a set of encoded data slices stored in a set of storage units of the storage network, where a data segment of data is encoded into the set of encoded data slices in accordance with encoding parameters, and where the encoding parameters include a pillar width number and a decode threshold number.
S. Christopher Gladwin, Gary W. Grube, Jason K. Resch
Filed: 16 Jun 22
Utility
Coordinated snapshots for data stored across distinct storage environments
1 Aug 23
In an embodiment, two or more storage systems are requested to prepare respective local checkpoints for a dataset, wherein each of the two or more storage systems stores portion of the dataset.
Ronald Karr, Naveen Neelakantam, Taher Vohra
Filed: 29 Oct 21