-
1.
公开(公告)号:US11899534B2
公开(公告)日:2024-02-13
申请号:US17576048
申请日:2022-01-14
Applicant: Dell Products L.P.
Inventor: Qi Jin , Nagasimha G. Haravu , Ashish Sharma , William Whitney
IPC: G06F11/14
CPC classification number: G06F11/1435 , G06F11/1451 , G06F11/1464 , G06F11/1469 , G06F2201/80
Abstract: Techniques for providing direct access to backup data can include: receiving a selection of a backup of a file system, wherein the backup is stored on a backup system connected to a data storage system; creating, in accordance with said selection of the backup, a remote copy of the backup, wherein the remote copy is stored on the backup system; generating a proxy file system for the remote copy on the backup system, wherein the proxy file system is mapped by the data storage system to the remote copy on the backup system; and providing a host with direct access to the remote copy using the proxy file system.
-
公开(公告)号:US20250094590A1
公开(公告)日:2025-03-20
申请号:US18466907
申请日:2023-09-14
Applicant: Dell Products L.P.
Inventor: Ameer M. Jabbar , Yidong Wang , Qi Jin , Ching-Yun Chao
Abstract: One example method includes receiving, at a multi cloud service orchestration platform from a client, a request for performance of a workflow, authenticating and authorizing the client, invoking orchestration of the workflow, invoking the workflow, validating a workflow definition associated with the workflow, and on successful validation, initializing execution of the workflow, and executing, at an activity container, the workflow. The method may be performed in the multi cloud service orchestration platform.
-
公开(公告)号:US20240406169A1
公开(公告)日:2024-12-05
申请号:US18327303
申请日:2023-06-01
Applicant: Dell Products L.P.
Inventor: Dominique Prunier , Alan White , Qi Jin , Yi Fang
IPC: H04L9/40
Abstract: Architectures and techniques are described that can provide decentralized, zero-trust authorization according to variable fine-grained policies For example, an authorization server can receive an authorization request from a requesting device. The authorization request can comprise a reference address to a resource, in which case resource data can be fetched, or comprise a signed entity indicative of the resource. In either case, resource data used to evaluate a policy can be obtained and, if an associated policy evaluation is authorized, the authorization request can be validated and an associated token can be provided to the requesting device, which can then be transmitted along with an API call to a service through which a resource is provided.
-
4.
公开(公告)号:US20230229559A1
公开(公告)日:2023-07-20
申请号:US17576048
申请日:2022-01-14
Applicant: Dell Products L.P.
Inventor: Qi Jin , Nagasimha G. Haravu , Ashish Sharma , William Whitney
IPC: G06F11/14
CPC classification number: G06F11/1435 , G06F11/1469 , G06F11/1464 , G06F11/1451 , G06F2201/80
Abstract: Techniques for providing direct access to backup data can include: receiving a selection of a backup of a file system, wherein the backup is stored on a backup system connected to a data storage system; creating, in accordance with said selection of the backup, a remote copy of the backup, wherein the remote copy is stored on the backup system; generating a proxy file system for the remote copy on the backup system, wherein the proxy file system is mapped by the data storage system to the remote copy on the backup system; and providing a host with direct access to the remote copy using the proxy file system.
-
5.
公开(公告)号:US20240414169A1
公开(公告)日:2024-12-12
申请号:US18331770
申请日:2023-06-08
Applicant: Dell Products L.P.
Inventor: Yi Fang , David Scott Thompson , Yidong Wang , Ranjit Kollu , Jennifer Minarik , Reut Kovetz , Ching-Yun Chao , Qi Jin , Jonathon Cwik
IPC: H04L9/40
Abstract: A system can identify an attribute-based access control policy that comprises a pair comprising a permission policy and a condition policy that is associated with performing an operation on a computing resource. The system can identify that the attribute-based access control policy corresponds to a role policy that is associated with the account. The system can determine whether the account and the role policy satisfy the attribute-based access control policy with respect to the operation, wherein the determining comprises evaluating whether the computing resource and a required permission of the permission policy is declared in the role policy, and evaluating whether the account and the role policy satisfy the condition policy evaluates to true based on attributes of the account and attributes of the computing resource. The system can, in response to determining that the account satisfy the permission policy and the condition policy, perform the operation on the computing resource.
-
-
-
-