3707 patents
Utility
Hyper-scale P2P Deduplicated Storage System Using a Distributed Ledger
23 Nov 23
One example method includes receiving from a node, in an HSAN that includes multiple nodes, an ADD_DATA request to add an entry to a distributed ledger of the HSAN, the request comprising a user ID that identifies the node, a hash of a data segment, and a storage location of the data segment at the node, performing a challenge-and-response process with the node to verify that the node has a copy of the data that was the subject of the entry, making a determination that a replication factor X has not been met, and adding the entry to the distributed ledger upon successful conclusion of the challenge-and-response process.
Arun Murti, Joey C. Lei, Adam E. Brenner, Mark D. Malamut
Filed: 31 Jul 23
Utility
Reducing Bandwidth During Synthetic Restores from a Deduplication File System
23 Nov 23
During a current backup of a file system of a client, a determination is that a file in the current backup includes first data regions found in a file from a previous backup, and second data regions that are new.
Bhimsen Bhanjois, Kedar Godbole, Donna Barry Lewis, Nitin Madan, Srikant Viswanathan
Filed: 3 Aug 23
Utility
Authentication Token Management for Multiple Processes and Representational State Transfer Clients
26 Oct 23
Embodiments for processing authentication tokens in a system with multiple Representational State Transfer (REST) servers and clients.
Vaneeswaran N, Pushpendra Sinha
Filed: 28 Jun 23
Utility
Method to Efficiently Transfer Support and System Logs from Air-gapped Vault Systems to Replication Data Sources by Re-utilizing the Existing Replication Streams
26 Oct 23
One example method includes, at a replication data source, initiating a replication process that includes transmitting a replication stream to a replication destination vault, and data in the replication stream is transmitted by way of a closed airgap between the replication data source and the replication destination vault, switching, by the replication data source, from a transmit mode to a receive mode, receiving, at the replication data source, a first checksum of a file, and the first checksum and file were created at the replication destination vault, receiving, at the replication data source, the file, calculating, at the replication data source, a second checksum of the file, and when the second checksum matches the first checksum, ending the replication process.
Kalyan C. Gunda, Jagannathdas Rath
Filed: 29 Jun 23
Utility
Processing Out of Order Writes In a Log Structured File System for Improved Garbage Collection
5 Oct 23
Improving performance of garbage collection (GC) processes in a deduplicated file system having a layered processing architecture that maintains a log structured file system storing data and metadata in an append-only log arranged as a monotonically increasing log data structure of a plurality of data blocks wherein a head of the log increases in chronological order and no allocated data block is overwritten.
Ashwani Mujoo, Ramprasad Chinthekindi, Abhinav Duggal
Filed: 2 Jun 23
Utility
Intrusion Detection
28 Sep 23
Techniques are provided for intrusion detection on a computer system.
Kenneth Byrne
Filed: 2 Nov 22
Utility
Mechanism for Multi-factor Authentication Based on Data
6 Jul 23
A request is received from a user at a client to access a file of a set of files backed up to a backup server.
Yossef Saad, Itay Glick
Filed: 24 Feb 23
Utility
Method, Electronic Device and Computer Program Product for Storage Management
18 May 23
Embodiments of the present disclosure relate to a method for storage management, an electronic device, and a computer program product.
Ming Zhang, Ruyao Zhang, Yuhong Nie, Wei Lin, Pengfei Wu
Filed: 19 Jan 23
Utility
Method and System for Idempotent Synthetic Full Backups In Storage Devices
11 May 23
In general, embodiments relate to a method for generating synthetic full backups, the method comprising: performing a verification that a previous backup of source data stored in a data domain is a failed synthetic full backup, obtaining based on the verification a latest snapshot of the source data, obtaining based on the verification a prior snapshot of the source data making a determination, using a copy list that a first portion of the data items in the copy list exists in the previous backup and a second portion of the data items does not exist in the previous backup, and performing based on the determination a copy operation to copy the second portion of the data items to the data domain to obtain a synthetic full backup.
Deepthi Urs, Shraddha Chunekar, Adrian Dobrean, Navneet Upadhyay, Sunder Ramesh Andra, Amith Ramachandran
Filed: 11 Nov 21
Utility
Destination Namespace and File Copying
4 May 23
Destination namespace and file copying: a namespace service receives communication of namespace update for file from file's source. and communicates namespace update for file to an access object service identified for file.
Philip Shilane, Abhinav Duggal, George Mathew
Filed: 28 Oct 21
Utility
File Lifetime Tracking for Cloud-based Object Stores
4 May 23
Tracking changes to a document by defining a document record having a unique document record and comprising an index and a file name of the document, and defining a backup record for the document in a series of backups, which includes a timestamp for each backup, and a bitmask for the document.
Mark Malamut, Adam Brenner, Arun Murti
Filed: 30 Dec 22
Utility
Global Automated Data Center Expansion
4 May 23
A system can determine timeseries telemetry data of resource utilization of respective data centers of a group of data centers maintained by the system.
Jehuda Shemer, Valerie Lotosh, Erez Sharvit
Filed: 22 Oct 21
Utility
Intelligent and Adaptive Measurement System for Remote Education
27 Apr 23
One example method includes performing learning management.
Danqing Sha, Eric Bruno, Amy N. Seibel, Zhen Jia, Kenneth Durazzo
Filed: 22 Oct 21
Utility
Methods and Systems for Seamlessly Provisioning Client Application Nodes In a Distributed System
27 Apr 23
In general, embodiment relate to a method for provisioning a plurality of client application nodes in a distributed system using a management node, the method comprising: creating a file system in a namespace; associating the file system with a scale out volume; mounting the file system on a metadata node in the distributed system, wherein mounting the file system comprises storing a scale out volume record of the scale out volume; storing file system information for the file system in a second file system on the management node, wherein the file system information specifies the file system and the metadata node on which the file system is mounted; wherein storing the file system information triggers distribution of the file system information to at least a portion of a plurality of client application nodes.
Jean-Pierre Bono, Thomas Fridtjof Dahl
Filed: 27 Oct 21
Utility
Data Read Method, Data Storage Method, Electronic Device, and Computer Program Product
27 Apr 23
Embodiments of the present disclosure relate to a data read method, a data storage method, an electronic device, and a computer program product.
Chenxi Hu, Sanping Li, Zhen Jia
Filed: 22 Nov 21
Utility
Methods, Devices, and Computer Program Products for Authenticating Peripheral Device
27 Apr 23
Methods, devices, and computer program products for authenticating a peripheral device are provided in embodiments of the present disclosure.
Pedro Fernandez Orellana, Qiang Chen
Filed: 11 Nov 21
Utility
Near Continuous Data Protection without Using Snapshots
27 Apr 23
One example method includes performing delta operations to protect data.
Jehuda Shemer, Ravi Vijayakumar Chitloor
Filed: 27 Oct 21
Utility
Detecting Representative Bias Within Image Data Sets
27 Apr 23
One example method includes determining representation bias in a data set.
Farida Shafik, Shary Beshara, Amy N. Seibel, Eric Bruno, Megan Hyland
Filed: 22 Oct 21
Utility
Method, Electronic Device, and Computer Program Product for Managing Inference Process
27 Apr 23
Implementations of the present disclosure relate to a method, an electronic device, and a computer program product for managing an inference process.
Jinpeng Liu, Bin He, Zijia Wang, Zhen Jia
Filed: 17 Nov 21
Utility
Method, Device, and Computer Program Product for Task Processing
27 Apr 23
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for task processing.
Jiacheng Ni, Zijia Wang, Zhen Jia
Filed: 15 Nov 21