8302 patents
Page 4 of 416
Utility
Method, device and computer program products for storage management
28 Nov 23
Techniques for storage management involve determining, in response to a detection that a disk changes from an unavailable state to an available state, at least one candidate storage unit associated with the disk; acquiring historical access information about the at least one candidate storage unit, the historical information comprising information related to a write request directed to the at least one candidate storage unit when the disk is in the unavailable state; determining a target storage unit from the at least one candidate storage unit based on the historical access information; and rebuilding the target storage unit.
Hongpo Gao, Xinlei Xu, Lifeng Yang, Jianbin Kang, Geng Han, Zhenhua Zhao
Filed: 14 Sep 20
Utility
Method, device, and computer readable medium for data deduplication
28 Nov 23
Techniques provide for data deduplication.
Ming Zhang, Shuo Lv, Chen Gong
Filed: 8 Apr 20
Utility
Slice memory control
28 Nov 23
Embodiments of the present disclosure relate to managing communications between slices on a storage device engine.
Rong Yu, Jingtong Liu, Peng Wu
Filed: 27 Apr 20
Utility
Backup monitoring for predictive storage policy selection for a cloud-based storage
28 Nov 23
Described is a system for predictive storage policy selection for a cloud-based storage based on backup monitoring.
Shelesh Chopra, Sunil Yadav, Amarendra Behera
Filed: 22 Sep 21
Utility
Synthetically providing multiple types of granular delete operations for a cloud-based object storage
28 Nov 23
Described is a system (and method) for providing multiple types of granular delete operations for a cloud-based object storage.
Ravi Vijayakumar Chitloor, Sunil Yadav, Shelesh Chopra, Amarendra Behera, PrabhatKumar Dubey, Deependra Singh, Jigar Bhanushali, Himanshu Arora, Tushar Dethe
Filed: 23 Oct 20
Utility
Managing trusted communications between server and clients
28 Nov 23
A technique for managing communications between a server and multiple clients includes configuring the server to support multiple sets of certificates for respective clients having respective root certificates.
Dmitry Nikolayevich Tylik, Charles W. Kaufman, Gregory W. Lazar, Marco Abela, Jingyan Zhao
Filed: 30 Oct 20
Utility
Trust establishment by escalation
28 Nov 23
One example method includes contacting, by a client, a service, receiving a credential from the service, obtaining trust information from a trust broker, comparing the credential with the trust information, and either connecting to the service if the credential and trust information match, or declining to connect to the service if the credential and the trust information do not match.
Ido Begun, Jehuda Shemer
Filed: 2 Jun 22
Utility
Pre-generating secure channel credentials
28 Nov 23
Secure credentials (e.g., Diffie Helman (DH) key pairs) may be generated independently of requests to establish communication channels between storage system ports (SSPs) and remote ports, such that secure credentials are pre-generated relative to the requests for which they are utilized to establish secure communication channels.
Venkata L R Ippatapu, Kenneth Dorman
Filed: 29 May 20
Utility
Hyper-scale P2P Deduplicated Storage System Using a Distributed Ledger
23 Nov 23
One example method includes receiving from a node, in an HSAN that includes multiple nodes, an ADD_DATA request to add an entry to a distributed ledger of the HSAN, the request comprising a user ID that identifies the node, a hash of a data segment, and a storage location of the data segment at the node, performing a challenge-and-response process with the node to verify that the node has a copy of the data that was the subject of the entry, making a determination that a replication factor X has not been met, and adding the entry to the distributed ledger upon successful conclusion of the challenge-and-response process.
Arun Murti, Joey C. Lei, Adam E. Brenner, Mark D. Malamut
Filed: 31 Jul 23
Utility
Reducing Bandwidth During Synthetic Restores from a Deduplication File System
23 Nov 23
During a current backup of a file system of a client, a determination is that a file in the current backup includes first data regions found in a file from a previous backup, and second data regions that are new.
Bhimsen Bhanjois, Kedar Godbole, Donna Barry Lewis, Nitin Madan, Srikant Viswanathan
Filed: 3 Aug 23
Utility
Smooth flushing of cached write data
21 Nov 23
A method of performing write operations that have been received by a data storage apparatus is provided.
Vladimir Shveidel, Socheavy Heng
Filed: 15 Apr 21
Utility
Platform agnostic library-less intelligent test automation by reverse engineering product REST API specification
21 Nov 23
An API reader reads a system application's API specification file and creates a root.yml file containing key:value pairs, in which the keys are objects, and the values are staging_object.yml files.
Sathish Kumar, Kumaravel Palanisamy
Filed: 15 Oct 20
Utility
Intelligent filesystem for container images
21 Nov 23
One example method includes transmitting a request for a container image to a registry, receiving metadata associated with the container image, wherein the metadata allows a controller to mount an empty filesystem on a host machine, starting a container from the container image without receiving all files associated with the container image, receiving files, from a container server, needed by the container based on an access sequence associated with the container.
Victor Fong, Kenneth Durazzo, Xuebin He
Filed: 31 Jan 20
Utility
Detection of unauthorized encryption using deduplication efficiency metric
21 Nov 23
Techniques are provided for detection of unauthorized encryption using one or more deduplication efficiency metrics.
Yevgeni Gehtman, Maxim Balin, Tomer Shachar
Filed: 29 Oct 20
Utility
Logical storage device access using device-specific keys in an encrypted storage environment
21 Nov 23
An apparatus in one embodiment comprises at least one processing device comprising a processor coupled to a memory.
Amit Pundalik Anchi, Sanjib Mallick
Filed: 26 May 21
Utility
Transforming application-instance specific data
21 Nov 23
Transforming data that is provided by a first instance of an application that uses application-instance specific data includes determining if a component of the data is an application-instance specific component and, if the component is an application-instance specific component, transforming the component either at a storage system containing the data or as the component is being accessed by a second instance of the application, different from the first instance.
Brett A. Quinn, Douglas E. LeCrone
Filed: 29 Oct 20
Utility
Automated uniform host attachment
21 Nov 23
Configuring systems to provide host access may include: configuring a stretched volume; and performing processing that allows the host access to the stretched volume.
Dmitry Tylik, Dave J. Lindner, Girish Sheelvant, Nagasimha G. Haravu
Filed: 10 Mar 21
Utility
Method, electronic device and computer program product for managing data blocks
21 Nov 23
Techniques for managing data blocks involve: generating, based on a first hash algorithm, a first fingerprint for a first block.
Geng Han, Xinlei Xu, Yousheng Liu, Ruiyong Jia
Filed: 5 May 21
Utility
Remotely replicating duplicated data
21 Nov 23
Data may be replicated from a host storage system to a target storage system.
Benjamin Yoder, William R. Stronge
Filed: 10 Nov 22
Utility
Method, electronic device and computer program product for processing data
21 Nov 23
Techniques involve obtaining, at a first network interface card coupled with a first device, information related to a plurality of data blocks to be written to a second device, the information including sizes of the plurality of data blocks and a plurality of destination addresses in a memory of the second device where the plurality of data blocks will be written.
Yinlong Lu, Haohan Zhang, Yang Liu, Dezheng Zhang, Chen Bian
Filed: 15 Sep 21