-
公开(公告)号:US10270760B2
公开(公告)日:2019-04-23
申请号:US15725577
申请日:2017-10-05
Applicant: Microsoft Technology Licensing, LLC
Inventor: Sai Sudhir Anantha Padmanaban , Lokesh Srinivas Koppolu , Andrea D'Amato , Yi Zeng
Abstract: Services from domainless machines are made available in a security domain under a virtual name. Each machine is not joined to the domain but can reach a security domain controller. The controller controls at least one security domain using an authentication protocol, such as a modified Kerberos protocol. One obtains a set of security domain credentials, generates a cluster name secret, gives the cluster a virtual name, and authenticates the machines to the domain controller using these items. In some cases, authentication uses a ticket-based protocol which accepts the cluster name secret in place of a proof of valid security domain membership. In some, the domain controller uses a directory service which is compatible with an active directory service; the cluster virtual name is provisioned as an account in the directory service. The cluster virtual name may concurrently serve clients on different security domains of the directory service.
-
公开(公告)号:US09813413B2
公开(公告)日:2017-11-07
申请号:US14859313
申请日:2015-09-20
Applicant: Microsoft Technology Licensing, LLC
Inventor: Sai Sudhir Anantha Padmanaban , Lokesh Srinivas Koppolu , Andrea D'Amato , Yi Zeng
CPC classification number: H04L63/083 , G06F2221/2145 , H04L61/1511 , H04L63/0807 , H04L63/0815 , H04L67/10 , H04L69/40
Abstract: Services from domainless machines are made available in a security domain under a virtual name. Each machine is not joined to the domain but can reach a security domain controller. The controller controls at least one security domain using an authentication protocol, such as a modified Kerberos protocol. One obtains a set of security domain credentials, generates a cluster name secret, gives the cluster a virtual name, and authenticates the machines to the domain controller using these items. In some cases, authentication uses a ticket-based protocol which accepts the cluster name secret in place of a proof of valid security domain membership. In some, the domain controller uses a directory service which is compatible with an active directory service; the cluster virtual name is provisioned as an account in the directory service. The cluster virtual name may concurrently serve clients on different security domains of the directory service.
-
公开(公告)号:US20170228184A1
公开(公告)日:2017-08-10
申请号:US15581392
申请日:2017-04-28
Applicant: Microsoft Technology Licensing, LLC
Inventor: Vyacheslav Kuznetsov , Vinod R. Shankar , Andrea D'Amato , David Allen Dion
CPC classification number: G06F3/0622 , G06F3/0632 , G06F3/0637 , G06F3/067 , G06F21/78 , H04L63/083 , H04L63/10 , H04L67/1097
Abstract: Embodiments provide a method and system for enabling access to a storage device. Specifically, a node may request admittance to a cluster that has read and write access to a storage device. The node seeking access to the storage device must be first be approved by other nodes in the cluster. As part of the request, the node seeking access to the storage device sends a registration key to a storage device. Upon expiration of a registration timer, the node seeking access to the storage device receives a registration table from the storage device and determines whether its registration key is stored in the registration table. If the registration key is stored in the registration table the node has been accepted in the cluster and as a result, has been granted read and write access to the storage device.
-
公开(公告)号:US20170177427A1
公开(公告)日:2017-06-22
申请号:US14974910
申请日:2015-12-18
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Andrea D'Amato , Vyacheslav Kuznetsov , Vinod Shankar , Karan Mehra
IPC: G06F11/07
CPC classification number: G06F11/079 , G06F11/0727 , G06F11/0754 , G06F11/0793 , G06F11/1088
Abstract: Recovery requests are scheduled and prioritized according to priority valuations of the minimum time to next failure relative to the minimum time to next recovery for corresponding storage data sets. The prioritization can be performed by an upper layer recovery scheduler that dispatches requests to different storage units and/or by lower layers and individual storage unit schedulers. Prioritizations can be reflected in tagging on recovery requests, as determined by a first entity, and/or determined dynamically at the point of dispatch and processing.
-
公开(公告)号:US11599381B2
公开(公告)日:2023-03-07
申请号:US17444031
申请日:2021-07-29
Applicant: Microsoft Technology Licensing, LLC
Inventor: Krishnakumar Ravi , Gautam Gopinadhan , Piyush Kasliwal , Vaishnavi Ashok Bhorkar , Chinmay Nalin Joshi , Andrew Thaddeus Mason , Andrea D'Amato
Abstract: Examples are disclosed that relate to processing files between a local network and a cloud computing service. One example provides a computing device configured to be located between a local network and a cloud computing service, comprising a logic machine and a storage machine comprising instructions executable to receive, from a device within the local network, a file at a local share of the computing device, and in response to receiving the file, generate a file event indicating receipt of the file at the local share and provide the file event to a virtual machine executing on the computing device. The instructions are further executable to, based upon a property of the file, provide the file to a program operating within a container in the virtual machine to process the file, and send a result of executing the program on the file to the cloud computing service.
-
16.
公开(公告)号:US11157462B2
公开(公告)日:2021-10-26
申请号:US16533602
申请日:2019-08-06
Applicant: Microsoft Technology Licensing, LLC
Inventor: Richard Paul Testardi , Andrea D'Amato , Devidas Joshi , Mohit Kumar Garg , Sebastien Charles , Gautam Gopinadhan , Stephen Wade Wolfe , John Renaud , Ernie Pistor
IPC: G06F16/188 , G06F16/174 , G06F3/06
Abstract: Transportable storage devices are communicatively coupled behind one or more dedicated “edge” data servers to take advantage of the benefits of the data servers and transportable storage devices while limiting their disadvantages. Each edge data server ingests data from one or more client devices and copies the data to one or more of the transportable storage devices for eventual transport to a cloud data center for upload to a cloud storage system. Object identifiers of objects stored on the transportable storage devices are maintained in a namespace of the data servers after decoupling of the transportable storage devices from the data servers so that the object identifiers remain visible to client devices.
-
公开(公告)号:US11080078B2
公开(公告)日:2021-08-03
申请号:US16240540
申请日:2019-01-04
Applicant: Microsoft Technology Licensing, LLC
Inventor: Krishnakumar Ravi , Gautam Gopinadhan , Piyush Kasliwal , Vaishnavi Ashok Bhorkar , Chinmay Nalin Joshi , Andrew Thaddeus Mason , Andrea D'Amato
Abstract: Examples are disclosed that relate to processing files between a local network and a cloud computing service. One example provides a computing device configured to be located between a local network and a cloud computing service, comprising a logic machine and a storage machine comprising instructions executable to receive, from a device within the local network, a file at a local share of the computing device, and in response to receiving the file, generate a file event indicating receipt of the file at the local share and provide the file event to a virtual machine executing on the computing device. The instructions are further executable to, based upon a property of the file, provide the file to a program operating within a container in the virtual machine to process the file, and send a result of executing the program on the file to the cloud computing service.
-
公开(公告)号:US10990372B2
公开(公告)日:2021-04-27
申请号:US16224480
申请日:2018-12-18
Applicant: Microsoft Technology Licensing, LLC
Inventor: Deepanjyoti Sarkar , Kanika Goyal , Devidas Joshi , Vikas Kumar , Andrea D'Amato , Srikanth Kumar Kovuri Rajaiah , Ravindra Mysore Seetharam
IPC: G06F8/61 , G06F8/65 , G06F9/4401 , G06F9/445 , G06F9/455
Abstract: Examples are disclosed that relate to updating system software of a computing device located at a network edge between a local network and a cloud service. One disclosed example provides a method comprising booting into a system disk image at a boot location, receiving and storing an updated system disk image from a server computing device. The method further comprises changing the boot location from a location of the system disk image to a location of the updated system disk image and booting into the updated system disk image.
-
公开(公告)号:US10686721B2
公开(公告)日:2020-06-16
申请号:US15918525
申请日:2018-03-12
Applicant: Microsoft Technology Licensing, LLC
Inventor: Slava Kuznetsov , Vinod R. Shankar , Andrea D'Amato , Vladimir Petter
IPC: H04L12/911 , H04L12/923 , H04L12/26 , G06F3/06
Abstract: A system is configured to use a de-randomizer and budget data structure to economize I/O operations for a shared storage device while still allowing access to the device to a number of different entities. Embodiments can identify a comparatively low cost next operation as compared to other I/O operations, including a cost for seek time, for a first entity to dispatch to the storage device when the first entity has sufficient budget to have the I/O operation performed on its behalf and to identify an I/O operation for a second entity to dispatch to the storage device when there is insufficient budget for the first entity.
-
公开(公告)号:US09641614B2
公开(公告)日:2017-05-02
申请号:US13904989
申请日:2013-05-29
Applicant: Microsoft Technology Licensing, LLC
Inventor: Vyacheslav Kuznetsov , Vinod R. Shankar , Andrea D'Amato , David Allen Dion
CPC classification number: H04L67/1097 , G06F3/0622 , G06F3/0632 , G06F3/0637 , G06F3/067 , G06F21/78
Abstract: Embodiments provide a method and system for enabling access to a storage device. Specifically, a node may request admittance to a cluster that has read and write access to a storage device. The node seeking access to the storage device must be first be approved by other nodes in the cluster. As part of the request, the node seeking access to the storage device sends a registration key to a storage device. Upon expiration of a registration timer, the node seeking access to the storage device receives a registration table from the storage device and determines whether its registration key is stored in the registration table. If the registration key is stored in the registration table the node has been accepted in the cluster and as a result, has been granted read and write access to the storage device.
-
-
-
-
-
-
-
-
-