-
公开(公告)号:US11733901B1
公开(公告)日:2023-08-22
申请号:US17146025
申请日:2021-01-11
Applicant: PURE STORAGE, INC.
Inventor: Emily Potyraj , Joshua Robinson , Brian Carpenter
CPC classification number: G06F3/0647 , G06F3/061 , G06F3/0604 , G06F3/067
Abstract: Providing persistent storage to transient cloud computing services, including: creating a cloud computing instance, wherein the cloud computing instance is created on on-premises cloud infrastructure; and storing, in non-volatile storage in a storage system that is communicatively coupled to the on-premises cloud infrastructure, data associated with the cloud computing instance.
-
公开(公告)号:US12229428B2
公开(公告)日:2025-02-18
申请号:US18447276
申请日:2023-08-09
Applicant: PURE STORAGE, INC.
Inventor: Emily Potyraj , Joshua Robinson , Brian Carpenter
Abstract: Providing persistent storage to transient cloud computing services, including: creating a cloud computing instance, wherein the cloud computing instance is created on on-premises cloud infrastructure; and storing, in non-volatile storage in a storage system that is communicatively coupled to the on-premises cloud infrastructure, data associated with the cloud computing instance.
-
3.
公开(公告)号:US20250165596A1
公开(公告)日:2025-05-22
申请号:US19029396
申请日:2025-01-17
Applicant: Pure Storage, Inc.
Inventor: Andrew Kutner , Ronald Karr , Andrew Miller , Patrick D. Lee , David Huskisson , Brian Carpenter , Cynthia Dote
Abstract: A data protection system may perform a process including accessing a first compressibility metric indicating an amount of storage space saved if write traffic processed by a storage system is compressed and a second compressibility metric indicating an amount of storage space saved if write traffic processed by an additional storage system is compressed, the additional storage system configured to replicate data stored by the storage system; determining, based on the first and second compressibility metrics, that the storage system is possibly being targeted by a security threat that causes a potential data corruption; and determining a corruption-free recovery point for potential use by the storage system to recover from the potential data corruption.
-
公开(公告)号:US20210216628A1
公开(公告)日:2021-07-15
申请号:US16917030
申请日:2020-06-30
Applicant: Pure Storage, Inc.
Inventor: Andrew Kutner , Ronald Karr , Andrew Miller , Patrick D. Lee , David Huskisson , Brian Carpenter
Abstract: An illustrative method includes a data protection system directing a storage system to generate recovery datasets over time in accordance with a data protection parameter set, the recovery datasets usable to restore data maintained by the storage system to a state corresponding to a selectable point in time, determining that the storage system is possibly being targeted by a security threat, and modifying, in response to the determining that the storage system is possibly being targeted by the security threat, the data protection parameter set for one or more of the recovery datasets.
-
公开(公告)号:US12235954B2
公开(公告)日:2025-02-25
申请号:US18438922
申请日:2024-02-12
Applicant: Pure Storage, Inc.
Inventor: Andrew Kutner , Ronald Karr , Andrew Miller , Patrick D. Lee , David Huskisson , Brian Carpenter , Cynthia Dote
Abstract: A method includes a data protection system determining, based on a first security threat detection process, that a storage system is possibly being targeted by a security threat; performing, based on the determining that the storage system is possibly being targeted by the security threat, a first remedial action with respect to the storage system, the first remedial action comprising generating a snapshot of data stored by the storage system; confirming, based on a second security threat detection process, whether the storage system is possibly being targeted by the security threat; and performing, based on the confirming whether the storage system is possibly being targeted by the security threat, a second remedial action with respect to the storage system, the second remedial action comprising specifying a retention duration with respect to the snapshot.
-
公开(公告)号:US20240184886A1
公开(公告)日:2024-06-06
申请号:US18438922
申请日:2024-02-12
Applicant: Pure Storage, Inc.
Inventor: Andrew Kutner , Ronald Karr , Andrew Miller , Patrick D. Lee , David Huskisson , Brian Carpenter , Cynthia Dote
CPC classification number: G06F21/554 , G06F3/0619 , G06F3/0647 , G06F3/0673 , G06F2221/034
Abstract: A method includes a data protection system determining, based on a first security threat detection process, that a storage system is possibly being targeted by a security threat; performing, based on the determining that the storage system is possibly being targeted by the security threat, a first remedial action with respect to the storage system, the first remedial action comprising generating a snapshot of data stored by the storage system; confirming, based on a second security threat detection process, whether the storage system is possibly being targeted by the security threat; and performing, based on the confirming whether the storage system is possibly being targeted by the security threat, a second remedial action with respect to the storage system, the second remedial action comprising specifying a retention duration with respect to the snapshot.
-
公开(公告)号:US11941116B2
公开(公告)日:2024-03-26
申请号:US18141545
申请日:2023-05-01
Applicant: Pure Storage, Inc.
Inventor: Andrew Kutner , Ronald Karr , Andrew Miller , Patrick D. Lee , David Huskisson , Brian Carpenter , Cynthia Dote
CPC classification number: G06F21/554 , G06F3/0619 , G06F3/0647 , G06F3/0673 , G06F2221/034
Abstract: An illustrative method includes determining that a total amount of read traffic and write traffic processed by a storage system during a time period exceeds a threshold; determining a first compressibility metric associated with the write traffic; determining a second compressibility metric associated with the read traffic; determining, based on a comparison of the first compressibility metric with the second compressibility metric, that the write traffic is less compressible than the read traffic; determining, based on the total amount of read traffic and write traffic exceeding the threshold and on the write traffic being less compressible than the read traffic, that the storage system is possibly being targeted by a security threat; and modifying, in response to the determining that the storage system is possibly being targeted by the security threat, a data protection parameter set for one or more recovery datasets generated by the storage system.
-
公开(公告)号:US20230409706A1
公开(公告)日:2023-12-21
申请号:US18141545
申请日:2023-05-01
Applicant: Pure Storage, Inc.
Inventor: Andrew Kutner , Ronald Karr , Andrew Miller , Patrick D. Lee , David Huskisson , Brian Carpenter , Cynthia Dote
CPC classification number: G06F21/554 , G06F3/0619 , G06F2221/034 , G06F3/0647 , G06F3/0673
Abstract: An illustrative method includes determining that a total amount of read traffic and write traffic processed by a storage system during a time period exceeds a threshold; determining a first compressibility metric associated with the write traffic; determining a second compressibility metric associated with the read traffic; determining, based on a comparison of the first compressibility metric with the second compressibility metric, that the write traffic is less compressible than the read traffic; determining, based on the total amount of read traffic and write traffic exceeding the threshold and on the write traffic being less compressible than the read traffic, that the storage system is possibly being targeted by a security threat; and modifying, in response to the determining that the storage system is possibly being targeted by the security threat, a data protection parameter set for one or more recovery datasets generated by the storage system.
-
公开(公告)号:US11675898B2
公开(公告)日:2023-06-13
申请号:US16917030
申请日:2020-06-30
Applicant: Pure Storage, Inc.
Inventor: Andrew Kutner , Ronald Karr , Andrew Miller , Patrick D. Lee , David Huskisson , Brian Carpenter
CPC classification number: G06F21/554 , G06F3/0619 , G06F3/0647 , G06F3/0673 , G06F2221/034
Abstract: An illustrative method includes a data protection system directing a storage system to generate recovery datasets over time in accordance with a data protection parameter set, the recovery datasets usable to restore data maintained by the storage system to a state corresponding to a selectable point in time, determining that the storage system is possibly being targeted by a security threat, and modifying, in response to the determining that the storage system is possibly being targeted by the security threat, the data protection parameter set for one or more of the recovery datasets.
-
-
-
-
-
-
-
-