SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS PROVIDING SPARSE SNAPSHOTS
    1.
    发明申请
    SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS PROVIDING SPARSE SNAPSHOTS 审中-公开
    提供SPARSE SNAPSHOTS的系统,方法和计算机程序产品

    公开(公告)号:WO2013096628A1

    公开(公告)日:2013-06-27

    申请号:PCT/US2012/070962

    申请日:2012-12-20

    CPC classification number: G06F17/30088 G06F11/1435 G06F11/1451 G06F2201/84

    Abstract: A method performed in a computer-based storage system includes creating a copy of an active file system at a first point in time, where the active file system includes user data, metadata describing a structure of the active file system and the user data, and a first data structure describing storage locations of the user data and the metadata, in which creating a copy of the active file system includes selectively omitting a portion of the user data and a portion of the metadata from the copy.

    Abstract translation: 在基于计算机的存储系统中执行的方法包括在第一时间点创建活动文件系统的副本,其中活动文件系统包括用户数据,描述活动文件系统的结构的元数据和用户数据,以及 描述用户数据和元数据的存储位置的第一数据结构,其中创建活动文件系统的副本包括从副本中选择性地省略用户数据的一部分和元数据的一部分。

    DEDUPLICATION IN AN EXTENT-BASED ARCHITECTURE
    2.
    发明申请
    DEDUPLICATION IN AN EXTENT-BASED ARCHITECTURE 审中-公开
    在基于结构的架构中的分类

    公开(公告)号:WO2012177318A1

    公开(公告)日:2012-12-27

    申请号:PCT/US2012/034788

    申请日:2012-04-24

    CPC classification number: G06F17/30156 G06F3/0608 G06F3/0641

    Abstract: A request is received to remove duplicate data. A log data container associated with a storage volume in a storage server is accessed. The log data container includes a plurality of entries. Each entry is identified by an extent identifier in a data structures stored in a volume associated with the storage server. For each entry in the log data container, a determination is made if the entry matches another entry in the log data container. If the entry matches another entry in the log data container, a determination is made of a donor extent and a recipient extent. If an external reference count associated with the recipient extent equals a first predetermined value, block sharing is performed for the donor extent and the recipient extent. A determination is made if the reference count of the donor extent equals a second predetermined value. If the reference count of the donor extent equals the second predetermined value, the donor extent is freed.

    Abstract translation: 收到请求以删除重复的数据。 访问与存储服务器中的存储卷相关联的日志数据容器。 日志数据容器包括多个条目。 每个条目由存储在与存储服务器相关联的卷中的数据结构中的盘区标识符标识。 对于日志数据容器中的每个条目,确定条目是否匹配日志数据容器中的另一个条目。 如果条目与日志数据容器中的另一个条目匹配,则确定捐赠者范围和受众范围。 如果与接收者范围相关联的外部参考计数等于第一预定值,则对捐赠者范围和接受者范围执行块共享。 如果供体范围的参考计数等于第二预定值,则确定。 如果供体范围的参考计数等于第二预定值,则供体范围被释放。

    DISCARDING SENSITIVE DATA FROM PERSISTENT POINT-IN-TIME IMAGE
    3.
    发明申请
    DISCARDING SENSITIVE DATA FROM PERSISTENT POINT-IN-TIME IMAGE 审中-公开
    从持续时间图像中删除敏感数据

    公开(公告)号:WO2009134930A2

    公开(公告)日:2009-11-05

    申请号:PCT/US2009/042173

    申请日:2009-04-29

    CPC classification number: G06F21/6218 G06F21/62 G06F2221/2107

    Abstract: A network storage server implements a method to discard sensitive data from a Persistent Point-In-Time Image (PPI). The server first efficiently identifies a dataset containing the sensitive data from a plurality of datasets managed by the PPI. Each of the plurality of datasets is read-only and encrypted with a first encryption key. The server then decrypts each of the plurality of datasets, except the dataset containing the sensitive data, with the first encryption key. The decrypted datasets are re-encrypted with a second encryption key, and copied to a storage structure. Afterward, the first encryption key is shredded.

    Abstract translation: 网络存储服务器实现从持续时间点映像(PPI)中丢弃敏感数据的方法。 服务器首先从PPI管理的多个数据集中有效地识别包含敏感数据的数据集。 多个数据集中的每个数据集是只读的并且用第一加密密钥加密。 服务器然后使用第一加密密钥对包含敏感数据的数据集之外的多个数据集中的每一个进行解密。 解密的数据集用第二加密密钥重新加密,并复制到存储结构。 之后,第一个加密密钥被打碎。

    COMPOSITE AGGREGATE ARCHITECTURE
    5.
    发明申请

    公开(公告)号:WO2018175144A1

    公开(公告)日:2018-09-27

    申请号:PCT/US2018/022140

    申请日:2018-03-13

    Applicant: NETAPP, INC.

    Abstract: Techniques are provided for providing a storage abstraction layer for a composite aggregate architecture. A storage abstraction layer is utilized as an indirection layer between a file system and a storage environment. The storage abstraction layer obtains characteristic of a plurality of storage providers that provide access to heterogeneous types of storage of the storage environment (e.g., solid state storage, high availability storage, object storage, hard disk drive storage, etc.). The storage abstraction layer generates storage bins to manage storage of each storage provider. The storage abstraction layer generates a storage aggregate from the heterogeneous types of storage as a single storage container. The storage aggregate is exposed to the file system as the single storage container that abstracts away from the file system the management and physical storage details of data of the storage aggregate.

    NETWORK STORAGE SERVER WITH INTEGRATED ENCRYPTION, COMPRESSION AND DEDUPLICATION CAPABILITY
    6.
    发明申请
    NETWORK STORAGE SERVER WITH INTEGRATED ENCRYPTION, COMPRESSION AND DEDUPLICATION CAPABILITY 审中-公开
    具有集成加密,压缩和重复能力的网络存储服务器

    公开(公告)号:WO2009132144A2

    公开(公告)日:2009-10-29

    申请号:PCT/US2009/041457

    申请日:2009-04-22

    Abstract: A network storage server receives multiple write requests from a set of clients via a network and internally buffers multiple data blocks written by the write requests. At a consistency point, the storage server commits the data blocks to a nonvolatile mass storage facility. The consistency point process includes using a storage operating system in the network storage server to compress the data blocks, encrypt selected data blocks, and store the compressed and (possibly) encrypted data blocks in the nonvolatile mass storage facility. Data blocks can also be fingerprinted in parallel with compression and/or encryption, to facilitate subsequent deduplication. Data blocks can be indexed and classified according to content or attributes of the data. Encryption can be applied at different levels of logical container granularity, where a separate, unique cryptographic key is used for each encrypted data container.

    Abstract translation: 网络存储服务器通过网络从一组客户端接收多个写入请求,并且内部缓冲由写入请求写入的多个数据块。 在一致性点,存储服务器将数据块提交到非易失性大容量存储设备。 一致性处理包括使用网络存储服务器中的存储操作系统来压缩数据块,加密所选择的数据块,并将压缩和(可能)加密的数据块存储在非挥发性大容量存储设施中。 数据块也可以与压缩和/或加密并行进行指纹化,以便于后续重复数据删除。 数据块可以根据数据的内容或属性进行索引和分类。 加密可以在不同级别的逻辑容器粒度上应用,其中对于每个加密的数据容器使用单独的唯一加密密钥。

    DEDUPLICATION IN AN EXTENT-BASED ARCHITECTURE
    7.
    发明公开
    DEDUPLICATION IN AN EXTENT-BASED ARCHITECTURE 审中-公开
    重复数据删除的作用域体系结构

    公开(公告)号:EP2724225A1

    公开(公告)日:2014-04-30

    申请号:EP12721631.5

    申请日:2012-04-24

    Applicant: NetApp, Inc.

    CPC classification number: G06F17/30156 G06F3/0608 G06F3/0641

    Abstract: A request is received to remove duplicate data. A log data container associated with a storage volume in a storage server is accessed. The log data container includes a plurality of entries. Each entry is identified by an extent identifier in a data structures stored in a volume associated with the storage server. For each entry in the log data container, a determination is made if the entry matches another entry in the log data container. If the entry matches another entry in the log data container, a determination is made of a donor extent and a recipient extent. If an external reference count associated with the recipient extent equals a first predetermined value, block sharing is performed for the donor extent and the recipient extent. A determination is made if the reference count of the donor extent equals a second predetermined value. If the reference count of the donor extent equals the second predetermined value, the donor extent is freed.

    PERSISTENT MEMORY ARCHITECTURE
    8.
    发明申请

    公开(公告)号:WO2021216491A1

    公开(公告)日:2021-10-28

    申请号:PCT/US2021/028070

    申请日:2021-04-20

    Applicant: NETAPP, INC.

    Abstract: Techniques are provided for implementing a persistent memory storage tier to manage persistent memory of a node. The persistent memory is managed by the persistent memory storage tier at a higher level within a storage operating system storage stack than a level at which a storage file system of the node is managed. The persistent memory storage tier intercepts an operation targeting the storage file system. The persistent memory storage tier retargets the operation from targeting the storage file system to targeting the persistent memory. The operation is transmitted to the persistent memory.

    IN-LINE CONTENT BASED SECURITY FOR DATA AT REST IN A NETWORK STORAGE SYSTEM
    9.
    发明申请
    IN-LINE CONTENT BASED SECURITY FOR DATA AT REST IN A NETWORK STORAGE SYSTEM 审中-公开
    在网络存储系统中基于在线内容的数据保护

    公开(公告)号:WO2009134662A2

    公开(公告)日:2009-11-05

    申请号:PCT/US2009/041459

    申请日:2009-04-22

    CPC classification number: G06F21/6218

    Abstract: A network storage server receives multiple write requests from a set of clients via a network and internally buffers multiple data blocks written by the write requests. At a consistency point, the storage server commits the data blocks to a nonvolatile mass storage facility. The consistency point process includes using a storage operating system in the network storage server to compress the data blocks, encrypt selected data blocks, and store the compressed and (possibly) encrypted data blocks in the nonvolatile mass storage facility. Data blocks can also be fingerprinted in parallel with compression and/or encryption, to facilitate subsequent deduplication. Data blocks can be indexed and classified according to content or attributes of the data. Encryption can be applied at different levels of logical container granularity, where a separate, unique cryptographic key is used for each encrypted logical container.

    Abstract translation: 网络存储服务器通过网络从一组客户端接收多个写入请求,并且内部缓冲由写入请求写入的多个数据块。 在一致性点,存储服务器将数据块提交到非易失性大容量存储设备。 一致性处理包括使用网络存储服务器中的存储操作系统来压缩数据块,加密所选择的数据块,并将压缩和(可能)加密的数据块存储在非挥发性大容量存储设施中。 数据块也可以与压缩和/或加密并行进行指纹化,以便于后续重复数据删除。 数据块可以根据数据的内容或属性进行索引和分类。 加密可以应用于逻辑容器粒度的不同级别,其中每个加密的逻辑容器使用单独的唯一密码密钥。

Patent Agency Ranking