Aggregate inline deduplication with volume granular encryption

    公开(公告)号:US11256433B2

    公开(公告)日:2022-02-22

    申请号:US16354562

    申请日:2019-03-15

    Applicant: NetApp Inc.

    Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.

    SYSTEMS AND METHODS FOR DETECTING MALWARE ATTACKS

    公开(公告)号:US20210409425A1

    公开(公告)日:2021-12-30

    申请号:US17062732

    申请日:2020-10-05

    Applicant: NetApp, Inc.

    Abstract: A method, a computing device, and a non-transitory machine-readable medium for detecting malware attacks. In one example, an agent implemented in an operating system detects an overwrite in which an original data component is overwritten with a new data component. The agent computes a plurality of features associated with the overwrite, the plurality of features including an original entropy corresponding to the original data component, a new entropy corresponding to the new data component, an overwrite fraction, and a set of divergence features. The agent determines whether the new data component is encrypted using the plurality of features.

    AGGREGATE INLINE DEDUPLICATION WITH VOLUME GRANULAR ENCRYPTION

    公开(公告)号:US20200293212A1

    公开(公告)日:2020-09-17

    申请号:US16354562

    申请日:2019-03-15

    Applicant: NetApp Inc.

    Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.

    METHODS AND SYSTEMS FOR DOCUMENT CLASSIFICATION USING MACHINE LEARNING

    公开(公告)号:US20190392250A1

    公开(公告)日:2019-12-26

    申请号:US16281501

    申请日:2019-02-21

    Applicant: NETAPP, INC.

    Abstract: Methods and systems for document classification are provided. One method includes generating by a processor, a plurality of topics using content of a plurality of electronic documents, where each topic includes a plurality of words associated with the plurality of electronic documents; reducing by the processor, the plurality of topics to a subset of topics to represent the plurality of electronic documents based on a parameter indicating a property of each subset topic and separation between the subset topics; automatically generating by the processor, a tag for each subset topic, based on the tag's position within the subset topic; wherein each tag is an attribute of each subset topic; storing by the processor, the subset of topics with corresponding tags in a model data structure; and updating the model data structure by the processor based on one of a new topic and a new tag associated with an electronic document.

    LIVE NV REPLAY FOR ENABLING HIGH PERFORMANCE AND EFFICIENT TAKEOVER IN MULTI-NODE STORAGE CLUSTER
    6.
    发明申请
    LIVE NV REPLAY FOR ENABLING HIGH PERFORMANCE AND EFFICIENT TAKEOVER IN MULTI-NODE STORAGE CLUSTER 有权
    在多节点存储群中实现高性能和高效率的实时NV REPLAY

    公开(公告)号:US20150261633A1

    公开(公告)日:2015-09-17

    申请号:US14280139

    申请日:2014-05-16

    Applicant: NetApp, Inc.

    Abstract: A live non-volatile (NV) replay technique enables a partner node to efficiently takeover a failed node of a high-availability pair in a multi-node storage cluster by dynamically replaying operations synchronously logged in a non-volatile random access memory (NVRAM) of the partner node, while also providing high performance during normal operation. Dynamic live replay may be effected through interpretation of metadata describing the logged operations. The metadata may specify a location and type of each logged operation within a partner portion of the NVRAM, as well as any dependency among the logged operation and any other logged operations that would impose an ordering constraint. During normal operation, the partner node may consult the metadata to identify dependent logged operations and dynamically replay those operations to satisfy one or more requests. Upon failure of the node, the partner node may replay, in parallel, those logged operations having no imposed ordering constraint, thereby reducing time needed to complete takeover of the failed node.

    Abstract translation: 实时非易失性(NV)重播技术使得伙伴节点能够通过动态重放同步记录在非易失性随机存取存储器(NVRAM)中的操作来有效地接管多节点存储集群中的高可用性对的故障节点, 的合作伙伴节点,同时在正常运行期间也提供高性能。 可以通过解释描述记录的操作的元数据来实现动态实时重放。 元数据可以指定NVRAM的伙伴部分内的每个记录操作的位置和类型,以及记录的操作和将强制排序约束的任何其他记录操作之间的任何依赖关系。 在正常操作期间,伙伴节点可以查阅元数据以识别相关的记录操作,并动态地重放那些操作以满足一个或多个请求。 在节点发生故障时,伙伴节点可以并行地重播没有施加的排序约束的那些记录的操作,从而减少完成对故障节点的接管所需的时间。

    Machine learning based assignment of service levels in a networked storage system

    公开(公告)号:US12192281B2

    公开(公告)日:2025-01-07

    申请号:US18367055

    申请日:2023-09-12

    Applicant: NETAPP, INC.

    Abstract: Methods and systems for a networked storage system is provided. One method includes transforming by a processor, performance parameters associated with storage volumes of a storage system for representing each storage volume as a data point in a parametric space; generating by the processor, a plurality of bins in the parametric space using the transformed performance parameters; adjusting by the processor, bin boundaries for the plurality of bins for defining a plurality of service levels for the storage system based on the performance parameters; and using the defined plurality of service levels for operating the storage system.

Patent Agency Ranking