-
公开(公告)号:US11455405B2
公开(公告)日:2022-09-27
申请号:US16987979
申请日:2020-08-07
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , Jehuda Shemer , Stav Sapir , Amos Zamir , Naor Radami
Abstract: One example method includes inserting a signal layer in an image, the signal layer indicating that a sensitive layer in the image is a candidate for encryption, creating a single layer archive file that includes the sensitive layer, encrypting the single layer archive file to create an encrypted layer, constructing a new image that includes the encrypted layer, inserting, in the new image, a decryptor layer that is operable to decrypt the encrypted layer, and designating the decryptor layer as an entry point of the new image.
-
公开(公告)号:US20220303264A1
公开(公告)日:2022-09-22
申请号:US17805178
申请日:2022-06-02
Applicant: EMC IP Holding Company LLC
Inventor: Ido Begun , Jehuda Shemer
Abstract: One example method includes contacting, by a client, a service, receiving a credential from the service, obtaining trust information from a trust broker, comparing the credential with the trust information, and either connecting to the service if the credential and trust information match, or declining to connect to the service if the credential and the trust information do not match. Other than by way of the trust information obtained from the trust broker, the client may have no way to verify whether or not the service can be trusted.
-
公开(公告)号:US20220294777A1
公开(公告)日:2022-09-15
申请号:US17805181
申请日:2022-06-02
Applicant: EMC IP Holding Company LLC
Inventor: Ido Begun , Jehuda Shemer
Abstract: One example method includes contacting, by a client, a service, receiving a credential from the service, obtaining trust information from a trust broker, comparing the credential with the trust information, and either connecting to the service if the credential and trust information match, or declining to connect to the service if the credential and the trust information do not match. Other than by way of the trust information obtained from the trust broker, the client may have no way to verify whether or not the service can be trusted.
-
公开(公告)号:US11438325B2
公开(公告)日:2022-09-06
申请号:US16804892
申请日:2020-02-28
Applicant: EMC IP Holding Company LLC
Inventor: Ido Begun , Jehuda Shemer
Abstract: One example method includes contacting, by a client, a service, receiving a credential from the service, obtaining trust information from a trust broker, comparing the credential with the trust information, and either connecting to the service if the credential and trust information match, or declining to connect to the service if the credential and the trust information do not match. Other than by way of the trust information obtained from the trust broker, the client may have no way to verify whether or not the service can be trusted.
-
115.
公开(公告)号:US11416516B2
公开(公告)日:2022-08-16
申请号:US16878942
申请日:2020-05-20
Applicant: EMC IP Holding Company LLC
Inventor: Saar Cohen , Jehuda Shemer , Kfir Wolfson , Itay Azaria
Abstract: Prioritization and quality of service control operations for any PiT replication operations. When replicating data from a production site to a replica site, the transmission of data is prioritized based on the perspective of a splitter and based on the perspective of an appliance, which may coordinate with multiple splitters. Quality is controlled by prioritizing which data is sent. The transmission may also perform compression when transmitting the data and may handle situations where available resources are scarce or unavailable.
-
公开(公告)号:US20220245098A1
公开(公告)日:2022-08-04
申请号:US17658934
申请日:2022-04-12
Applicant: EMC IP Holding Company LLC
Inventor: Jehuda Shemer , Alex Solan
IPC: G06F16/182 , G06F16/13 , G06F16/178 , G06F16/901 , G06F11/14
Abstract: One example method includes performing various operations while a stream of IOs is being applied to a source dataset and replicated to a target dataset, and the operations include receiving a replicated IO that was previously applied to a source dataset Merkle tree, applying the replicated IO to a target dataset Merkle tree by entering an updated hash value in the target dataset Merkle tree, and applying a timestamp to the target dataset Merkle tree.
-
公开(公告)号:US11360845B2
公开(公告)日:2022-06-14
申请号:US17168423
申请日:2021-02-05
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , Jehuda Shemer , Assaf Natanzon
Abstract: One example method includes receiving information concerning a threat to stored data, correlating the information with a preemptive action which, when taken, prevents harm to the stored data by the threat, implementing the preemptive action before the threat causes harm to the stored data, and taking an action to at least partly return a system associated with the stored data to a pre-threat state. The threat may be a natural disaster, or a human-caused condition, for example.
-
公开(公告)号:US20220174112A1
公开(公告)日:2022-06-02
申请号:US17668664
申请日:2022-02-10
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , Kfir Wolfson , Jehuda Shemer
IPC: H04L67/1095 , H04L67/1097 , H04L9/06 , G06F11/16 , H04W12/30
Abstract: A replication system for data of mobile devices is disclosed. The data of a mobile device is uploaded to stations in an area. Metadata associated with the objects is stored in a centralized or decentralized system. The metadata can be accessed to identify the stations storing the device's objects and the data of the mobile device can then be retrieved from the stations and reconstructed.
-
公开(公告)号:US20220116216A1
公开(公告)日:2022-04-14
申请号:US17069436
申请日:2020-10-13
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , Jehuda Shemer , Stav Sapir , Naor Radami
Abstract: A secure approval chain for runtime protection is disclosed. As an application or pod is developed in a pipeline, an approval engine ensures that the pod is approved by all approvers. The approval engine generates a deployment token that is added to the configuration data of the pod and that can be used at deployment to perform various security operations including pod verification, runtime environment control and enforcement, and pod or application verification.
-
公开(公告)号:US11275658B2
公开(公告)日:2022-03-15
申请号:US16802795
申请日:2020-02-27
Applicant: EMC IP Holding Company LLC
Inventor: Jehuda Shemer , Saar Cohen , Kfir Wolfson , Itay Azaria
Abstract: A data protection system configured to replicate data may generate rescue packages that allow the system to recover when communication between a splitter or source of the production data being replicated and an appliance that stores the replicated data is disrupted. The rescue package is stored on a datastore and is then retrieved by the data protection system or another splitter. After processing the rescue package, which may contain IOs that the data protection is unaware of due to the communication disruption, replication may resume normally.
-
-
-
-
-
-
-
-
-