END-TO-END CHECKSUM IN A MULTI-TENANT ENCRYPTION STORAGE SYSTEM

    公开(公告)号:US20190215152A1

    公开(公告)日:2019-07-11

    申请号:US15866185

    申请日:2018-01-09

    Applicant: VMware, Inc.

    Abstract: A multi-tenant storage system can store clear text data and associated clear text checksum received from a storage tenant using their associated cryptographic key (“cryptokey”). When the clear text data is compressible, cryptographic data (“cryptodata”) is generated from a concatenation of the clear text checksum and compressed clear text data using the cryptokey. A cryptographic checksum (“cryptochecksum”) is generated from the cryptodata. When the clear text data is uncompressible, cryptographic data (“cryptodata”) is generated by encrypting the clear text data using the cryptokey with an extra verification step to make sure the clear text checksum can be rebuilt during the read request. A cryptographic checksum (“cryptochecksum”) is generated from the cryptodata. The cryptodata and associated cryptochecksum are stored in the multi-tenant storage system, so that repairs to damaged cryptodata can be made using the associated cryptochecksum.

    End-to-end checksum in a multi-tenant encryption storage system

    公开(公告)号:US10581602B2

    公开(公告)日:2020-03-03

    申请号:US15866185

    申请日:2018-01-09

    Applicant: VMware, Inc.

    Abstract: A multi-tenant storage system can store clear text data and associated clear text checksum received from a storage tenant using their associated cryptographic key (“cryptokey”). When the clear text data is compressible, cryptographic data (“cryptodata”) is generated from a concatenation of the clear text checksum and compressed clear text data using the cryptokey. A cryptographic checksum (“cryptochecksum”) is generated from the cryptodata. When the clear text data is uncompressible, cryptographic data (“cryptodata”) is generated by encrypting the clear text data using the cryptokey with an extra verification step to make sure the clear text checksum can be rebuilt during the read request. A cryptographic checksum (“cryptochecksum”) is generated from the cryptodata. The cryptodata and associated cryptochecksum are stored in the multi-tenant storage system, so that repairs to damaged cryptodata can be made using the associated cryptochecksum.

    Maintaining quorum of storage objects in nested levels of a distributed storage system

    公开(公告)号:US10346063B2

    公开(公告)日:2019-07-09

    申请号:US15356413

    申请日:2016-11-18

    Applicant: VMware, Inc.

    Abstract: Exemplary methods, apparatuses, and systems determine that quorum can be maintained for a storage object in a distributed storage system in the event a defined maximum number of first partitions in a first level of storage and a second partitions in a second level of storage fail. When it is determined that there are insufficient numbers of first partitions and/or second partitions, additional first partitions and/or second partitions are associated with the storage object in the distributed storage system. A number of votes is calculated for distribution and an allocation is defined for assigning the votes to each component and witness component of the storage object.

    Techniques for performing virtual machine software upgrades using virtual disk swapping
    6.
    发明授权
    Techniques for performing virtual machine software upgrades using virtual disk swapping 有权
    使用虚拟磁盘交换执行虚拟机软件升级的技术

    公开(公告)号:US09110757B2

    公开(公告)日:2015-08-18

    申请号:US13741047

    申请日:2013-01-14

    Applicant: VMware, Inc.

    Abstract: In one embodiment, a computer system creates a first template VM that includes a first OS VMDK and a first software binary VMDK, and clones the first template VM to create a linked clone VM. The linked clone VM executes a guest OS by accessing the first OS VMDK and a software application by accessing the first software binary VMDK. The computer system further creates a second template VM that includes a second software binary VMDK, where the second software binary VMDK includes one or more upgrades to the software application that are not included in the first software binary VMDK. The computer system then detaches the first software binary VMDK from the linked clone VM and attaches the second software binary VMDK to the linked clone VM. The linked clone VM thereafter executes the software application by accessing the second software binary VMDK.

    Abstract translation: 在一个实施例中,计算机系统创建包括第一OS VMDK和第一软件二进制VMDK的第一模板VM,并克隆第一模板VM以创建链接的克隆VM。 链接克隆VM通过访问第一软件二进制VMDK来访问第一OS VMDK和软件应用程序来执行客户操作系统。 计算机系统还创建包括第二软件二进制VMDK的第二模板VM,其中第二软件二进制VMDK包括不包括在第一软件二进制VMDK中的软件应用程序的一个或多个升级。 然后,计算机系统从链接的克隆VM中分离第一软件二进制VMDK,并将第二软件二进制VMDK附加到链接的克隆VM。 然后,链接克隆VM通过访问第二软件二进制VMDK来执行软件应用。

    TECHNIQUES FOR PERFORMING VIRTUAL MACHINE SOFTWARE UPGRADES USING VIRTUAL DISK SWAPPING
    7.
    发明申请
    TECHNIQUES FOR PERFORMING VIRTUAL MACHINE SOFTWARE UPGRADES USING VIRTUAL DISK SWAPPING 有权
    使用虚拟磁盘交换执行虚拟机软件升级的技术

    公开(公告)号:US20140201725A1

    公开(公告)日:2014-07-17

    申请号:US13741047

    申请日:2013-01-14

    Applicant: VMWARE, INC.

    Abstract: In one embodiment, a computer system creates a first template VM that includes a first OS VMDK and a first software binary VMDK, and clones the first template VM to create a linked clone VM. The linked clone VM executes a guest OS by accessing the first OS VMDK and a software application by accessing the first software binary VMDK. The computer system further creates a second template VM that includes a second software binary VMDK, where the second software binary VMDK includes one or more upgrades to the software application that are not included in the first software binary VMDK. The computer system then detaches the first software binary VMDK from the linked clone VM and attaches the second software binary VMDK to the linked clone VM. The linked clone VM thereafter executes the software application by accessing the second software binary VMDK.

    Abstract translation: 在一个实施例中,计算机系统创建包括第一OS VMDK和第一软件二进制VMDK的第一模板VM,并克隆第一模板VM以创建链接的克隆VM。 链接克隆VM通过访问第一软件二进制VMDK来访问第一OS VMDK和软件应用程序来执行客户操作系统。 计算机系统还创建包括第二软件二进制VMDK的第二模板VM,其中第二软件二进制VMDK包括不包括在第一软件二进制VMDK中的软件应用程序的一个或多个升级。 然后,计算机系统从链接的克隆VM中分离第一软件二进制VMDK,并将第二软件二进制VMDK附加到链接的克隆VM。 然后,链接克隆VM通过访问第二软件二进制VMDK来执行软件应用。

Patent Agency Ranking