INTELLIGENT GARBAGE COLLECTION BASED ON CONTENT SIMILARITY

    公开(公告)号:US20240402934A1

    公开(公告)日:2024-12-05

    申请号:US18799925

    申请日:2024-08-09

    Abstract: A storage system performs garbage collection, with data compression, in storage memory. The system obtains hash results from data segments. The system determines similarity of content of data segments, based on the hash results. The system performs data compression of live data of two or more data segments that have similarity of content meeting a similarity threshold. The system writes the compressed live data of the two or more data segments into the storage memory.

    LOCATING A VALUE THROUGH DETERMINISTIC SEARCHING

    公开(公告)号:US20240362224A1

    公开(公告)日:2024-10-31

    申请号:US18767767

    申请日:2024-07-09

    Inventor: ETHAN L. MILLER

    CPC classification number: G06F16/2455 G06F16/2255

    Abstract: A method for efficiently supporting deletion in a probabilistic data structure, and related computing or storage system are described. A processor, computing system or storage system constructs a table and a summary table for determining whether there is an entry for a value in the table. The summary table has buckets pointed to by address fields of values. Each bucket has a prefix table, a transit table, signature table and a first indicator. The system tracks deletion and addition of items of the table and summary table through the first indicators.

    Providing End-To-End Encryption For Data Stored In A Storage System

    公开(公告)号:US20220222184A1

    公开(公告)日:2022-07-14

    申请号:US17707723

    申请日:2022-03-29

    Abstract: A method of providing end-to-end encryption for data stored in a storage system, including: receiving a request to read encrypted data from a logical volume of a storage system; decrypting the encrypted data using a decryption key associated with at least one property of the storage system; performing at least one of a data operation to reconstitute the data; encrypting the data using an encryption key associated with at least one property of the data to generate new encrypted data; and providing a response to the request that includes the new encrypted data.

Patent Agency Ranking