-
公开(公告)号:US11709608B2
公开(公告)日:2023-07-25
申请号:US17172803
申请日:2021-02-10
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , David Zlotnick , Boris Shpilyuck
CPC classification number: G06F3/0641 , G06F3/067 , G06F3/0667 , G06F9/45558 , G06F2009/45583
Abstract: One example method includes chunking a respective disk of each of a plurality of virtual machines (VM) to create a respective plurality of chunks associated with each of the VMs, creating, based on the chunking process, a cluster comprising one or more of the VMs, creating a VM template whose data and disk structure match respective data and disk structures of each of the VMs in the cluster, and in response to a file operation involving a first one of the VM disks, defragmenting the first VM disk so that a disk structure of the first VM disk is the same as a disk structure of the VM template.
-
公开(公告)号:US11675742B2
公开(公告)日:2023-06-13
申请号:US17174598
申请日:2021-02-12
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , Amihai Savir
IPC: G06F16/174
CPC classification number: G06F16/1752 , G06F16/1744
Abstract: Deduplication of files or other data or objects in a manner that is aware of a format of the file and the application. A file may be chunked based on the format. The chunks are more consistent and lead to higher deduplication ratios. The file may be presented as a single file. However, the file is stored in chunks or subfiles and deduplication is performed with respect to the chunks. When the file is read, the file is rebuilt from its respective chunks. The files may also be compressed using differential compression, which leverages the content of similar files to compress a current file.
-
公开(公告)号:US11509458B2
公开(公告)日:2022-11-22
申请号:US16931582
申请日:2020-07-17
Applicant: EMC IP Holding Company LLC
Inventor: Jehuda Shemer , Assaf Natanzon
Abstract: A method and system for securely replicating encrypted deduplicated storages. Specifically, the method and system disclosed herein entail the replication and migration of encrypted data between storage systems that support deduplication. More specifically, a first encrypted data, which may have been encrypted using a first public cryptographic key and consolidated on a source storage system, may be translated into an interim (yet still encrypted) state using a first split private cryptographic key. Thereafter, using a compound conversion key, the interim state data may be further translated into a second encrypted data, which may be characterized as being encrypted by a second public cryptographic key. Therefore, substantively, the method and system disclosed herein may be directed to the translation of encrypted data from one encryption scheme to another while in-flight from a source storage system to a target storage system.
-
公开(公告)号:US11411819B2
公开(公告)日:2022-08-09
申请号:US16249965
申请日:2019-01-17
Applicant: EMC IP Holding Company LLC
Inventor: Boris Shpilyuck , Assaf Natanzon , David Zlotnick
IPC: G06F15/177 , H04L41/08 , G06F11/20 , G06F9/455 , H04L41/0806 , H04L41/12 , H04L61/5007 , H04L43/08 , H04L12/46
Abstract: Automatic network configuration for the recovery of virtual machines. A network configuration can be automatically provisioned by discovering the network topology of a source site and then matching the virtual machines to their locations or subnets in the network topology. The network is then implemented on a target site such that the required connectivity is present in the recovered target site even when the infrastructure of the source site and the target site are different.
-
公开(公告)号:US11386070B2
公开(公告)日:2022-07-12
申请号:US16825322
申请日:2020-03-20
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon
Abstract: Example embodiments of the present invention relate to a method, a system, and a computer program product for verifying the integrity of replicated virtual machine data. The method includes reading data from a production volume at a production site. A representation of the data may be stored at a replica site with the integrity of the data stored in the replica volume being verified according to the representation of the data.
-
公开(公告)号:US11323552B2
公开(公告)日:2022-05-03
申请号:US16389754
申请日:2019-04-19
Applicant: EMC IP Holding Company LLC
Inventor: Boris Shpilyuck , Assaf Natanzon , David Zlotnick
IPC: G06F15/16 , H04L69/40 , H04L41/12 , H04L45/28 , H04L41/0654 , H04L45/02 , H04L41/0663 , H04L41/0806
Abstract: Systems and methods for automatically configuring security groups during data protection operations including disaster recovery operations. In preparation for recovering a source site to a target site, security information at the source site is collected and classified. The classified security information is stored as a disaster recovery plan at least for security aspects of the disaster recovery process. The disaster recovery plan can be implemented at the target site such that security risks are minimized and connectivity errors are minimized during the recovery process.
-
公开(公告)号:US11283867B2
公开(公告)日:2022-03-22
申请号:US17027039
申请日:2020-09-21
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , Kfir Wolfson , Jehuda Shemer
IPC: H04L29/08 , H04L9/06 , G06F11/16 , H04L67/1095 , H04L67/1097
Abstract: A replication system for data of mobile devices is disclosed. The data of a mobile device is uploaded to stations in an area. Metadata associated with the objects is stored in a centralized or decentralized system. The metadata can be accessed to identify the stations storing the device's objects and the data of the mobile device can then be retrieved from the stations and reconstructed.
-
公开(公告)号:US11281635B2
公开(公告)日:2022-03-22
申请号:US16172337
申请日:2018-10-26
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , Yossef Saad
Abstract: One example method includes implementing a function as a service (FaaS) at a datacenter by performing operations including receiving an application program interface (API) gateway call from a client application, wherein the API gateway call is associated with an object PUT request, and automatically triggering, with the API gateway call, performance of an object insertion function. The object insertion function includes retrieving, from backend object storage, a previous version of the object, differentially compressing the object relative to the previous version of the object so as to generate a differential, and storing the differential in the backend object storage.
-
公开(公告)号:US11188561B2
公开(公告)日:2021-11-30
申请号:US16953571
申请日:2020-11-20
Applicant: EMC IP HOLDING COMPANY LLC
Inventor: Assaf Natanzon , Luay Al-Alem , Antony Bett , Michael Rhodes
IPC: G06F16/27 , G06F16/245 , G06F11/14
Abstract: Systems and methods for discovering applications. An application may be discovered by determining a topology of the application in a containerized platform. Discovering the topology may include determining the components of the application and then determining relationships between the components. The relationships may include whether a component (e.g., a microservice) is user facing and may be based on traffic patterns between the components. The components or microservices may be prioritized or ranked based on the topology. The topology can be used when performing a data protection operation such as a restore operation.
-
公开(公告)号:US20210349728A1
公开(公告)日:2021-11-11
申请号:US17382098
申请日:2021-07-21
Applicant: EMC IP Holding Company LLC
Inventor: David Zlotnick , Assaf Natanzon , Boris Shpilyuck
IPC: G06F9/4401 , G06F9/455
Abstract: One example method includes receiving input concerning a boot order sequence, where the input includes VM metadata, entering a training phase which includes generating a boot sequence rule based on the input, using the boot sequence rule to generate a proposed boot sequence, performing the proposed boot sequence, and gathering information concerning performance of the proposed boot sequence. The gathered information can be used as a basis to generate a modified boot sequence.
-
-
-
-
-
-
-
-
-