会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • Storage Object Distribution System with Dynamic Policy Controls
    • 具有动态策略控制的存储对象分配系统
    • US20140259090A1
    • 2014-09-11
    • US13791254
    • 2013-03-08
    • FUTUREWEI TECHNOLOGIES, INC.
    • Wyllys IngersollJames Hughes
    • H04L29/06
    • H04L63/20H04L63/06
    • System and methods for storage object distribution using dynamic policy controls are provided. An embodiment method of updating a policy on an endpoint node includes receiving, from a key management server, an update to be applied to the policy on the endpoint node, updating, on the endpoint node, the policy without modifying applications on the endpoint node, and enforcing, on the endpoint node, the policy as updated when one of the applications requests an object stored on the endpoint node. In an embodiment, the method further includes storing, at the endpoint node, an object received from the key management server to appear as a file in a file system structure.
    • 提供了使用动态策略控制的存储对象分配的系统和方法。 在端点节点上更新策略的实施例方法包括从密钥管理服务器接收要应用于端点节点上的策略的更新,在端点节点上更新策略而不修改端点节点上的应用, 并且在端点节点上执行在其中一个应用程序请求存储在端点节点上的对象时更新的策略。 在一个实施例中,该方法还包括在端点节点处存储从密钥管理服务器接收的对象,以在文件系统结构中显示为文件。
    • 5. 发明授权
    • System and method for virtual tape library over S3
    • S3虚拟磁带库的系统和方法
    • US09116851B2
    • 2015-08-25
    • US13730504
    • 2012-12-28
    • FutureWei Technologies, Inc.
    • James HughesThai Nguyen
    • G06F12/02G06F11/14G06F17/30
    • G06F11/1456G06F11/1464G06F17/30194G06F2201/815G06F2212/263
    • System and method embodiments are provided herein to enable VTL backup and retrieval over S3 storage technology. An embodiment method includes mapping a plurality of data blocks for VTL storage into a plurality of S3 objects for S3 storage, and storing the S3 objects at one or more locations for S3 storage over one or more networks, wherein the mapping enables stateless backup and restore of the data blocks. An embodiment network component includes a Small Computer System Interface configured to receive a plurality of data blocks form one or more servers, a data library storage including tape storage, disk storage, or both that is configured to store the data blocks, a blocks-to-objects mapping engine configured to map the data blocks into a plurality of S3 objects, and a S3 interface configured to transfer the S3 objects to one or more locations for S3 storage over one or more networks.
    • 本文提供了系统和方法实施例以使得能够通过S3存储技术进行VTL备份和检索。 一种实施方式包括将用于VTL存储的多个数据块映射到用于S3存储的多个S3对象中,并且将S3对象存储在一个或多个位置以用于S3存储在一个或多个网络上,其中该映射使能无状态备份和恢复 的数据块。 一个实施例网络组件包括被配置为从一个或多个服务器接收多个数据块的小型计算机系统接口,包括被配置为存储数据块的磁带存储,磁盘存储或二者的数据库存储,块到 - 对象映射引擎,被配置为将数据块映射到多个S3对象中;以及S3接口,被配置为将S3对象传送到一个或多个位置以用于通过一个或多个网络进行S3存储。
    • 7. 发明授权
    • Fast object fingerprints
    • 快速对象指纹
    • US09223840B2
    • 2015-12-29
    • US13731881
    • 2012-12-31
    • FutureWei Technologies, Inc.
    • John PlocherXitao ZhengJames Hughes
    • G06F17/30
    • G06F17/30557G06F17/3033
    • An embodiment computing device operating in a data storage system includes an object storage controller operable to divide an object into blocks and to create an object hash from hash values, and a network interface in communication with the object storage controller, the network interface operable to transmit the blocks to a storage subsystem that generates one of the hash values from each of the blocks, to receive the hash values from the storage subsystem, and to provide the hash values to the object storage controller for creation of the object hash from the hash values. In an embodiment, the object storage controller is operably coupled to a processor and a memory or stored on a computer readable medium.
    • 在数据存储系统中操作的实施例计算设备包括对象存储控制器,其可操作以将对象划分成块并从散列值创建对象散列,以及与对象存储控制器通信的网络接口,所述网络接口可操作以传送 存储子系统的块,其生成来自每个块的散列值之一,以从存储子系统接收散列值,以及将散列值提供给对象存储控制器以从散列值创建对象散列 。 在一个实施例中,对象存储控制器可操作地耦合到处理器和存储器或存储在计算机可读介质上。
    • 8. 发明申请
    • System and Method for Automatic Integrity Checks in a Key/Value Store
    • 键/值存储中自动完整性检查的系统和方法
    • US20140279946A1
    • 2014-09-18
    • US13797487
    • 2013-03-12
    • FUTUREWEI TECHNOLOGIES, INC.
    • Anthony ScarpinoJames Hughes
    • G06F17/30
    • G06F16/2365
    • System and method embodiments are provided for integrity check and recovery in a key/value store. An embodiment method includes receiving a command to retrieve a data block stored in the key-value store system, the command indicating a key associated with the data block. The method further includes retrieving one or more copies of the stored data block including the key, a value, a data integrity check algorithm, and an integrity value, and performing data integrity check on the retrieved one or more copies of the data block using the data integrity check algorithm, the integrity value, and at least one of the key and the value. Upon one or more copies of the data block failing the data integrity check, the one or more copies of the data block are repaired and the data block is delivered.
    • 系统和方法实施例被提供用于密钥/值存储中的完整性检查和恢复。 一种实施方式包括接收用于检索存储在密钥值存储系统中的数据块的命令,该命令指示与数据块相关联的密钥。 该方法还包括检索包括密钥的存储的数据块的一个或多个副本,值,数据完整性检查算法和完整性值,以及使用所述数据块的所检索的一个或多个副本来执行数据完整性检查 数据完整性检查算法,完整性值以及密钥和值中的至少一个。 在数据块的一个或多个拷贝未能完成数据完整性检查的情况下,数据块的一个或多个副本被修复并且传送数据块。
    • 9. 发明申请
    • System and Method for Content Encryption in a Key/Value Store
    • 密钥/值存储中的内容加密的系统和方法
    • US20140270153A1
    • 2014-09-18
    • US13798746
    • 2013-03-13
    • FUTUREWEI TECHNOLOGIES, INC.
    • Anthony ScarpinoJames Hughes
    • H04L9/06H04L9/28
    • H04L9/0618H04L9/0631H04L9/0637H04L9/0822H04L9/0894H04L63/0435H04L67/1097H04L2463/062
    • System and method embodiments are provided for content encryption in a key/value store. The embodiments include encrypting both the key and value of client data blocks for storage so that the data can be retrieved reliability without compromising the key. An embodiment method includes obtaining a key from a data block comprising the key and a value, encrypting the key using a deterministic encryption algorithm with an encryption key to map the key to a cypher text in a one-to-one mapping, and encrypting the value using a second encryption algorithm to randomly map the value to a second cypher text. Encrypting both the key and the value provides more protection to the client data instead of encrypting only the value and leaving the key vulnerable without encryption. The encrypted key can also be protected from unauthorized access and from the owner of the database or the storage system.
    • 为密钥/值存储中的内容加密提供了系统和方法实施例。 这些实施例包括加密用于存储的客户端数据块的密钥和值,使得可以在不损害密钥的情况下检索数据的可靠性。 一种实施方式包括从包括密钥的数据块和值获取密钥,使用具有加密密钥的确定性加密算法对密钥进行加密,以将密钥映射到一对一映射中的密文文本,并且对 值使用第二加密算法将值随机映射到第二密码文本。 加密密钥和值都为客户端数据提供了更多的保护,而不是仅加密值,并且使密钥在没有加密的情况下使密钥变得脆弱。 还可以保护加密的密钥以防止未经授权的访问和数据库或存储系统的所有者。