EMC Corporation

United States of America

Back to Profile

1-100 of 456 for EMC Corporation and 7 subsidiaries Sort by
Query
Aggregations
IP Type
        Patent 419
        Trademark 37
Jurisdiction
        United States 293
        World 141
        Canada 14
        Europe 8
Owner / Subsidiary
[Owner] EMC Corporation 384
RSA Security LLC 30
VCE Company LLC 22
Mozy, Inc. 7
Virtustream, Inc. 6
See more
Date
2024 4
2023 1
2022 1
2021 11
Before 2021 439
IPC Class
G06F 17/30 - Information retrieval; Database structures therefor 109
G06F 3/06 - Digital input from, or digital output to, record carriers 57
H04L 29/06 - Communication control; Communication processing characterised by a protocol 45
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs 41
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures 37
See more
NICE Class
09 - Scientific and electric apparatus and instruments 32
41 - Education, entertainment, sporting and cultural services 20
42 - Scientific, technological and industrial services, research and design 18
35 - Advertising and business services 11
45 - Legal and security services; personal services for individuals. 9
See more
Status
Pending 2
Registered / In Force 454
  1     2     3     ...     5        Next Page

1.

NWX

      
Application Number 1821538
Status Registered
Filing Date 2024-10-14
Registration Date 2024-10-14
Owner RSA Security LLC (USA)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

Computer hardware; computer network server; computer hardware used in connection with software for collecting, analyzing and monitoring of network traffic for maintenance of network security, enforcement of business policies, rules and procedures and prevention of intellectual property theft or loss, computer-based fraud and crime, and other incidents of network intrusion and misuse.

2.

NETWITNESS NEXT

      
Application Number 1821651
Status Registered
Filing Date 2024-10-14
Registration Date 2024-10-14
Owner RSA Security LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer software used in collection, analysis and monitoring of network traffic for maintenance of network security, enforcement of business policies, rules and procedures and prevention of intellectual property theft or loss, computer-based fraud and crime, and other incidents of network intrusion and misuse. Software as a service for collecting, analyzing and monitoring of network traffic for maintenance of network security, enforcement of business policies, rules and procedures and prevention of intellectual property theft or loss, computer-based fraud and crime, and other incidents of network intrusion and misuse.

3.

MORE SIGNAL. LESS NOISE.

      
Serial Number 98790027
Status Pending
Filing Date 2024-10-08
Owner RSA Security LLC ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Downloadable computer software using artificial intelligence and machine learning for user authentication, and fraud and identity theft detection, reporting, and mitigation; downloadable user authentication, identity theft detection, and fraud detection computer software using behavioral biometrics Business consulting in the fields of fraud, data theft and identity theft Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; Providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; Computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; Computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; Providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; Providing fraud detection services for others, for electronic commerce payment transactions via a global computer network; Providing online non-downloadable software featuring artificial intelligence and machine learning for user authentication, and fraud and identity theft detection, reporting, and mitigation; Providing online non-downloadable user authentication, identity theft detection, and fraud detection software featuring behavioral biometrics; Software as a service (saas) services featuring artificial intelligence and machine learning for user authentication, and fraud and identity theft detection, reporting, and mitigation; Software as a service (saas) services featuring software for user authentication, identity theft detection, and fraud detection using behavioral biometrics Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data

4.

Machine learning models for fraud detection

      
Application Number 17532309
Grant Number 11961084
Status In Force
Filing Date 2021-11-22
First Publication Date 2024-04-16
Grant Date 2024-04-16
Owner RSA Security LLC (USA)
Inventor
  • Lauz, Adam
  • Belogolovski, Anna

Abstract

Machine learning models for fraud detection. The method includes receiving a schedule of weights, the schedule comprising a plurality of entries, each entry comprising a transaction value weight, a transaction volume weight, and a range of intervention rates; testing the at least one machine learning model using a holdout data set, resulting in a ranked transactions data set; and evaluating the performance of the at least one machine learning model by computing the weighted harmonic mean of the ranked transactions data set using the schedule of weights.

IPC Classes  ?

  • G06Q 40/00 - FinanceInsuranceTax strategiesProcessing of corporate or income taxes
  • G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
  • G06N 20/00 - Machine learning
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists

5.

MACHINE LEARNING MODELS FOR FRAUD DETECTION

      
Application Number US2022078949
Publication Number 2023/091853
Status In Force
Filing Date 2022-10-29
Publication Date 2023-05-25
Owner RSA SECURITY LLC (USA)
Inventor
  • Lauz, Adam
  • Belogolovski, Anna

Abstract

Machine learning models for fraud detection. The method includes receiving a schedule of weights, the schedule comprising a plurality of entries, each entry comprising a transaction value weight, a transaction volume weight, and a range of intervention rates; testing the at least one machine learning model using a holdout data set, resulting in a ranked transactions data set; and evaluating the performance of the at least one machine learning model by computing the weighted harmonic mean of the ranked transactions data set using the schedule of weights.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06N 20/00 - Machine learning
  • G06N 3/08 - Learning methods

6.

System and method to enhance phrase search with nested thesaurus parsing

      
Application Number 15197307
Grant Number 11256691
Status In Force
Filing Date 2016-06-29
First Publication Date 2022-02-22
Grant Date 2022-02-22
Owner EMC Corporation (USA)
Inventor
  • Huang, Kunwu
  • Zhang, Lei
  • Chen, Chao
  • Liu, Jingjing
  • Dai, Hongtao
  • Teng, Ying

Abstract

In general, in one aspect, the invention relates to a method for servicing requests. The method includes receiving, from a client system, a request comprising a query, where the query includes a first plurality of terms. The method further includes generating, using a thesaurus library, a related query including a second plurality of terms, where at least one term in the second plurality of terms is present in the first plurality of terms. The method further includes issuing the query to a content repository to obtain a first result, issuing the related query to the content repository to obtain a second result, processing the first result and the second result to generate a final result, and providing the final result to the client system.

IPC Classes  ?

7.

OUTSEER

      
Application Number 018573373
Status Registered
Filing Date 2021-10-07
Registration Date 2022-03-17
Owner RSA Security LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable software; downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting. Educational services; educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; arranging and conducting of conferences; arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention. Providing online, non-downloadable software; Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Computer forensic services; IT consultancy; Computer security consultancy; software as a service [SaaS]; Cloud computing; software as a service (saas) services and cloud computing featuring software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; software as a service (saas) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; software as a service (saas) services and cloud computing featuring software for electronic fraud and identity theft detection and prevention; software as a service (saas) services and cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Authentication services; Authentication services for computer security; Authentication services (control) of data transmitted via telecommunications; providing user authentication services in e-commerce transactions; providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud; IT security, protection and restoration; providing a website with blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention. Providing authentication of personal identification information [identification verification services]; Identification verification services, namely, providing authentication of personal identification information; Consultation in the fields of fraud, data theft and identity theft.

8.

Miscellaneous Design

      
Application Number 018573375
Status Registered
Filing Date 2021-10-07
Registration Date 2022-03-17
Owner RSA Security LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable software; downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting. Educational services; educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; arranging and conducting of conferences; arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention. Providing online, non-downloadable software; Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Computer forensic services; IT consultancy; Computer security consultancy; software as a service [SaaS]; Cloud computing; software as a service (saas) services and cloud computing featuring software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; software as a service (saas) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; software as a service (saas) services and cloud computing featuring software for electronic fraud and identity theft detection and prevention; software as a service (saas) services and cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Authentication services; Authentication services for computer security; Authentication services (control) of data transmitted via telecommunications; providing user authentication services in e-commerce transactions; providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud; IT security, protection and restoration; providing a website with blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention. Providing authentication of personal identification information [identification verification services]; Identification verification services, namely, providing authentication of personal identification information; Consultation in the fields of fraud, data theft and identity theft.

9.

OUTSEER

      
Application Number 213803400
Status Registered
Filing Date 2021-10-06
Registration Date 2025-02-10
Owner RSA Security LLC (a Delaware limited liability company) (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

(1) Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; (1) Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; Providing information in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention via blogs, non-downloadable videos, podcasts and websites via the internet; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; (2) Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; digital forensic investigations in the field of computer crimes; Computer security consultancy; software as a service (saas) services and cloud computing featuring software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; software as a service (saas) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; software as a service (saas) services and cloud computing featuring software for electronic fraud and identity theft detection and prevention; software as a service (saas) services and cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; providing user authentication services in e-commerce transactions; Providing online non-downloadable downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud; (3) Identification verification services, namely, providing authentication of personal identification information; Providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Consultation in the fields of fraud, data theft and identity theft.

10.

O

      
Application Number 213803500
Status Registered
Filing Date 2021-10-06
Registration Date 2025-02-10
Owner RSA Security LLC (a Delaware limited liability company) (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

(1) Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; (1) Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; (2) Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention (3) Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Computer forensic services; Computer security consultancy; software as a service (saas) services and cloud computing featuring software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; software as a service (saas) services and cloud computing featuring software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; software as a service (saas) services and cloud computing featuring software for electronic fraud and identity theft detection and prevention; software as a service (saas) services and cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; providing user authentication services in e-commerce transactions; providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Providing online non-downloadable downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud; (4) Identification verification services, namely, providing authentication of personal identification information; Providing user authentication services in e-commerce transactions; Providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; Consultation in the fields of fraud, data theft and identity theft

11.

Performance improvement recommendations for machine learning models

      
Application Number 16778084
Grant Number 11625626
Status In Force
Filing Date 2020-01-31
First Publication Date 2021-08-05
Grant Date 2023-04-11
Owner RSA Security LLC (USA)
Inventor
  • Zaslavsky, Alex
  • Koganov, Arkady
  • Gendelev, Anatoly

Abstract

Techniques are provided for generating performance improvement recommendations for machine learning models. One method comprises evaluating performance metrics for multiple implementations of a machine learning model; computing a performance score that aggregates the performance metrics for a given machine learning model implementation; and recommending a modification to the given machine learning model implementation based on the performance score by evaluating one or more performance metrics for the given implementation relative to at least one additional performance metric for the given implementation, wherein the recommended modification is based on a performance with the recommended modification for another implementation. A given performance metric may be weighted based on an expected improvement from modifying a factor related to the given performance metric. The recommended modification to the given machine learning model implementation may comprise an indication of the expected improvement for the modification.

IPC Classes  ?

12.

Dynamic challenge question-based authentication

      
Application Number 15883704
Grant Number 11062014
Status In Force
Filing Date 2018-01-30
First Publication Date 2021-07-13
Grant Date 2021-07-13
Owner RSA Security LLC (USA)
Inventor
  • Raman, Haim
  • Vardy, Tamar
  • Peer, Adi
  • Shterenbaum, Aviram
  • Daches, Karin
  • Sorani, Itzik

Abstract

Techniques for generating dynamic challenge questions for use in an authentication process are provided herein. An example computer-implemented method can include outputting a first prompt to a user via a user device interface, wherein the first prompt comprises a first set of information-gathering questions; generating dynamic challenge questions for use in an authentication process, wherein the dynamic challenge questions are generated based on user responses to the first set of information-gathering questions; generating a second prompt in connection with an authentication request, wherein the second prompt is based at least in part on at least one of the dynamic challenge questions; processing a user response to the at least one dynamic challenge question, wherein said processing comprises determining a likelihood that the user response matches an automatically estimated response; and resolving the authentication request based on the processing.

IPC Classes  ?

  • G06F 21/36 - User authentication by graphic or iconic representation
  • G06N 7/02 - Computing arrangements based on specific mathematical models using fuzzy logic

13.

STOP FRAUD, NOT CUSTOMERS

      
Serial Number 90702767
Status Registered
Filing Date 2021-05-11
Registration Date 2023-11-14
Owner RSA Security LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting Business consulting in the fields of fraud, data theft and identity theft Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; Providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; Computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; Computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; Providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; Providing fraud detection services for others, for electronic commerce payment transactions via a global computer network Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data

14.

OUTSEER

      
Serial Number 90690796
Status Registered
Filing Date 2021-05-05
Registration Date 2023-12-26
Owner RSA Security LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting Business consulting in the fields of fraud, data theft and identity theft Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; providing fraud detection services for others, for electronic commerce payment transactions via a global computer network Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data

15.

Miscellaneous Design

      
Serial Number 90690803
Status Registered
Filing Date 2021-05-05
Registration Date 2024-05-28
Owner RSA Security LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting Business consulting in the fields of fraud, data theft and identity theft Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; Providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; Monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; Computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; Computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; Providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data

16.

OUTSEER

      
Serial Number 90632944
Status Registered
Filing Date 2021-04-08
Registration Date 2023-12-26
Owner RSA Security LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Downloadable computer software, namely, software providing risk-based, multi-factor user authentication and fraud detection; downloadable computer software, namely, software for use by financial institutions, debit and credit card issuers and issuing processors for fraud detection and mitigation in electronic transactions; downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; downloadable software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; downloadable software for electronic fraud and identity theft detection and prevention; downloadable software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting Business consulting in the fields of fraud, data theft and identity theft Educational services, namely, conducting conferences in the fields of computer networks, security, information security, electronic security, cyber security, data security, and fraud prevention; providing a website featuring blogs and non-downloadable videos and podcasts in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention; Arranging and conducting business conferences in the fields of computer networks, computer security, information security, electronic security, cyber security, data security, and fraud prevention Providing online non-downloadable software for providing risk-based, multi-factor user authentication and fraud detection; providing online non-downloadable software for use by financial institutions, debit and credit card issuers and issuing processors to detect and mitigate fraud in electronic transactions; Software as a service (saas) services featuring software for electronic fraud and identity theft detection and prevention; Cloud computing featuring software for electronic fraud and identity theft detection and prevention; Software as a service (saas) services featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; User authentication services for electronic transactions; Cloud computing featuring software for real-time internet, mobile and e-commerce fraud detection, protection, management, analytics and reporting; monitoring of electronic payment transactions to detect fraud; Providing online non-downloadable software using artificial intelligence for fraud detection, reporting, and mitigation; computer threat management services for others for protecting data, namely, detecting, monitoring and mitigating electronic threats to computer security, user identity, financial information, and personal information; computer threat management services for others, namely, detecting, monitoring and mitigating potential and confirmed instances of electronic fraud; providing electronic information in the fields of cybercrime and fraud, namely, providing news and technical information regarding emerging and established cybersecurity threats; Computer security services in the nature of performing risk scoring for prevention of fraud, data theft and identity theft; Computer security consulting services in the fields of fraud, data theft and identity theft; Electronic monitoring of personally identifying information to detect identity theft and fraud via the internet; providing fraud detection services for others, for electronic commerce payment transactions via a global computer network Providing electronic information in the fields of cybercrime and fraud, namely, providing crime occurrence data

17.

Handling deletes with distributed erasure coding

      
Application Number 16457615
Grant Number 10938905
Status In Force
Filing Date 2019-06-28
First Publication Date 2021-03-02
Grant Date 2021-03-02
Owner EMC CORPORATION (USA)
Inventor
  • Danilov, Mikhail
  • Buinov, Konstantin

Abstract

Inter-zone network traffic generated during deletion of a data chunk that has been replicated by employing geographically distributed (GEO) erasure coding is reduced. In one aspect, if a data chunk is to be deleted, partial coding chunks are generated by a source zone and provided to destination zones that store complete coding chunks for updating the complete coding chunks based on combining them with the received partial coding chunks. In another aspect, if a first data chunk is to be deleted and a second data chunk is to be replicated, partial coding chunks are generated by the source zone for each data chunk. Further, the partial coding chunks created for different data chunks can be combined to generate transforming chunks, which can then be transferred to the destination zones. The destination zones can then update the complete coding chunks based on combining them with the received transforming chunks.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • H03M 13/25 - Error detection or forward error correction by signal space coding, i.e. adding redundancy in the signal constellation, e.g. Trellis Coded Modulation [TCM]
  • H03M 13/29 - Coding, decoding or code conversion, for error detection or error correctionCoding theory basic assumptionsCoding boundsError probability evaluation methodsChannel modelsSimulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
  • H03M 13/00 - Coding, decoding or code conversion, for error detection or error correctionCoding theory basic assumptionsCoding boundsError probability evaluation methodsChannel modelsSimulation or testing of codes

18.

Combining explicit and implicit feedback in self-learning fraud detection systems

      
Application Number 16539394
Grant Number 11334878
Status In Force
Filing Date 2019-08-13
First Publication Date 2020-01-30
Grant Date 2022-05-17
Owner EMC Corporation (USA)
Inventor
  • Blatt, Marcelo
  • Kaufman, Alon
  • Villa, Yael

Abstract

An improved technique involves including implicit feedback inferred from a fraud analyst's actions into a fraud detection model tuning process. Along these lines, as part of a tuning process, an authentication server sends electronic transactions carrying a certain amount of risk to a case management center in which fraud analysts investigate the electronic transactions to verify whether the transactions are fraudulent or non-fraudulent. In addition to receiving this explicit feedback from the case management center, however, the authentication server also receives implicit feedback indicative of attributes of the fraud analysts themselves. The authentication server then inputs these implicit feedback parameter values into a fraud detection model tuning engine that tunes the fraud detection model.

IPC Classes  ?

  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 20/38 - Payment protocolsDetails thereof

19.

Server selection for optimized malware scan on NAS

      
Application Number 16026906
Grant Number 10862922
Status In Force
Filing Date 2018-07-03
First Publication Date 2020-01-09
Grant Date 2020-12-08
Owner EMC CORPORATION (USA)
Inventor
  • Kumar, Shiv Shankar
  • Gahlot, Jai Prakash
  • Chauhan, Amit Kumar

Abstract

Server selection for optimized malware scanning on network-attached storage systems is provided herein. A data storage system as described herein can include a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can include a load determination component that determines respective available capacities of anti-malware servers based on loading information obtained from the anti-malware servers and a task assignment component that assigns a malware scan task to a selected anti-malware server of the anti-malware servers based on the respective available capacities of the anti-malware servers.

IPC Classes  ?

  • H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

20.

Automated determination of device identifiers for risk-based access control in a computer network

      
Application Number 16024594
Grant Number 10885162
Status In Force
Filing Date 2018-06-29
First Publication Date 2020-01-02
Grant Date 2021-01-05
Owner RSA Security LLC (USA)
Inventor Avital, Aviv

Abstract

A processing device in an illustrative embodiment includes a processor coupled to a memory and is configured to receive user credentials from a user device in conjunction with an access request, to apply one or more automated tests in order to determine one or more device identifiers of the user device, to generate a risk score for the access request based at least in part on the received user credentials and the one or more determined device identifiers, and to grant or deny the access request based at least in part on the risk score.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/31 - User authentication
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

21.

Bloom filter partitioning

      
Application Number 14675476
Grant Number 10503737
Status In Force
Filing Date 2015-03-31
First Publication Date 2019-12-10
Grant Date 2019-12-10
Owner EMC CORPORATION (USA)
Inventor
  • Manville, Thomas
  • Lopez, Julio
  • Javadekar, Shrinand

Abstract

A partitioned Bloom filter is disclosed. In various embodiments, a representation of an item is received. The representation is used to determine a partition with which the item is associated. A partition-specific Bloom filter is used to determine at least in part whether the item may be an element of a set with which the partition is associated.

IPC Classes  ?

22.

Execution path determination in a distributed environment

      
Application Number 13630966
Grant Number 10481918
Status In Force
Filing Date 2012-09-28
First Publication Date 2019-11-19
Grant Date 2019-11-19
Owner EMC Corporation (USA)
Inventor Kumar, Vinod

Abstract

Techniques to determine an execution path in a distributed environment are disclosed. A call to a method or function of a component of the distributed system is received, in connection with a request from a user of the distributed system. A unique correlation identifier that includes data that identifies the component, the request, and the method of function called is generated for the call.

IPC Classes  ?

  • G06F 9/445 - Program loading or initiating
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

23.

Scheduling computational tasks among multiple classes of storage resources based on job classification

      
Application Number 14751721
Grant Number 10430233
Status In Force
Filing Date 2015-06-26
First Publication Date 2019-10-01
Grant Date 2019-10-01
Owner EMC Corporation (USA)
Inventor
  • Bent, John M.
  • Pedone, Jr., James M.
  • Faibish, Sorin
  • Tzelnic, Percy
  • Teymouri, Sasan

Abstract

Techniques are provided for scheduling computational tasks among multiple classes of storage resources based on a job classification. A job to be executed is classified into one of a plurality of predefined job classes. Each predefined job class is associated with a corresponding one of a plurality of predefined storage classes. The job is then assigned based on the classification to one of the storage resources of the predefined storage class associated with the classified predefined job class. Exemplary predefined storage classes include a performance class, a capacity class, a key-value storage class, and a shingled disk drive class. Exemplary predefined job classes include a CPU Intensive job class, an IO Intensive job class and a Small IO job class. Data required for a job is optionally prefetched before the job is assigned to a storage device. Data objects to be evicted from a storage device are optionally selected based on an anticipated future access.

IPC Classes  ?

  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

24.

Aggregate socket resource management

      
Application Number 16367137
Grant Number 10764407
Status In Force
Filing Date 2019-03-27
First Publication Date 2019-09-26
Grant Date 2020-09-01
Owner EMC CORPORATION (USA)
Inventor Gemignani, Jr., John

Abstract

Aggregate socket resource management is presented herein. A system can comprise a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: determining a present aggregate amount of data associated with processing requests from a socket; setting a defined aggregate data limit on the present aggregate amount of data; and in response to determining changes in a difference between the defined aggregate data limit and the present aggregate amount of data, modifying a defined data capacity limit on a data capacity of a receive buffer of the socket. In an example, the determining of the changes in the difference between the defined aggregate data limit and the present aggregate amount of data comprises reducing/increasing the defined data capacity limit in response to the difference being determined to be decreasing/increasing.

IPC Classes  ?

  • H04L 12/835 - Bitrate adaptation in active flows using buffer capacity information at the endpoints or transit nodes
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/801 - Flow control or congestion control
  • H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

25.

Database system and methods for domain-tailored detection of outliers, patterns, and events in data streams

      
Application Number 15080756
Grant Number 10409817
Status In Force
Filing Date 2016-03-25
First Publication Date 2019-09-10
Grant Date 2019-09-10
Owner EMC Corporation (USA)
Inventor
  • Dias, Jonas F.
  • Bruno, Diego Salomone
  • Maximo, André De Almeida
  • Prado, Adriana Bechara
  • Gottin, Vinícius Michel
  • Barros, Monica

Abstract

Methods and apparatus are provided for domain-tailored detection of outliers, patterns, and/or events in data streams. An exemplary method comprises obtaining a domain-dependent definition of (i) data outliers based on predefined outlier criteria; (ii) data patterns based on predefined pattern criteria; and/or (iii) data events based on predefined event criteria; obtaining time series measurement data from a plurality of sensors; determining, substantially simultaneously with the obtaining, whether individual samples satisfy the domain-dependent definitions of the data outliers, data patterns and/or data events; and storing the individual samples with an indication of whether the individual samples satisfy the domain-dependent definitions of the data outliers, data patterns and/or data events. The domain-dependent definitions are optionally specified using a declarative command language. Query are optionally processed comprising one or more declarative statements that reference and/or manipulate the data outliers, data patterns and/or data events.

IPC Classes  ?

  • G06F 16/2455 - Query execution
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

26.

Automatic combination of sub-process simulation results and heterogeneous data sources

      
Application Number 15223472
Grant Number 10387588
Status In Force
Filing Date 2016-07-29
First Publication Date 2019-08-20
Grant Date 2019-08-20
Owner EMC Corporation (USA)
Inventor
  • Gottin, Vinicius Michel
  • Ciarlini, Angelo E. M.
  • Maximo, André De Almeida
  • Prado, Adriana Bechara
  • Da Silveira Junior, Jaumir Valença

Abstract

Methods and apparatus are provided for automatic combination of sub-process simulation results and heterogeneous data sources. An exemplary method comprises obtaining, for a process comprised of a sequence of a plurality of sub-processes, an identification of relevant input and output features for each sub-process; obtaining an execution map for each sub-process, wherein each execution map stores results of an execution of a given sub-process; and, in response to a user query regarding a target feature and a user-provided initial scenario: composing a probability distribution function for the target feature representing a simulation of the process based on a sequence of the execution maps, by matching input features of each execution map with features from the initial scenario or the output of previous execution maps; and processing the probability distribution function to answer the user query. Execution maps are optionally stored as distributed tables that use relevant input features to hash data related to multiple executions across multiple nodes. The composition process optionally occurs in parallel across multiple nodes.

IPC Classes  ?

27.

Accessing rights-managed content from constrained connectivity devices

      
Application Number 11480300
Grant Number 10380568
Status In Force
Filing Date 2006-06-30
First Publication Date 2019-08-13
Grant Date 2019-08-13
Owner EMC Corporation (USA)
Inventor
  • Rogers, Kenneth Allen
  • Hadden, Allen D.
  • Thompson, Peter J.

Abstract

A DRM system is provided wherein when a protected content unit is provided to an access device, the access information associated with the protected content unit is retrieved from the DRM server and provided to the access device in the same transaction in which the protected content unit is provided. Therefore, when the user seeks to access the protected content unit, the access request can be handled locally without the need to rely upon potentially constrained connectivity to the DRM server. The techniques described herein enable an access device to access content protected by a DRM system. When a protected content unit and access information is received at the access device, in one transaction, the protected content unit can be decrypted on the access device using the access information, and/or the access information can be used to enforce a DRM policy associated with the protected content unit.

IPC Classes  ?

  • G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems

28.

Handling deletes with distributed erasure coding

      
Application Number 15862547
Grant Number 10382554
Status In Force
Filing Date 2018-01-04
First Publication Date 2019-08-13
Grant Date 2019-08-13
Owner EMC CORPORATION (USA)
Inventor
  • Danilov, Mikhail
  • Buinov, Konstantin

Abstract

Inter-zone network traffic generated during deletion of a data chunk that has been replicated by employing geographically distributed (GEO) erasure coding is reduced. In one aspect, if a data chunk is to be deleted, partial coding chunks are generated by a source zone and provided to destination zones that store complete coding chunks for updating the complete coding chunks based on combining them with the received partial coding chunks. In another aspect, if a first data chunk is to be deleted and a second data chunk is to be replicated, partial coding chunks are generated by the source zone for each data chunk. Further, the partial coding chunks created for different data chunks can be combined to generate transforming chunks, which can then be transferred to the destination zones. The destination zones can then update the complete coding chunks based on combining them with the received transforming chunks.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • H03M 13/25 - Error detection or forward error correction by signal space coding, i.e. adding redundancy in the signal constellation, e.g. Trellis Coded Modulation [TCM]
  • H03M 13/29 - Coding, decoding or code conversion, for error detection or error correctionCoding theory basic assumptionsCoding boundsError probability evaluation methodsChannel modelsSimulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
  • H03M 13/00 - Coding, decoding or code conversion, for error detection or error correctionCoding theory basic assumptionsCoding boundsError probability evaluation methodsChannel modelsSimulation or testing of codes

29.

Parallel storage system with burst buffer appliance for storage of partitioned key-value store across a plurality of storage tiers

      
Application Number 14143749
Grant Number 10375164
Status In Force
Filing Date 2013-12-30
First Publication Date 2019-08-06
Grant Date 2019-08-06
Owner
  • EMC Corporation (USA)
  • Triad National Security, LLC (USA)
  • UT-Battelle, LLC (USA)
Inventor
  • Bent, John M.
  • Faibish, Sorin
  • Grider, Gary
  • Torres, Aaron
  • Poole, Stephen W.

Abstract

Parallel storage systems are provided with a burst buffer appliance for storage of a partitioned key-value store across a plurality of storage tiers. The burst buffer appliance is configured to store key-value data on first and second storage tiers comprising respective disjoint subsets of storage. One or more servers in the partitioned key-value store provide (i) an interface between one or more local key-value stores and one or more additional storage architectures, and/or (ii) a key value interface that provides access to at least one hardware key-value store. The local key-values are optionally sorted both locally by the local store and globally by the overall MDHIM framework. The local and global sorting can be leveraged to provide batch input/output (IO) operations that aggregate multiple requests into batch operations on one or more sorted ranges.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

30.

Multi-tier data storage using burst buffer appliance for workload transformation based on performance characteristics of at least one tier

      
Application Number 14579351
Grant Number 10359941
Status In Force
Filing Date 2014-12-22
First Publication Date 2019-07-23
Grant Date 2019-07-23
Owner EMC Corporation (USA)
Inventor
  • Bent, John M.
  • Faibish, Sorin
  • Pedone, Jr., James M.
  • Moore, James J.
  • Ting, Dennis P. J.

Abstract

Improved multi-tier storage techniques are provided for storing data, such as checkpoints or other bursty data, in parallel computing environments. A burst buffer appliance is provided for use in a first storage tier of a multi-tier storage system comprising at least the first storage tier and a second storage tier. The exemplary burst buffer appliance comprises a memory for storing data; and at least one processing device to transform at least a portion of the data for storage on the second storage tier based on one or more performance characteristics of the second storage tier. In at least one embodiment, the at least one processing device is further configured to perform at least one function on the at least the portion of the data on behalf of the second storage tier. The performance characteristics of the second storage tier comprise, for example, a stripe size and/or network topology information.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

31.

Methods and apparatus for parallel evaluation of pattern queries over large N-dimensional datasets to identify features of interest

      
Application Number 14672516
Grant Number 10360215
Status In Force
Filing Date 2015-03-30
First Publication Date 2019-07-23
Grant Date 2019-07-23
Owner EMC Corporation (USA)
Inventor
  • Ciarlini, Angelo E. M.
  • Porto, Fabio A. M.
  • Moghadam, Amir H. K.
  • Bias, Jonas F.
  • Pires, Paulo De Figueiredo
  • Perosi, Fabio A.
  • Bordignon, Alex L.
  • Da Cunha Costa, Bruno Carlos
  • Vieira, Wagner Dos Santos

Abstract

Pattern queries are evaluated in parallel over large N-dimensional datasets to identify features of interest. Similarity-based pattern matching tasks are executed over N-dimensional input datasets comprised of numeric values by providing data representations for the N-dimensional input datasets, a pattern query and one or more candidate solutions for the pattern query, such that the pattern query specifies a pattern of an N-dimensional body that is compared to at least one candidate solution corresponding to an N-dimensional body extracted from the N-dimensional input datasets; defining a distance metric that compares the N-dimensional body formed by the candidate solution extracted from the N-dimensional input datasets and the N-dimensional body formed by the pattern query, taking into account one or more of the following criteria: differences between mapped values, differences in scale and differences in shape; and executing, in parallel, a plurality of independent instances of at least one algebraic operator to generate and score the candidate solutions based on the distance metric. The exemplary algebraic operators comprise a Trace Match operator, a Ranking operator, a Candidate Solution operator, and a Query Clustering operator.

IPC Classes  ?

  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/2455 - Query execution
  • G06F 16/22 - IndexingData structures thereforStorage structures

32.

Massively parallel processing (MPP) large-scale combination of time series data

      
Application Number 15078224
Grant Number 10339235
Status In Force
Filing Date 2016-03-23
First Publication Date 2019-07-02
Grant Date 2019-07-02
Owner EMC Corporation (USA)
Inventor
  • Ciarlini, Angelo E. M.
  • Dias, Jonas F.
  • Maximo, André De Almeida
  • Gottin, Vinícius Michel
  • Barros, Monica

Abstract

Methods and apparatus are provided for performing massively parallel processing (MPP) large-scale combinations of time series data. A given working compute node in a distributed computing environment obtains a given group of time series data of a plurality of groups of time series data; generates a measurement matrix for the given group based on a plurality of selected time series and a plurality of time lags of the selected time series; processes the measurement matrix to generate a first linear model with a predefined number of first independent selected variables; assigns a score to each first independent selected variable; and provides the first independent selected variables and assigned scores to a master compute node that ranks the first independent selected variables for all groups from all working computing nodes according to assigned scores; selects a predefined number of second independent selected variables based on a final rank to create a final group of time series; and processes the final group of time series to generate a final linear model.

IPC Classes  ?

  • G06F 17/50 - Computer-aided design
  • G06F 17/18 - Complex mathematical operations for evaluating statistical data

33.

Hiccup management in a storage array

      
Application Number 15079205
Grant Number 10324782
Status In Force
Filing Date 2016-03-24
First Publication Date 2019-06-18
Grant Date 2019-06-18
Owner EMC Corporation (USA)
Inventor
  • Dorfman, Eli
  • Ben-Moshe, Tal
  • Krakov, David
  • Cohen, Noa
  • Farhi, Niko
  • Vainbrand, Roman

Abstract

A hiccup management scheme for use within a storage system can maintain low latency on client I/O when a storage device is temporarily unavailable. In some embodiments, a storage using uses double parity data protection can tolerate concurrent hiccups by up to two storage devices within a storage array.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G11C 29/52 - Protection of memory contentsDetection of errors in memory contents

34.

Partitioned key-value store with one-sided communications for secondary global key lookup by range-knowledgeable clients

      
Application Number 14143758
Grant Number 10313438
Status In Force
Filing Date 2013-12-30
First Publication Date 2019-06-04
Grant Date 2019-06-04
Owner
  • EMC Corporation (USA)
  • Triad National Security, LLC (USA)
  • UT-Battelle, LLC (USA)
Inventor
  • Bent, John M.
  • Faibish, Sorin
  • Grider, Gary
  • Torres, Aaron
  • Poole, Stephen W.

Abstract

Partitioned key-value stores with one-sided communications are provided for secondary global key lookup by range-knowledgeable clients. A secondary global lookups is performed in a partitioned key-value store by receiving a request from an application for a secondary global key; accessing metadata to identify a first server storing the secondary global key; instructing the identified first server to store a first value corresponding to the requested secondary global key into a memory address of the client; and returning program control to the application, wherein the first server identifies a primary key corresponding to the requested secondary global key and instructs a second server storing the corresponding primary key to store a second value corresponding to the primary key into the memory address of the client. The second server stores the second value corresponding to the primary key into the first memory address of the client.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

35.

Integration of heterogenous data using omni-channel ontologies

      
Application Number 15078211
Grant Number 10296913
Status In Force
Filing Date 2016-03-23
First Publication Date 2019-05-21
Grant Date 2019-05-21
Owner EMC Corporation (USA)
Inventor
  • Breitman, Karin
  • Salas, Percy E. Rivera
  • Senra, Rodrigo Dias Arruda

Abstract

Methods and apparatus are provided for integrating heterogeneous multi-channel data using ontologies. An exemplary method for integrating multi-channel heterogeneous data comprises obtaining a domain-specific mediator ontology; identifying a plurality of target channels; identifying entities pertinent to each of the plurality of channels; describing the entities pertinent to each of the plurality of channels using an ontology description language to generate a plurality of channel specific ontologies; aligning the channel specific ontologies with the domain-specific mediator ontology to generate aligned channel specific and domain-specific mediator ontologies; extracting a plurality of user identities from the plurality of channels; aligning the plurality of extracted user identities across the plurality of channels to link common user identities; generating at least one user profile for at least one of the aligned user identities; and correlating at least one user profile with the aligned channel specific and domain-specific mediator ontologies to generate an omni-channel ontology that integrates the multi-channel heterogeneous data.

IPC Classes  ?

36.

Intelligent platform management interface functional fuzzer

      
Application Number 14580612
Grant Number 10289510
Status In Force
Filing Date 2014-12-23
First Publication Date 2019-05-14
Grant Date 2019-05-14
Owner EMC CORPORATION (USA)
Inventor Janeczek, Craig

Abstract

A method for testing communication within a computing platform is provided. The method includes selecting a system-level message configured for device level communication within the computing platform; incorporating false data into a data field of the message; sending the message containing false data to a destination device; and, monitoring behavior of the destination device. A computer program product and a system are described.

IPC Classes  ?

  • G06F 11/30 - Monitoring
  • G06F 11/22 - Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
  • G06F 11/26 - Functional testing

37.

Aggregate socket resource management

      
Application Number 15085442
Grant Number 10284488
Status In Force
Filing Date 2016-03-30
First Publication Date 2019-05-07
Grant Date 2019-05-07
Owner EMC CORPORATION (USA)
Inventor Gemignani, Jr., John

Abstract

Aggregate socket resource management is presented herein. A system can comprise a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: determining a present aggregate amount of data associated with processing requests from a socket; setting a defined aggregate data limit on the present aggregate amount of data; and in response to determining changes in a difference between the defined aggregate data limit and the present aggregate amount of data, modifying a defined data capacity limit on a data capacity of a receive buffer of the socket. In an example, the determining of the changes in the difference between the defined aggregate data limit and the present aggregate amount of data comprises reducing/increasing the defined data capacity limit in response to the difference being determined to be decreasing/increasing.

IPC Classes  ?

  • H04L 12/835 - Bitrate adaptation in active flows using buffer capacity information at the endpoints or transit nodes
  • H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
  • H04L 12/801 - Flow control or congestion control

38.

Defining virtual application templates

      
Application Number 14042219
Grant Number 10264058
Status In Force
Filing Date 2013-09-30
First Publication Date 2019-04-16
Grant Date 2019-04-16
Owner EMC Corporation (USA)
Inventor
  • Lauinger, Todd Michael
  • Jia, Shuping

Abstract

This disclosure relates to a system for defining enterprise applications operating in virtual datacenter. Application templates may be created containing the necessary information for provisioning and securing virtual applications in a tenant's virtual datacenter. The templates may define roles, service accounts, and scripts necessary for the datacenter to operate.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

39.

Global distributed file append using log-structured file system

      
Application Number 13921657
Grant Number 10262000
Status In Force
Filing Date 2013-06-19
First Publication Date 2019-04-16
Grant Date 2019-04-16
Owner EMC Corporation (USA)
Inventor
  • Bent, John M.
  • Faibish, Sorin
  • Grider, Gary
  • Torres, Aaron

Abstract

Techniques are provided for globally appending data from a group of distributed processes to a shared file using a log-structured file system. Data generated by a plurality of processes in a parallel computing system are appended to a shared file by storing the data to the shared file using a log-structured file system (such as a Parallel Log-Structured File System (PLFS)); and generating an index entry for the data, the index entry comprising a logical offset entry and a timestamp entry indicating a time of the storage, wherein the logical offset entry is resolved at read time. The logical offset entry can be populated with an append placeholder that is resolved when the shared file is read. At read time, a plurality of the index entries associated with the shared file can be sorted using the timestamp entry to deliver the requested shared file to a requesting application.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

40.

Method and system for using host driver for flexible allocation fast-sideways data movements

      
Application Number 14231159
Grant Number 10235053
Status In Force
Filing Date 2014-03-31
First Publication Date 2019-03-19
Grant Date 2019-03-19
Owner EMC CORPORATION (USA)
Inventor
  • Derbeko, Philip
  • Marshak, Marik
  • Veprinsky, Alexandr
  • Benhanokh, Zvi Gabriel
  • Don, Arieh

Abstract

Example embodiments of the present invention relate to a method, an apparatus, and a computer program product for directing I/Os for a chunk of data to a data storage system on which the chunk of data is stored. The host method includes receiving an I/O for a chunk of data, identifying to which data storage system the I/O should be sent to access the chunk of data, and sending the I/O for the chunk of data to the identified data storage system. Other example embodiments of the present invention relate to a method, an apparatus, and a computer program product for handling received I/Os during a migration of the chunk of data. The data storage system method includes migrating the chunk of data, queuing an I/O for the chunk of data received from a host during the migration, and rejecting the queued I/O as a result of the migration.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

41.

Methods and apparatus for multiple memory maps and multiple page caches in tiered memory

      
Application Number 15270360
Grant Number 10235291
Status In Force
Filing Date 2016-09-20
First Publication Date 2019-03-19
Grant Date 2019-03-19
Owner EMC Corporation (USA)
Inventor
  • Michaud, Adrian
  • Clark, Roy E.
  • Taylor, Kenneth J.

Abstract

Methods and apparatus for computer systems having first and second memory tier having regions, physical memory having page caches that are shareable with multiple ones of the regions in the first memory tier and the regions in the second memory tier, and virtual memory having mmaps of ones of the regions in the first memory tier and ones of the regions in the second memory tier, wherein the mmaps are associated with multiple ones of the pages caches.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 12/0811 - Multiuser, multiprocessor or multiprocessing cache systems with multilevel cache hierarchies
  • G11C 7/10 - Input/output [I/O] data interface arrangements, e.g. I/O data control circuits, I/O data buffers

42.

Method and system for load balancing using server dormant mode

      
Application Number 13433543
Grant Number 10237341
Status In Force
Filing Date 2012-03-29
First Publication Date 2019-03-19
Grant Date 2019-03-19
Owner EMC Corporation (USA)
Inventor
  • Wei, Shu-Shang Sam
  • Kaushik, Shreyas Satyanand

Abstract

A method for providing load balancing for a server cluster using a server dormant mode. Client devices are allowed to conduct transactions with servers when the servers are active. However, the servers are not allowed to accept new transactions in a dormant mode. Thus, an overloaded server can be placed into the dormant mode until the server is no longer overloaded. Loads will be redistributed among other active servers in the cluster while a server is in the dormant mode.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake

43.

Unified system for connecting a content repository to a file sharing service

      
Application Number 14231194
Grant Number 10223328
Status In Force
Filing Date 2014-03-31
First Publication Date 2019-03-05
Grant Date 2019-03-05
Owner EMC Corporation (USA)
Inventor
  • Wei, Shu-Shang Sam
  • Korshunov, Dmitrii
  • Wong, Linda J.
  • Limonov, Dmitri
  • Wong, Philip D.
  • Zavalkovsky, Katya

Abstract

Techniques to provide access to repository content, via a file sharing service, are disclosed. In various embodiments, a revised content associated with a repository content object, reflecting a modification made to the repository content in the context of a file sharing service to which the repository content object was published in connection with a synchronized share of the repository object, is received. It is determined whether the revised content is to be stored in the repository and, if so, the revised content is stored in the repository.

IPC Classes  ?

44.

Automatic elevation of system security

      
Application Number 16124012
Grant Number 10491406
Status In Force
Filing Date 2018-09-06
First Publication Date 2019-01-03
Grant Date 2019-11-26
Owner EMC Corporation (USA)
Inventor Rao, Raghavendra Anantha

Abstract

A system for automatic setting of system security comprises an input interface and a processor. The input interface is configured to receive an indication to set a secure mode. The processor is configured to: determine whether the indication to set the secure mode comprises an indication to set a certificate mode; in the event that the indication to set the secure mode comprises an indication to set a certificate mode: 1) detect one or more connected systems for which to set the certificate mode; 2) select one or more certificates for the certificate mode; 3) update initialization files for the certificate mode; and 4) reinitialize local and one or more connected systems.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

45.

Reducing database fragmentation

      
Application Number 15844203
Grant Number 10572450
Status In Force
Filing Date 2017-12-15
First Publication Date 2018-12-27
Grant Date 2020-02-25
Owner EMC CORPORATION (USA)
Inventor
  • Manville, Thomas
  • Lopez, Julio

Abstract

Techniques to reduce database fragmentation are disclosed. In various embodiments, an indication is received to store an attribute value for an entity that has a row or other entry in a first database table, wherein the first database table does not have a column for the attribute. It is determined that the value corresponds to a mapped value that is associated with not having an entry in a separate, second database table configured to store the attribute. Entries are made in the second database table only for values of the attribute other than the mapped value. Application level software code is configured to associate absence of a row in the second database table with the mapped value for the attribute.

IPC Classes  ?

46.

Replication data pull

      
Application Number 15085135
Grant Number 10152267
Status In Force
Filing Date 2016-03-30
First Publication Date 2018-12-11
Grant Date 2018-12-11
Owner EMC CORPORATION (USA)
Inventor
  • Ayzenberg, Lev
  • Goldschmidt, Ran
  • Natanzon, Assaf

Abstract

In one embodiment, a method includes intercepting a write command to write to a volume at a production site, saving data from the write command to a cache, sending metadata from the write command to a data protection appliance (DPA), writing the data to the volume, receiving a request for the data in the cache, sending the data from cache to a data protection appliance (DPA) at the production site and sending the data from the DPA to the replication site.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 12/0893 - Caches characterised by their organisation or structure

47.

Using server side font preparation to achieve WYSIWYG and cross platform fidelity on web based word processor

      
Application Number 16002474
Grant Number 10460013
Status In Force
Filing Date 2018-06-07
First Publication Date 2018-12-06
Grant Date 2019-10-29
Owner EMC Corporation (USA)
Inventor Xin, Wang

Abstract

A system and method is illustrated for platform-independent rendering of a document in a web browser supporting a two-dimensional (2D) canvas. The system and method includes obtaining the document, wherein the document includes text characters, text elements, and associated style information including at least one font, determining that font metrics do not exist, and obtaining the font metrics for the at least one font, using the font metrics and the text elements to determine how the document is divided into page criteria, determining a font file does not exist, and obtaining the font file for the at least one font, and rendering the document by drawing glyphs associated with the text characters in the 2D canvas, using the font file and the page criteria, so that the at least one font and the page criteria are platform-independent.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06F 17/21 - Text processing
  • G06F 16/9038 - Presentation of query results
  • G06F 17/22 - Manipulating or registering by use of codes, e.g. in sequence of text characters

48.

Offloaded data protection based on virtual machine snapshots

      
Application Number 15193339
Grant Number 10146471
Status In Force
Filing Date 2016-06-27
First Publication Date 2018-12-04
Grant Date 2018-12-04
Owner EMC CORPORATION (USA)
Inventor
  • Samad, Mohammed Abdul
  • Chopra, Shelesh
  • Mandic, Vladimir

Abstract

Offloaded data protection based on virtual machine snapshots is described. A system identifies a virtual machine associated with a backup application. The system identifies a storage identifier associated with a virtual machine storage management tool and the virtual machine. The system creates a snapshot of the virtual machine and an identifier of the snapshot by prompting a storage array, which is associated with the virtual machine storage management tool, with the storage identifier. The system mounts the snapshot to a proxy server. The system creates a backup based on the snapshot by prompting the backup application with the identifier of the snapshot.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers

49.

Method and system for deciding on ordering of scripting language source code for dependency resolution

      
Application Number 13710030
Grant Number 10146885
Status In Force
Filing Date 2012-12-10
First Publication Date 2018-12-04
Grant Date 2018-12-04
Owner EMC Corporation (USA)
Inventor
  • Totale, Sachin G.
  • Hjortshoj, Julian M.

Abstract

Disclosed are systems and methods for ordering scripting language source code. A request for a first scripting language resource may be received. The first scripting language resource may provide one or more functionalities for a web application. A second scripting language resource may be identified based on dependency information. In some implementations, the dependency information identifies a dependency between the first scripting language resource and the second scripting language resource. A response including the first and second scripting language resources may be generated. In some implementations, the first and second scripting language resources may be ordered based on the dependency information. In various implementations, the response may be capable of being transmitted to a web browser.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

50.

Epoch based snapshot summary

      
Application Number 14675474
Grant Number 10140185
Status In Force
Filing Date 2015-03-31
First Publication Date 2018-11-27
Grant Date 2018-11-27
Owner EMC CORPORATION (USA)
Inventor
  • Lopez, Julio
  • Manville, Thomas

Abstract

Epoch-based management of file system data is disclosed. In various embodiments, for each of a plurality of snapshots, data that associates with the snapshot a corresponding last chunk identifier assigned as of a time at which the snapshot is or was created is stored a in a first data structure. For each of a plurality of chunks of file system data no longer referenced by any live file system object, an epoch identifier associated with an epoch in which the chunk became no longer referenced by any live file system object is stored in a second data structure. A chunk identifier and associated epoch comprising an entry in the second data structure are compared with one or more entries in the first data structure to determine whether a chunk associated with the chunk identifier is associated with a snapshot that continues to be retained.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 17/30 - Information retrieval; Database structures therefor

51.

Memory allocation balancing for storage systems

      
Application Number 15079213
Grant Number 10101934
Status In Force
Filing Date 2016-03-24
First Publication Date 2018-10-16
Grant Date 2018-10-16
Owner EMC Corporation (USA)
Inventor
  • Ben-Moshe, Tal
  • Dorfman, Eli
  • Shoikhet, Kirill
  • Krakov, David
  • Vainbrand, Roman
  • Cohen, Noa

Abstract

Described herein are embodiments of a process that can be used to balance the allocation of primary memory between different types of information. In some embodiments, the memory allocation is balanced dynamically based on observed I/O patterns. Related system embodiments are also described.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 12/06 - Addressing a physical block of locations, e.g. base addressing, module addressing, address space extension, memory dedication

52.

Method of maintaining list of scratch volumes in shared filesystems across multiple nodes

      
Application Number 13538332
Grant Number 10078474
Status In Force
Filing Date 2012-06-29
First Publication Date 2018-09-18
Grant Date 2018-09-18
Owner EMC CORPORATION (USA)
Inventor
  • Goodwin-Jette, Sandra J.
  • Mccloskey, Larry W.

Abstract

In one embodiment, a method of updating a list of available scratchfiles at a node accessing a filesystem includes determining whether the node should update the list of available scratchfiles on the filesystem. If the node should update the list of available scratchfiles of the filesystem, the method updates the list of available scratchfiles on the filesystem. In one embodiment, the method may determine whether the list of available scratchfiles on the filesystem should be updated by determining whether another node is currently updating its scratch list for the filesystem. If it is not, then the method may further determine whether the filesystem has added a scratch volume since a previous update of the list of available scratchfiles at the node.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

53.

System and method of dynamic data object upgrades

      
Application Number 15957802
Grant Number 10747735
Status In Force
Filing Date 2018-04-19
First Publication Date 2018-08-30
Grant Date 2020-08-18
Owner EMC Corporation (USA)
Inventor
  • Van Rotterdam, Jeroen
  • Polman, Mark

Abstract

A method, article of manufacture, and apparatus for managing a cloud computing environment. In some embodiments, this includes modifying an object or a component of an object at runtime and storing the modified object or modified component of an object in a storage device. In some embodiments, components of an object such as data structures are modified. In some embodiments, objects may have more than one version.

IPC Classes  ?

  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 16/23 - Updating
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/957 - Browsing optimisation, e.g. caching or content distillation

54.

Method, apparatus and computer program product for verifying caller identification in voice communications

      
Application Number 15490145
Grant Number 10063699
Status In Force
Filing Date 2017-04-18
First Publication Date 2018-08-28
Grant Date 2018-08-28
Owner RSA SECURITY LLC (USA)
Inventor
  • Raman, Haim
  • Schoenbrun, Yihezkel
  • Roschak, Julia
  • Sorani, Itzkik
  • Vardy, Tamar
  • Peres, Mikael

Abstract

Techniques are disclosed for verifying caller identification in voice communications. In one embodiment, there is disclosed a method comprising receiving a request to establish a voice call between communications devices. The request comprising encrypted information and an identifier identifying a caller associated with the request to establish the voice call. The method further comprises retrieving, in response to receiving the request, a decryption key from an authentication source by requesting from the authentication source the decryption key associated with the identifier. The method further comprises utilizing the decryption key to decrypt the encrypted information and produce decrypted information as well as comparing the decrypted information and the identifier to determine a similarity therebetween. The method further comprises providing, based on the comparison, an indication of whether or not the request is deemed associated with fraud.

IPC Classes  ?

  • H04M 1/00 - Substation equipment, e.g. for use by subscribers
  • H04M 15/00 - Arrangements for metering, time-control or time-indication
  • H04M 3/436 - Arrangements for screening incoming calls
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04M 3/22 - Arrangements for supervision, monitoring or testing

55.

User driven data pre-fetch

      
Application Number 15961634
Grant Number 10891259
Status In Force
Filing Date 2018-04-24
First Publication Date 2018-08-23
Grant Date 2021-01-12
Owner EMC CORPORATION (USA)
Inventor
  • Desai, Rajiv
  • Kamra, Vaibhav

Abstract

Techniques to provide access to file system information are disclosed. In various embodiments, an indication that a user input associated with creating a local copy of a file system object has been received is received at a file system client. The file system client determines that a user-driven pre-fetch option has been set with respect to the file system object. The file system client pre-fetches content data associated with the file system object, based at least in part on the determination that the pre-fetch option has been set with respect to the file system object.

IPC Classes  ?

  • G06F 16/172 - Caching, prefetching or hoarding of files
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 16/182 - Distributed file systems

56.

De-duplicating results of queries of multiple data repositories

      
Application Number 14108706
Grant Number 10055422
Status In Force
Filing Date 2013-12-17
First Publication Date 2018-08-21
Grant Date 2018-08-21
Owner EMC Corporation (USA)
Inventor Addaguduru, Chandra Mouli

Abstract

De-duplicating results of queries of data repositories is described. A system associates each data object of the first set of duplicate data objects stored by multiple data repositories with a first unique duplicate set identifier, and each data object of the second set of duplicate data objects stored by the multiple data repositories with a second unique duplicate set identifier. The system identifies a first data object of the first set of duplicate data objects and a second data object of the first set of duplicate data objects in response to a query. The system determines that the first data object is associated with the first unique duplicate set identifier, and that the second data object is also associated with the first unique duplicate set identifier. The system outputs a query result that includes only the first data object.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

57.

Method and system for connecting a content repository to a file sharing service

      
Application Number 13799075
Grant Number 10055474
Status In Force
Filing Date 2013-03-13
First Publication Date 2018-08-21
Grant Date 2018-08-21
Owner EMC Corporation (USA)
Inventor
  • Wei, Shu-Shang Sam
  • Korshunov, Dmitry Yuryevich
  • Wong, Linda J.
  • Thanikasalam, Vijeswari

Abstract

A method and system for connecting a content repository and file sharing service for sharing and synchronizing content. An application server includes a connector engine and a connector agent. The connector engine with is configured with a plurality of threads and queues designed to listen for changes at either the file sharing service or the repository, to process those changes in parallel, and to coordinate synchronization of uploads to the file sharing service and downloads to the content repository.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06F 17/30 - Information retrieval; Database structures therefor
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

58.

Synchronizing catalogs of virtual machine copies

      
Application Number 15200222
Grant Number 10048890
Status In Force
Filing Date 2016-07-01
First Publication Date 2018-08-14
Grant Date 2018-08-14
Owner EMC CORPORATION (USA)
Inventor
  • Samad, Mohammed Abdul
  • Chopra, Shelesh
  • Mandic, Vladimir

Abstract

Synchronizing catalogs of virtual machine copies is described. A system determines the number of copies of a virtual machine in a catalog associated with a virtual machine storage management tool. The system determines the number of copies of the virtual machine in a catalog associated with a backup application. The system creates a copy of the virtual machine, which is associated with the backup application, if the number of copies of the virtual machine in the catalog associated with the virtual machine storage management tool is greater than zero and if the number of copies of the virtual machine in the catalog associated with the backup application is zero.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

59.

Provisioning virtual applciations from virtual application templates

      
Application Number 14042260
Grant Number 10042657
Status In Force
Filing Date 2013-09-30
First Publication Date 2018-08-07
Grant Date 2018-08-07
Owner EMC Corporation (USA)
Inventor
  • Lauinger, Todd Michael
  • Jia, Shuping

Abstract

A method for provisioning a virtual datacenter application is discussed. A request may be received from a tenant for a virtual datacenter application. An application template may be identified and associated with the virtual datacenter application, wherein the application template can comprise a role, a service account, a script, and a workload. The role and the service account can be added to an active directory organization associated with the tenant. The workload can be cloned into a virtual datacenter, wherein the virtual datacenter belongs to the tenant. A script can be executed on the workload according to an execution order organized over multiple additional workloads, wherein a first script can be executed on a first workload before a second script is executed on a second workload, wherein the first script can be different from the second script, wherein the first workload can be different from the second workload.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

60.

Method and system for tiering data

      
Application Number 15086582
Grant Number 10031675
Status In Force
Filing Date 2016-03-31
First Publication Date 2018-07-24
Grant Date 2018-07-24
Owner EMC Corporation (USA)
Inventor
  • Veprinsky, Alexandr
  • Natanzon, Assaf

Abstract

Example embodiments of the present invention relate to a method, a system, and a computer program product for data storage tiering. The method includes maintaining data in a data storage system having a plurality of tiers, determining a subset of the data stored in a first, more-durable tier should be stored in a second, less-durable tier, and tiering the subset of the data from the first, more-durable tier to the second, less-durable tier.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
  • G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal
  • G06F 3/06 - Digital input from, or digital output to, record carriers

61.

Extent-based tiering for virtual storage using full LUNs

      
Application Number 14144633
Grant Number 10031703
Status In Force
Filing Date 2013-12-31
First Publication Date 2018-07-24
Grant Date 2018-07-24
Owner EMC Corporation (USA)
Inventor
  • Natanzon, Assaf
  • Gal, Yochai
  • Frank, Shahar

Abstract

Example embodiments of the present invention relate a method, a system, and a computer program product for extent-based tiering for virtual storage using full LUNs. The method includes exposing a virtual LUN comprising a first LUN in a first tier of storage having a first latency and a second LUN in a second tier of storage having a second latency and managing the virtual LUN according to properties of the first LUN, properties of the second LUN, and a policy.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

62.

System and method of hierarchical archive management

      
Application Number 13341194
Grant Number 10019462
Status In Force
Filing Date 2011-12-30
First Publication Date 2018-07-10
Grant Date 2018-07-10
Owner EMC CORPORATION (USA)
Inventor Brown, Michael R.

Abstract

A method, article of manufacture, and apparatus for managing a computing environment, such as a cloud data repository. In some embodiments, this includes providing a data archive, and relegating data items to a second, long-term data archive. In some embodiments, data items may be converted to an archive format prior to being relegated.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

63.

Method and system for air contamination analysis for free air cooled data centers

      
Application Number 14231155
Grant Number 09999160
Status In Force
Filing Date 2014-03-31
First Publication Date 2018-06-12
Grant Date 2018-06-12
Owner EMC Corporation (USA)
Inventor
  • Dariavach, Nader G.
  • Liang, Jin
  • French, Francis William
  • Barr, Gordon O.
  • Callahan, Paul T.

Abstract

Example embodiments of the present invention relate to a method, a system, and a computer program product for controlling conditions of an input air stream. The method includes detecting air quality conditions as environmental input variables of an input air stream and determining whether to take corrective action on the air quality conditions of the input air stream according to the environmental input variables. An output variable then may be controlled to affect the air quality conditions of the input air stream.

IPC Classes  ?

  • H05K 5/00 - Casings, cabinets or drawers for electric apparatus
  • H05K 7/20 - Modifications to facilitate cooling, ventilating, or heating
  • F24F 11/00 - Control or safety arrangements

64.

Service to invoke companion applications

      
Application Number 15816847
Grant Number 10348811
Status In Force
Filing Date 2017-11-17
First Publication Date 2018-06-07
Grant Date 2019-07-09
Owner EMC Corporation (USA)
Inventor
  • Smerald, Peter D.
  • Hashemian, Gilda R.
  • Boblett, Howard A.
  • Hardwick, Benjamin W.
  • Branum, Brian H.
  • Odom, Jr., James R.
  • Dang, Phi
  • Somalingam, Dinesh Ramvel

Abstract

A service to invoke a companion application or service is disclosed. In various embodiments, an indication to invoke a companion application is received in the context of a display page of a calling application. A service a call comprising a filtered set of data values derived from the display page is sent to an external service. A request associated with the companion application is received from the external service and used to invoke the companion application.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

65.

User driven data pre-fetch

      
Application Number 14675451
Grant Number 09984088
Status In Force
Filing Date 2015-03-31
First Publication Date 2018-05-29
Grant Date 2018-05-29
Owner EMC CORPORATION (USA)
Inventor
  • Desai, Rajiv
  • Kamra, Vaibhav

Abstract

Techniques to provide access to file system information are disclosed. In various embodiments, an indication that a user input associated with creating a local copy of a file system object has been received is received at a file system client. The file system client determines that a user-driven pre-fetch option has been set with respect to the file system object. The file system client pre-fetches content data associated with the file system object, based at least in part on the determination that the pre-fetch option has been set with respect to the file system object.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

66.

Projecting resource allocation to achieve specific application operation times in a virtually provisioned environment

      
Application Number 14106465
Grant Number 09979669
Status In Force
Filing Date 2013-12-13
First Publication Date 2018-05-22
Grant Date 2018-05-22
Owner EMC Corporation (USA)
Inventor
  • Volchegursky, Dmitry
  • Limonov, Dmitry
  • Shpilyuck, Boris
  • Korshunov, Dmitry Y.
  • Wei, Shu-Shang Sam

Abstract

Projecting resource allocations to achieve specified application operation times in a virtually provisioned environment is described. A system identifies a time period associated with an average of application operation times. The system calculates a resource ratio based on a resource allocated to a number of application operations associated with the time period divided by the number of application operations associated with the time period. The system calculates a projected resource allocation based on a projected number of application operations multiplied by the resource ratio. The system outputs the projected resource allocation to assist in resource management.

IPC Classes  ?

  • H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
  • G06F 9/46 - Multiprogramming arrangements
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

67.

Multi-tier storage environment with burst buffer middleware appliance for batch messaging

      
Application Number 14580546
Grant Number 09940037
Status In Force
Filing Date 2014-12-23
First Publication Date 2018-04-10
Grant Date 2018-04-10
Owner EMC Corporation (USA)
Inventor
  • Bent, John M.
  • Faibish, Sorin
  • Ting, Dennis P. J.
  • Tzelnic, Percy
  • Gupta, Uday

Abstract

A multi-tier storage system is provided that employs a burst buffer middleware appliance for batch messaging. An exemplary multi-tier storage system comprises at least first and second storage tiers comprising storage for storing data; and at least one burst buffer appliance, wherein the at least one burst buffer appliance comprises an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device in at least one of the first and second storage tiers, wherein the at least one persistent storage device provides a list application programming interface, wherein the software interface module provides a batch operation comprised of a plurality of individual operations to the at least one persistent storage device using an aggregated message. The batch operation optionally comprises a batch operation for processing metadata. A burst buffer appliance is also provided for implementing the batch messaging techniques described herein.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers

68.

Method for efficient storage and backup of data via SCSI transport

      
Application Number 14978877
Grant Number 09940293
Status In Force
Filing Date 2015-12-22
First Publication Date 2018-04-10
Grant Date 2018-04-10
Owner EMC CORPORATION (USA)
Inventor
  • Desai, Keyur
  • Chinnam, Shobhan
  • Heyman, Jerrold

Abstract

Systems and methods are disclosed that advertise and expose a SCSI disk device type to a client computer or virtual machine, the disk device type acting as a transport for SCSI commands to/from a storage appliance over a Fiber Channel network. Each SCSI command is transported in one or more Fiber Channel frames. A virtual machine can write data to the storage appliance using through a disk opened with the disk device type. Data written through the disk can be deduplicated and/or compressed before storage on the storage appliance. The SCSI disk device type can support SCSI pass-through mode, virtual RDM, or physical RDM.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 13/42 - Bus transfer protocol, e.g. handshakeSynchronisation

69.

Content-aware storage tiering techniques within a job scheduling system

      
Application Number 14751740
Grant Number 09934147
Status In Force
Filing Date 2015-06-26
First Publication Date 2018-04-03
Grant Date 2018-04-03
Owner EMC Corporation (USA)
Inventor
  • Bent, John M.
  • Faibish, Sorin
  • Ting, Dennis P. J.
  • Tzelnic, Percy
  • Gupta, Uday

Abstract

Techniques are provided for content-aware storage tiering techniques within a job scheduling system. A data node in a job scheduling environment receives at least one job to be executed for a portion of a larger logical file, and notifies one or more sibling data nodes to prefetch one or more related portions of the larger logical file. A write operation performed by an application client to store data on the data node is optionally intercepted at the data node and the associated data is stored in a performance storage tier of the data node. The data is optionally moved from the performance storage tier to a capacity storage tier if one or more predefined eviction criteria are satisfied. Data objects to be evicted are selected based on an anticipated future access of the data objects. The eviction selection is optionally based on grey box knowledge of the application client and/or information obtained from the application client.

IPC Classes  ?

  • G06F 12/08 - Addressing or allocationRelocation in hierarchically structured memory systems, e.g. virtual memory systems
  • G06F 12/0831 - Cache consistency protocols using a bus scheme, e.g. with bus monitoring or watching means
  • G06F 12/0862 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches with prefetch

70.

Security alerting system with dynamic buffer size adaptation

      
Application Number 13922718
Grant Number 09935770
Status In Force
Filing Date 2013-06-20
First Publication Date 2018-04-03
Grant Date 2018-04-03
Owner EMC Corporation (USA)
Inventor
  • Juels, Ari
  • Triandopoulos, Nikolaos
  • Bowers, Kevin D.

Abstract

A Security Alerting System is provided with dynamic buffer size adaptation. An alert message from a Security Alerting System indicating a potential compromise of a protected resource is transmitted by obtaining the alert message from the Security Alerting System; authenticating the alert message using a secret key known by a server, wherein the secret key evolves in a forward-secure manner; storing the authenticated alert message in a buffer, wherein a size of the buffer is based on a connection history of the Security Alerting System; and transmitting the buffer to the server. The alert message can optionally be encrypted. The buffer can be increased in proportion to a duration of a disruption of a connection. The size of the buffer can be increased by adding buffer slots at a location of a current write pointer index. Techniques are also disclosed for detecting truncation attacks and alert message gaps. The alert messages can have a variable size by writing alert message into consecutive buffer slots.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

71.

Composable action flows

      
Application Number 15815617
Grant Number 10459696
Status In Force
Filing Date 2017-11-16
First Publication Date 2018-03-15
Grant Date 2019-10-29
Owner EMC Corporation (USA)
Inventor
  • Ganesan, Ramkumar
  • Totale, Sachin G.
  • Suliman, Marwan
  • Paramala, Venugopal

Abstract

Composable action flows are disclosed. In various embodiments, a definition of one or more processing steps comprising an action flow is received. A definition of one or more transitions between processing steps comprising the action flow is received. The processing step and transition definitions are used to generate programmatically application code to implement the action flow.

IPC Classes  ?

  • G06F 8/30 - Creation or generation of source code
  • G06F 9/451 - Execution arrangements for user interfaces

72.

Storage of bursty data using multiple storage tiers with heterogeneous device storage

      
Application Number 14143728
Grant Number 09916311
Status In Force
Filing Date 2013-12-30
First Publication Date 2018-03-13
Grant Date 2018-03-13
Owner EMC Corporation (USA)
Inventor
  • Bent, John M.
  • Faibish, Sorin
  • Gupta, Uday
  • Tzelnic, Percy

Abstract

Improved techniques are provided for storing bursty data, such as checkpoints, in parallel computing environments. A parallel file system is provided comprising at least first and second storage tiers comprising respective disjoint subsets of storage; and at least one processing device configured to store burst data from a plurality of distributed processes for a given burst operation during the given burst operation on both of the at least first and second storage tiers. The given burst operation comprises a multi-phase input/output (IO) task, such as a checkpoint, having alternating periods of idle time and bursts of write and/or storage activity. A method is also provided for provisioning a parallel file system by obtaining a specification of burst data requirements for the parallel file system and determining an amount of storage required for at least first and second storage tiers comprising respective disjoint subsets of storage to satisfy the burst data requirements.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

73.

Method and system for leveraging secondary storage for primary storage snapshots

      
Application Number 15086577
Grant Number 09910620
Status In Force
Filing Date 2016-03-31
First Publication Date 2018-03-06
Grant Date 2018-03-06
Owner EMC Corporation (USA)
Inventor
  • Veprinsky, Alexandr
  • Natanzon, Assaf

Abstract

Example embodiments of the present invention relate to a method, a system, and a computer program product for leveraging secondary storage for primary storage snapshots. The method includes creating a current first snapshot of a volume at a current first time in a primary storage. The method then may determine differences between the current first snapshot at the current first time and a previous second snapshot created at a previous second time. The differences then may be sent to a secondary storage.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
  • G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal
  • G06F 3/06 - Digital input from, or digital output to, record carriers

74.

Scalable alerter for security information and event management

      
Application Number 13930074
Grant Number 09910874
Status In Force
Filing Date 2013-06-28
First Publication Date 2018-03-06
Grant Date 2018-03-06
Owner EMC Corporation (USA)
Inventor
  • Jamail, John M.
  • Reich, Daniel B.
  • Stoecker, Paul W.

Abstract

A methodology and related system operable to store a plurality of complex event processing (CEP) rules, the CEP rules being based on a plurality of events that are to be monitored. The CEP rules are pre-processed by, e.g., generating and storing a de-duplicated list of events from the plurality of events that are to be monitored. A received event from a received event stream is compared to events in the de-duplicated list of events and when a match between the received event (e.g., an event instance) and any one of the events in the de-duplicated list of events is detected, the received event (the event instance) is stored in an input repository. The plurality of CEP rules are then applied to the received event in the input repository, and any other previously stored events in the input repository.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

75.

Method and apparatus for message based security audit logging

      
Application Number 14041281
Grant Number 09904724
Status In Force
Filing Date 2013-09-30
First Publication Date 2018-02-27
Grant Date 2018-02-27
Owner EMC Corporation (USA)
Inventor
  • Chaulk, Christopher A.
  • Jan, Afzal Rahman
  • Rathinagiri, Prabhakaran
  • Sood, Nimai
  • Chauhan, Sameer S.

Abstract

Example embodiments of the present invention provide a method, an apparatus, and a computer program product for message based security audit logging. The method includes receiving an event notification related to an event in a storage resource management service, processing the event notification according to a messaging fabric and an ontology model, and, according to the processed event notification, persisting an audit log entry corresponding to the event.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

76.

Processing device having secure container for accessing enterprise data over a network

      
Application Number 13632058
Grant Number 09904791
Status In Force
Filing Date 2012-09-30
First Publication Date 2018-02-27
Grant Date 2018-02-27
Owner EMC Corporation (USA)
Inventor
  • Thankappan, Suresh
  • Krishnakumar, Narayanan
  • Prathab, Sadasiva
  • Zhong, Qianjie

Abstract

A processing device comprises a processor coupled to a memory and implements a secure container for accessing data over a network. The secure container is configured to interact with backend infrastructure of an enterprise in order to provide secure access to enterprise data at the processing device. The secure container may be configured in accordance with an access model that implements multiple-factor authentication in combination with active directory authentication. The backend infrastructure may comprise, for example, a threat management gateway and an application control engine coupled to the threat management gateway and configured to support the multi-factor authentication, as well as additional components such as an active directory, a data loss prevention engine adapted to process communications between the backend infrastructure and the secure container, and a proxy server providing access to a content adaptation server configured to filter communications received from the processing device.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/31 - User authentication

77.

Reducing database fragmentation

      
Application Number 14675454
Grant Number 09875249
Status In Force
Filing Date 2015-03-31
First Publication Date 2018-01-23
Grant Date 2018-01-23
Owner EMC CORPORATION (USA)
Inventor
  • Manville, Thomas
  • Lopez, Julio

Abstract

Techniques to reduce database fragmentation are disclosed. In various embodiments, an indication is received to store an attribute value for an entity that has a row or other entry in a first database table, wherein the first database table does not have a column for the attribute. It is determined that the value corresponds to a mapped value that is associated with not having an entry in a separate, second database table configured to store the attribute. Entries are made in the second database table only for values of the attribute other than the mapped value. Application level software code is configured to associate absence of a row in the second database table with the mapped value for the attribute.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor

78.

Recovering corrupt storage systems

      
Application Number 14108072
Grant Number 09875162
Status In Force
Filing Date 2013-12-16
First Publication Date 2018-01-23
Grant Date 2018-01-23
Owner EMC Corporation (USA)
Inventor
  • Panidis, Anestis
  • Natanzon, Assaf
  • Cohen, Saar

Abstract

A method and system for recovering a corrupt storage system is discussed. A request to recover the system may be received. A backup snapshot for the last point-in-time the system was stable may be synthesized. A difference may be identified between that backup snapshot and the current system. The difference may be transmitted to the corrupt system to recover the data.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

79.

Integration engine for communications between source and target applications

      
Application Number 14040826
Grant Number 09871848
Status In Force
Filing Date 2013-09-30
First Publication Date 2018-01-16
Grant Date 2018-01-16
Owner EMC Corporation (USA)
Inventor Shanmugam, Karunanithi

Abstract

An integration engine is provided for communications between source and target applications. A message is sent from a source application to a target application, by processing a header element to route the message to the target application; transforming a message format of the message to a different message format; storing the message payload using a Claim-Check Enterprise Application Integration (EAI) pattern; and providing the transformed message to the target application. Transport adapters optionally transform a message format of the message to a different message format, such as a message format of the source application being transformed to a message format of the target application. The header element is optionally updated using a channel interceptor to update a next endpoint in a flow based on one or more business rules applied to the message payload. The header element can be processed by a header-based router that routes the message to a next endpoint in a flow. The exemplary integration engine is based on a Spring Integration Framework.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

80.

TECHNIQUES FOR ACCURATELY APPRISING A USER OF PROGRESS IN BOOTING A VIRTUAL APPLIANCE

      
Application Number RU2016000393
Publication Number 2018/004367
Status In Force
Filing Date 2016-06-27
Publication Date 2018-01-04
Owner EMC CORPORATION (USA)
Inventor
  • Cherkalova, Victoria Vladimirovna
  • Krivenok, Dmitry Vladimirovich

Abstract

A method, performed by a computing device, includes (a) building a data structure that describes dependence relationships between components of a virtual appliance, the components comprising respective computational processes which may be invoked during booting, a dependence relationship indicating that one component must complete before a second component may be invoked, (b) identifying, with reference to the data structure and an essential set of components which were pre-defined to be essential to the virtual appliance, a set of components that must complete for booting to be considered finished, and, after identifying the required set of components, repeatedly (c) querying each required component for its respective completion status, (d) calculating an estimated completion percentage for booting the virtual appliance with reference to the respective completion statuses of each required component versus all required components, and (e) displaying an indication of the completion percentage to a user via a user interface.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 12/08 - Addressing or allocationRelocation in hierarchically structured memory systems, e.g. virtual memory systems

81.

ARRANGING SSD RESOURCES BASED ON ESTIMATED ENDURANCE

      
Application Number RU2016000406
Publication Number 2018/004368
Status In Force
Filing Date 2016-06-30
Publication Date 2018-01-04
Owner EMC CORPORATION (USA)
Inventor Dalmatov, Nickolay Alexandrovich

Abstract

A technique for managing SSDs in a data storage system generates an endurance value for each of multiple SSDs and arranges the SSDs in RAID groups based at least in part on the generated endurance values. As a result of such arranging, some RAID groups may include only SSDs with higher endurance values while other RAID groups may include only SSDs with lower endurance values. The data storage system may then run RAID groups with higher endurance values at higher speeds and may run RAID groups with lower endurance values at lower speeds.

IPC Classes  ?

  • G11C 29/00 - Checking stores for correct operationTesting stores during standby or offline operation

82.

Multi-tier data storage using inclusive/exclusive burst buffer caching based on reference counts

      
Application Number 14580529
Grant Number 09858185
Status In Force
Filing Date 2014-12-23
First Publication Date 2018-01-02
Grant Date 2018-01-02
Owner EMC Corporation (USA)
Inventor
  • Bent, John M.
  • Faibish, Sorin
  • Pedone, Jr., James M.

Abstract

Improved multi-tier data storage is provided using inclusive/exclusive burst buffer caching techniques based on reference counts. An exemplary multi-tier storage system comprises at least first and second storage tiers for storing data, wherein at least one of the first and second storage tiers comprises at least one cache, and wherein the data is retained in the at least one cache as a given cached data item based on a reference count indicating a number of expected requests for the given cached data item. The number of expected requests for the given cached data item in a given cache is based, for example, on a number of nodes serviced by the given cache. A burst buffer appliance is also provided for implementing the cache retention policies described herein.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 12/0811 - Multiuser, multiprocessor or multiprocessing cache systems with multilevel cache hierarchies
  • G06F 12/0813 - Multiuser, multiprocessor or multiprocessing cache systems with a network or matrix configuration

83.

Service to invoke companion applications

      
Application Number 14319806
Grant Number 09854026
Status In Force
Filing Date 2014-06-30
First Publication Date 2017-12-26
Grant Date 2017-12-26
Owner EMC Corporation (USA)
Inventor
  • Smerald, Peter D.
  • Hashemian, Gilda R.
  • Boblett, Howard A.
  • Hardwick, Benjamin W.
  • Branum, Brian H.
  • Odom, Jr., James R.
  • Dang, Phi
  • Somalingam, Dinesh Ramvel

Abstract

A service to invoke a companion application or service is disclosed. In various embodiments, an indication to invoke a companion application is received in the context of a display page of a calling application. A service a call comprising a filtered set of data values derived from the display page is sent to an external service. A request associated with the companion application is received from the external service and used to invoke the companion application.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

84.

Composable action flows

      
Application Number 14136316
Grant Number 09851951
Status In Force
Filing Date 2013-12-20
First Publication Date 2017-12-26
Grant Date 2017-12-26
Owner EMC Corporation (USA)
Inventor
  • Ganesan, Ramkumar
  • Totale, Sachin G.
  • Suliman, Marwan
  • Paramala, Venugopal

Abstract

Composable action flows are disclosed. In various embodiments, a definition of one or more processing steps comprising an action flow is received. A definition of one or more transitions between processing steps comprising the action flow is received. The processing step and transition definitions are used to generate programmatically application code to implement the action flow.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs

85.

Extent level cache destaging

      
Application Number 14868690
Grant Number 09798472
Status In Force
Filing Date 2015-09-29
First Publication Date 2017-10-24
Grant Date 2017-10-24
Owner EMC CORPORATION (USA)
Inventor
  • Natanzon, Assaf
  • Bachmat, Eitan
  • Abashkin, Mark

Abstract

A System, Computer Program Product, and Computer-executable method for managing cache de-staging on a data storage system wherein the data storage system provides a Logical Unit (LU), the System, Computer Program Product, and Computer-executable method including dividing the LU into two or more extents, analyzing each of the two or more extents, creating a cache de-staging policy based on the analysis, and managing cache de-staging of the LU based the cache de-staging policy.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 12/128 - Replacement control using replacement algorithms adapted to multidimensional cache systems, e.g. set-associative, multicache, multiset or multilevel

86.

Replication optimizated IO

      
Application Number 15057705
Grant Number 09798490
Status In Force
Filing Date 2016-03-01
First Publication Date 2017-10-24
Grant Date 2017-10-24
Owner EMC Corporation (USA)
Inventor Natanzon, Assaf

Abstract

A system method and program product for data replication comprising based on metadata, creating a mapping of pending IO to a logical storage medium and changing a mapping of the logical storage medium to tiered storage mediums to optimize the pending IO to the logical storage medium.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 12/0897 - Caches characterised by their organisation or structure with two or more cache hierarchy levels

87.

BACKUP SERVER SELECTION BASED ON DATA COMMONALITY

      
Application Number RU2016000176
Publication Number 2017/171574
Status In Force
Filing Date 2016-03-29
Publication Date 2017-10-05
Owner EMC CORPORATION (USA)
Inventor Dalmatov, Nickolay Alexandrovich

Abstract

Techniques of backing up data stored on host computing devices involve selecting a backup server from among multiple servers on which to back up host data based on a measure of commonality between the host data and data stored in the backup servers. Prior to sending data for backup, a host sends a set of host data representations to a backup system. Each host data representation is based on a respective hash value computed from a respective block of the host data. The backup system compares the set of host data representations with server data representations for each backup server and computes a commonality score for each backup server. The backup system then selects a backup server on which to place the host data based at least in part on the commonality scores. Host data are then directed to the selected backup server for backup.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 7/02 - Comparing digital values

88.

VIRTUAL MACHINE STORAGE MANAGEMENT QUEUE

      
Application Number RU2016000181
Publication Number 2017/171575
Status In Force
Filing Date 2016-03-30
Publication Date 2017-10-05
Owner EMC CORPORATION (USA)
Inventor
  • Alexeev, Sergey Alexandrovich
  • Shusharin, Alexey Vladimirovich
  • Morev, Ilya Konstantinovich
  • Zaporozhtsev, Sergey Alexandrovich
  • Belikov, Yakov Stanislavovich

Abstract

Embodiments are directed to a method performed by a computing device. The method includes (a) receiving, by the computing device, a stream of storage management commands directed at logical disks hosted by a DSS, the logical disks being accessible to VMs running on a remote host, each storage management command having a command type of a plurality of command types, each command type of the plurality of command types having a respective timeout period, (b) placing the storage management commands of the stream into a VM storage management queue stored on the computing device, and (c) selectively dequeueing storage management commands stored in the VM storage management queue to be performed by the DSS, wherein selectively dequeueing includes applying a set of dequeueing criteria, the set of dequeueing criteria including a criterion that selects storage management commands from the VM storage management queue according to their respective command types.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 17/30 - Information retrieval; Database structures therefor

89.

Containerized security for managed content

      
Application Number 11370293
Grant Number 09754119
Status In Force
Filing Date 2006-03-07
First Publication Date 2017-09-05
Grant Date 2017-09-05
Owner EMC Corporation (USA)
Inventor Kilday, Roger W.

Abstract

Containerized security is disclosed. An indication is received that a content item included in a body of managed content is associated with a container. A security measure is associated with the content item, based at least in part on the association of the content item with the container, that causes access to the content item by a user who is not associated with the container but who otherwise would have access to the content item within the body of managed content to be denied.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 9/44 - Arrangements for executing specific programs

90.

Automatic elevation of system security

      
Application Number 15495778
Grant Number 10097359
Status In Force
Filing Date 2017-04-24
First Publication Date 2017-08-24
Grant Date 2018-10-09
Owner EMC Corporation (USA)
Inventor Rao, Raghavendra Anantha

Abstract

A system for automatic setting of system security comprises an input interface and a processor. The input interface is configured to receive an indication to set a secure mode. The processor is configured to: determine whether the indication to set the secure mode comprises an indication to set a certificate mode; in the event that the indication to set the secure mode comprises an indication to set a certificate mode: 1) detect one or more connected systems for which to set the certificate mode; 2) select one or more certificates for the certificate mode; 3) update initialization files for the certificate mode; and 4) reinitialize local and one or more connected systems.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

91.

Encrypted virtual machines in a cloud

      
Application Number 14827690
Grant Number 09740880
Status In Force
Filing Date 2015-08-17
First Publication Date 2017-08-22
Grant Date 2017-08-22
Owner EMC Corporation (USA)
Inventor
  • Natanzon, Assaf
  • Amit, Amir

Abstract

A method, system, and computer program product for intercepting communication between a virtual machine and an encrypted replication data stored on a storage medium and redirecting the communication to a remote replication appliance and using a key stored on the remote replication appliance to enable the virtual machine to facilitate communication with the encrypted replication data stored on the storage medium, wherein facilitating communication enables the virtual machine to interact with the encrypted replication data as unencrypted data.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/73 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

92.

Non-disruptive load-balancing of virtual machines between data centers

      
Application Number 14620343
Grant Number 09733989
Status In Force
Filing Date 2015-02-12
First Publication Date 2017-08-15
Grant Date 2017-08-15
Owner EMC Corporation (USA)
Inventor
  • Robidoux, Gregory S
  • Ganeshan, Balakrishnan
  • Dar, Yaron
  • Taylor, Kenneth
  • Barturen, Txomin
  • Glade, Bradford B

Abstract

A method, system and program product for enabling migration of Virtual Machines with concurrent access to data across two geographically disperse sites to enable load balancing across the two geographically disperse sites, by presenting over a network a read writable logical volume at a first site, presenting over a network a read writable logical volume at a second geographically disparate site; wherein the first volume and the second volume are configured to contain the same information, and enabling read write access to the volume at the first site or the volume at the second site for a first virtual machine while keeping the data consistent between the two sites to enable transparent migration of the virtual machine to load balancing across the two sites according to at least one load balancing metric.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • G06F 15/167 - Interprocessor communication using a common memory, e.g. mailbox
  • G06F 15/177 - Initialisation or configuration control
  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt

93.

EFFICIENT DEDUPLICATION OF LOGICAL UNITS

      
Application Number RU2015000949
Publication Number 2017/116264
Status In Force
Filing Date 2015-12-29
Publication Date 2017-07-06
Owner EMC CORPORATION (USA)
Inventor
  • Shadrin, Alexander Valentinovich
  • Kozlovsky, Vitaly Stanislavovich
  • Gumenyuk, Ivan Valentinovich

Abstract

Systems and methods for efficient deduplication and/or provisioning of LUNs are disclosed. A first unique data block pool for a first LUN of a plurality of deduplicated LUNs is accessed, the first unique data block pool comprising a first plurality of unique data blocks for representing data stored on the first LUN. A second unique data block pool for a second LUN of the plurality of LUNs is accessed, the second unique data block pool comprising a second plurality of unique data blocks for representing data stored on the second LUN. It is determined a correspondence metric for the first unique data block pool and the second unique data block pool exceeds a predetermined threshold. The first LUN and the second LUN are joined to form a first combined LUN. The first unique data block pool and the second unique data block pool are joined.

IPC Classes  ?

  • G06F 12/0802 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
  • G06F 17/30 - Information retrieval; Database structures therefor

94.

AUGMENTED REALITY SYSTEM AND METHOD

      
Application Number RU2015000920
Publication Number 2017/111647
Status In Force
Filing Date 2015-12-23
Publication Date 2017-06-29
Owner EMC CORPORATION (USA)
Inventor
  • Zagrebin, Yuri Aleksandrovich
  • Fomin, Alexey Dmitriyevich
  • Bartashev, Artem Nikolayevich

Abstract

A computer-implemented method, computer program product, and computing system for receiving a unique identifier on a client electronic device. The unique identifier is associated with at least one IT component. Status information is obtained concerning the at least one IT component. A visual representation of the at least one IT component is generated on a display screen of the client electronic device. A graphical representation of the status information is superimposed onto the visual representation of the at least one IT component.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project managementEnterprise or organisation planningEnterprise or organisation modelling
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G09G 5/397 - Arrangements specially adapted for transferring the contents of two or more bit-mapped memories to the screen simultaneously, e.g. for mixing or overlay
  • G06T 19/00 - Manipulating 3D models or images for computer graphics

95.

Capacity exhaustion prevention for distributed storage

      
Application Number 15186576
Grant Number 10067696
Status In Force
Filing Date 2016-06-20
First Publication Date 2017-06-22
Grant Date 2018-09-04
Owner EMC Corporation (USA)
Inventor
  • Malygin, Mikhail
  • Danilov, Mikhail
  • Wang, Chen
  • Tchoub, Ivan
  • Fomin, Andrey

Abstract

Systems and processes to prevent storage capacity exhaustion within distributed storage systems using chunk-based storage. The systems and processes control capacity by classifying various types of storage chunks into groups and impose used capacity thresholds on chunk groups.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers

96.

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIUMS FOR WORKLOAD CLUSTERING

      
Application Number UA2015000124
Publication Number 2017/105376
Status In Force
Filing Date 2015-12-14
Publication Date 2017-06-22
Owner VCE COMPANY, LLC (USA)
Inventor Gong, Changbin

Abstract

Methods, systems, and computer readable mediums for optimizing a system configuration are disclosed. In some examples, a method includes determining whether a system configuration for executing a workload using a distributed computer system is optimizable and in response to determining that the system configuration is optimizable, modifying the system configuration such that at least one storage resource for storing workload data is located at a server node that is executing the workload in the distributed computer system.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06N 3/08 - Learning methods

97.

Providing storage technology information to improve database performance

      
Application Number 14995532
Grant Number 10152498
Status In Force
Filing Date 2016-01-14
First Publication Date 2017-06-15
Grant Date 2018-12-11
Owner EMC CORPORATION (USA)
Inventor
  • Don, Arieh
  • Rao, Vinay
  • Benhanokh, Gabi
  • Dar, Yaron
  • Sela, Nir

Abstract

In one aspect, a method includes receiving a read or write command from a requester to read data from or write data to a database, inserting in a status message on a status of the read or write command an identifier to identify technology of storage for the data and providing the status message associated with the read or write command to the requester.

IPC Classes  ?

  • G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
  • G07F 17/30 - Coin-freed apparatus for hiring articlesCoin-freed facilities or services for musical instruments
  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

98.

Composable application session parameters

      
Application Number 15352384
Grant Number 10303444
Status In Force
Filing Date 2016-11-15
First Publication Date 2017-05-04
Grant Date 2019-05-28
Owner EMC Corporation (USA)
Inventor
  • Totale, Sachin G.
  • Suliman, Marwan
  • Thiruvasagam, Rajakumar
  • Ganesan, Ramkumar
  • Ansari, Saif Ali

Abstract

Developer-composed custom application session parameters are disclosed. In various embodiments, a definition of a custom application session parameter is received via a software development tool user interface. Application code to store and manage the custom application session parameter, including by making the custom application parameter available across a plurality of application user interface pages, is generated programmatically based at least in part on the definition.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 8/34 - Graphical or visual programming
  • G06F 9/445 - Program loading or initiating
  • G06F 8/35 - Creation or generation of source code model driven
  • G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

99.

Dynamically switching between synchronous and asynchronous replication

      
Application Number 13680338
Grant Number 09639592
Status In Force
Filing Date 2012-11-19
First Publication Date 2017-05-02
Grant Date 2017-05-02
Owner EMC Corporation (USA)
Inventor
  • Natanzon, Assaf
  • Ayzenbergv, Lev
  • Mossel, Yossi
  • Singer, Ido
  • Kedem, Oded

Abstract

In a system comprising a production environment and a replication environment, a method and program product for dynamically switching from an asynchronous replication policy to a synchronous replication policy. In a system comprising a production environment and a replication environment, a method for dynamically switching from a synchronous replication policy to an asynchronous replication policy.

IPC Classes  ?

  • G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06F 17/30 - Information retrieval; Database structures therefor

100.

Synchronizing stateless process across multiple instances

      
Application Number 14172152
Grant Number 09626228
Status In Force
Filing Date 2014-02-04
First Publication Date 2017-04-18
Grant Date 2017-04-18
Owner EMC Corporation (USA)
Inventor
  • Walia, Raman
  • Thotakura, Prasad K.
  • Syed, Ashraf A.
  • Somasundaram, Vasanth Kumar

Abstract

Synchronization stateless process execution is disclosed. In various embodiments, an indication is received that an instance of a process with respect to which stateless execution is being performed is to enter a block of the process with respect to which synchronization with one or more other instances of the process is to be provided. A current turn to perform the block with respect to which synchronization is to be provided is secured on behalf of the process instance. The block with respect to which synchronization is to be provided is allowed to be performed by the process instance.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • G06F 9/46 - Multiprogramming arrangements
  • G06F 9/52 - Program synchronisationMutual exclusion, e.g. by means of semaphores
  1     2     3     ...     5        Next Page