-
公开(公告)号:US11563807B2
公开(公告)日:2023-01-24
申请号:US17033813
申请日:2020-09-27
Applicant: EMC IP HOLDING COMPANY LLC
Inventor: Deepak Vokaliga , Francisco Aquino , Warren Fleury , Kenneth Byrne
IPC: H04L67/1097 , G06F3/0482 , H04L9/40 , H04W12/00 , H04L61/4511 , H04L67/1001 , G06F21/80
Abstract: A storage system management application contains control logic configured to enable the storage system management application to fully orchestrate setup of a containerized cloud communication system within embedded operating system, with minimal interaction from an end user. Upon receipt of an instruction to initiate cloud access, the storage system management application enrolls a cloud tethering subsystem and establishes a secure communication channel to the cloud tethering subsystem. The storage system management application also creates a cloud protection environment within the operating system for use by the cloud tethering subsystem, and registers the storage system to the cloud tethering subsystem. The storage system management application also creates external network interfaces on the cloud tethering subsystem and configures one or more private cloud provider endpoints on the cloud tethering subsystem.
-
公开(公告)号:US20200311280A1
公开(公告)日:2020-10-01
申请号:US16367676
申请日:2019-03-28
Applicant: EMC IP Holding Company LLC
Inventor: Kenneth Byrne
Abstract: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.
-
公开(公告)号:US12111935B2
公开(公告)日:2024-10-08
申请号:US18052085
申请日:2022-11-02
Applicant: EMC IP Holding Company LLC
Inventor: Kenneth Byrne
CPC classification number: G06F21/577 , G06F3/0604 , G06F3/0647 , G06F3/0683 , G06F21/57 , G06F21/6218 , G06N20/00
Abstract: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.
-
4.
公开(公告)号:US11386121B2
公开(公告)日:2022-07-12
申请号:US17033809
申请日:2020-09-27
Applicant: EMC IP HOLDING COMPANY LLC
Inventor: Deepak Vokaliga , Kenneth Byrne , Warren Fleury , Thiago Santos
IPC: G06F16/27 , H04L67/1097 , G06F11/14 , G06F8/61 , G06F9/54
Abstract: A SSMA (Storage System Management Application) automates creation of a cloud provider on a cloud repository. The SSMA instructs a CTS (Cloud Tethering Subsystem) to create the cloud provider, which causes the CTS to establish a secure connection to the cloud repository. The cloud repository creates the cloud provider and returns identifying information. The CTS then tests the connection to verify that the cloud provider is reachable at the cloud repository. The SSMA also instruct a solution enabler to install the cloud provider in the storage system embedded operating system. The SSMA also implements a cloud provider synchronization verification process, which enables the SSMA to determine if there are any differences between lists of cloud providers maintained by the CTS and the embedded operating system. If any differences are detected, the SSMA automates the process of installing the correct set of cloud providers in the storage system embedded operating system.
-
公开(公告)号:US20220103627A1
公开(公告)日:2022-03-31
申请号:US17033813
申请日:2020-09-27
Applicant: EMC IP HOLDING COMPANY LLC
Inventor: Deepak Vokaliga , Francisco Aquino , Warren Fleury , Kenneth Byrne
IPC: H04L29/08 , H04L29/06 , H04L29/12 , G06F3/0482
Abstract: A storage system management application contains control logic configured to enable the storage system management application to fully orchestrate setup of a containerized cloud communication system within embedded operating system, with minimal interaction from an end user. Upon receipt of an instruction to initiate cloud access, the storage system management application enrolls a cloud tethering subsystem and establishes a secure communication channel to the cloud tethering subsystem. The storage system management application also creates a cloud protection environment within the operating system for use by the cloud tethering subsystem, and registers the storage system to the cloud tethering subsystem. The storage system management application also creates external network interfaces on the cloud tethering subsystem and configures one or more private cloud provider endpoints on the cloud tethering subsystem.
-
公开(公告)号:US11579926B2
公开(公告)日:2023-02-14
申请号:US16785759
申请日:2020-02-10
Applicant: EMC IP HOLDING COMPANY LLC
Inventor: Aidan Hally , Paul Mcsweeney , Kenneth Byrne
Abstract: A request manager analyzes API calls from a client to a host application for state and performance information. If current utilization of host application processing or memory footprint resources exceed predetermined levels, then the incoming API call is not forwarded to the application. If current utilization of the host application processing and memory resources do not exceed the predetermined levels, then the request manager quantifies the processing or memory resources required to report the requested information and determines whether projected utilization of the host application processing or memory resources inclusive of the resources required to report the requested information exceed predetermined levels. If the predetermined levels are not exceeded, then the request manager forwards the API call to the application for processing.
-
公开(公告)号:US20210248007A1
公开(公告)日:2021-08-12
申请号:US16785759
申请日:2020-02-10
Applicant: EMC IP HOLDING COMPANY LLC
Inventor: Aidan Hally , Paul Mcsweeney , Kenneth Byrne
Abstract: A request manager analyzes API calls from a client to a host application for state and performance information. If current utilization of host application processing or memory footprint resources exceed predetermined levels, then the incoming API call is not forwarded to the application. If current utilization of the host application processing and memory resources do not exceed the predetermined levels, then the request manager quantifies the processing or memory resources required to report the requested information and determines whether projected utilization of the host application processing or memory resources inclusive of the resources required to report the requested information exceed predetermined levels. If the predetermined levels are not exceeded, then the request manager forwards the API call to the application for processing. The request manager may implement a limited number of retries if the predetermined levels are exceeded. The request manager prompts sending of an error message to the client if the retries are unsuccessful. Quantification of the required processing and memory resources is based on previous API calls so accuracy may improve over time.
-
公开(公告)号:US20230306119A1
公开(公告)日:2023-09-28
申请号:US18052085
申请日:2022-11-02
Applicant: EMC IP Holding Company LLC
Inventor: Kenneth Byrne
CPC classification number: G06F21/577 , G06F3/0647 , G06F3/0683 , G06F21/6218 , G06F3/0604 , G06N20/00 , G06F21/57
Abstract: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.
-
公开(公告)号:US11520898B2
公开(公告)日:2022-12-06
申请号:US16367676
申请日:2019-03-28
Applicant: EMC IP Holding Company LLC
Inventor: Kenneth Byrne
Abstract: Techniques are provided for intrusion detection on a computer system. In an example, a computer host device is configured to access data storage of the computer system via a communications network. It can be determined that the computer host device is behaving anomalously because a first current access by the computer host device to the data storage deviates from a second expected access by the computer host device to the data storage by more than a predefined amount. Then, in response to determining that the computer host device is behaving anomalously, the computer system can mitigate against the computer host device behaving anomalously.
-
公开(公告)号:US11327844B1
公开(公告)日:2022-05-10
申请号:US17084691
申请日:2020-10-30
Applicant: EMC IP HOLDING COMPANY LLC
Inventor: Francisco Aquino , Kenneth Byrne , Warren Fleury , Thiago Santos , Deepak Vokaliga
Abstract: A storage array creates snapshots of each of a plurality of devices of a storage group associated with a production device on which active application data is logically stored. Metadata that indicates associations between the snapshots and the devices is stored on cloud storage with the snapshots as a snapset object. A program running on a management station used the snapset metadata to automatically create new devices on which to recover the snapshots on a selected storage array and uses the snapset metadata to cause the snapshots to be automatically written from the cloud storage system to the new devices on the selected storage array.
-
-
-
-
-
-
-
-
-