-
公开(公告)号:US11899957B2
公开(公告)日:2024-02-13
申请号:US16878184
申请日:2020-05-19
Applicant: EMC IP Holding Company LLC
Inventor: Bing Liu , Jehuda Shemer , Kfir Wolfson , Jawad Said
CPC classification number: G06F3/065 , G06F3/067 , G06F3/0611 , G06F3/0664
Abstract: Data protection operations including replication operations are disclosed. Virtual machines, applications, and/or application data are replicated according to at least one strategy. The replication strategy can improve performance of the recovery operation.
-
公开(公告)号:US11681725B2
公开(公告)日:2023-06-20
申请号:US16156803
申请日:2018-10-10
Applicant: EMC IP Holding Company LLC
Inventor: Jehuda Shemer , Kfir Wolfson , Assaf Natanzon
CPC classification number: G06F16/27 , G06F11/1471 , G06F16/38 , G06F2201/80 , G06F2201/805 , G06F2201/82
Abstract: One example method includes creating an empty reconstruction stream database, identifying a data time interval, identifying data sources in which data was stored during the data time interval, reading data from the data sources, where the data read out from the data sources are associated with respective timestamps that fall within the data time interval, inserting the read out data into the empty reconstruction stream database so as to create a high resolution data stream, where the data are ordered in the empty reconstruction stream database according to timestamp, processing the data in the high resolution data stream and, based on the processing of the data, identifying and resolving a problem relating to an operating environment in which the data was initially generated.
-
公开(公告)号:US11640258B2
公开(公告)日:2023-05-02
申请号:US17382037
申请日:2021-07-21
Applicant: EMC IP Holding Company LLC
Inventor: Jehuda Shemer , Jawad Said , Kfir Wolfson
Abstract: One example method includes powering off a replica VM, taking a snapshot of an OS disk of a source VM associated with the replica VM, taking a snapshot of an OS disk of the replica VM, generating a list of blocks that includes all blocks of the source VM OS disk that have changed since a preceding cloning or snapshot process and further includes all blocks of the replica VM OS disk that have changed since the preceding cloning or snapshot process, and performing an override of the replica VM disk by writing, to the replica VM OS disk, the respective source VM OS disk values for each block in the list of blocks.
-
4.
公开(公告)号:US20230123049A1
公开(公告)日:2023-04-20
申请号:US18068926
申请日:2022-12-20
Applicant: EMC IP Holding Company LLC
Inventor: Itay Azaria , Kfir Wolfson , Jehuda Shemer , Saar Cohen
Abstract: One example method includes intercepting an IO issued by an application, writing the IO and IO metadata to a splitter journal in NVM, forwarding the IO to storage, and asynchronous with operations occurring along an IO path between the application and storage, evacuating the splitter journal by sending the IO and IO metadata from the splitter journal to a replication site. In this example, sending the IO and IO metadata from the journal to the replication site does not increase a latency associated with the operations on the IO path
-
公开(公告)号:US20220318409A1
公开(公告)日:2022-10-06
申请号:US17807422
申请日:2022-06-17
Applicant: EMC IP Holding Company LLC
Inventor: Amos Zamir , Jehuda Shemer , Kfir Wolfson
Abstract: Masking a data rate of transmitted data is disclosed. As data is transmitted from a production site to a secondary site, the data rate is masked. Masking the data rate can include transmitting at a fixed rate, a random rate, or an adaptive rate. Each mode of data transmission masks or obscures the actual data rate and thus prevents others from gaining information about the data or the data owner from the data transfer rate.
-
公开(公告)号:US11461084B2
公开(公告)日:2022-10-04
申请号:US17193159
申请日:2021-03-05
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , Jehuda Shemer , Stav Sapir , Naor Radami
Abstract: One example method includes using a primary key to encrypt a decryption key, splitting the primary key into ‘n’ parts, where at least ‘k’ parts of the ‘n’ parts are required to restore the primary key, and ‘k’≤‘n’, storing some of the ‘k’ parts in respective locations in a production environment, and one of the stored ‘k’ parts is held by a verifier stage, receiving, at the verifier stage, a request for restoration of the primary key, where the request is received from a deployment pod and the request includes a subset of the ‘k’ parts and the encrypted decryption key, performing, by the verifier stage, a validation process concerning the deployment pod, and restoring, by the verifier stage, the primary key, wherein the primary key is restored using the ‘k’ part held by the verifier stage.
-
公开(公告)号:US11455405B2
公开(公告)日:2022-09-27
申请号:US16987979
申请日:2020-08-07
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , Jehuda Shemer , Stav Sapir , Amos Zamir , Naor Radami
Abstract: One example method includes inserting a signal layer in an image, the signal layer indicating that a sensitive layer in the image is a candidate for encryption, creating a single layer archive file that includes the sensitive layer, encrypting the single layer archive file to create an encrypted layer, constructing a new image that includes the encrypted layer, inserting, in the new image, a decryptor layer that is operable to decrypt the encrypted layer, and designating the decryptor layer as an entry point of the new image.
-
公开(公告)号:US11416516B2
公开(公告)日:2022-08-16
申请号:US16878942
申请日:2020-05-20
Applicant: EMC IP Holding Company LLC
Inventor: Saar Cohen , Jehuda Shemer , Kfir Wolfson , Itay Azaria
Abstract: Prioritization and quality of service control operations for any PiT replication operations. When replicating data from a production site to a replica site, the transmission of data is prioritized based on the perspective of a splitter and based on the perspective of an appliance, which may coordinate with multiple splitters. Quality is controlled by prioritizing which data is sent. The transmission may also perform compression when transmitting the data and may handle situations where available resources are scarce or unavailable.
-
公开(公告)号:US11360845B2
公开(公告)日:2022-06-14
申请号:US17168423
申请日:2021-02-05
Applicant: EMC IP Holding Company LLC
Inventor: Kfir Wolfson , Jehuda Shemer , Assaf Natanzon
Abstract: One example method includes receiving information concerning a threat to stored data, correlating the information with a preemptive action which, when taken, prevents harm to the stored data by the threat, implementing the preemptive action before the threat causes harm to the stored data, and taking an action to at least partly return a system associated with the stored data to a pre-threat state. The threat may be a natural disaster, or a human-caused condition, for example.
-
公开(公告)号:US20220174112A1
公开(公告)日:2022-06-02
申请号:US17668664
申请日:2022-02-10
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , Kfir Wolfson , Jehuda Shemer
IPC: H04L67/1095 , H04L67/1097 , H04L9/06 , G06F11/16 , H04W12/30
Abstract: A replication system for data of mobile devices is disclosed. The data of a mobile device is uploaded to stations in an area. Metadata associated with the objects is stored in a centralized or decentralized system. The metadata can be accessed to identify the stations storing the device's objects and the data of the mobile device can then be retrieved from the stations and reconstructed.
-
-
-
-
-
-
-
-
-