Patents by Inventor Jehuda Shemer

Jehuda Shemer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11983078
    Abstract: One example method includes receiving, at an IO journal, a new entry that identifies a respective disk location L, and data X written at that disk location L, and determining whether a location specified in an oldest entry of the IO journal is specified in any other entries in the IO journal. When the location specified in the oldest entry is not specified in any other entries in the IO journal, adding the new entry to the IO journal, and augmenting the new entry with undo data. Or, when the location specified in the oldest entry is specified in at least one other entry in the IO journal, setting data specified in the oldest entry as undo data for the next entry that identifies that location, and adding the new entry to the IO journal, and deleting the oldest entry from the IO journal.
    Type: Grant
    Filed: February 28, 2020
    Date of Patent: May 14, 2024
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Nadav Azaria, Jehuda Shemer, Saar Cohen
  • Patent number: 11983281
    Abstract: One example method includes receiving, by a backup appliance, a request concerning a dataset, performing, by the backup appliance, an inquiry to determine if end-to-end encryption is enabled for a volume of a target storage array, receiving, by the backup appliance, confirmation from the storage array that end-to-end encryption is enabled for the volume, and based on the confirmation that end-to-end encryption is enabled for the volume, storing the dataset in the volume without performing encryption, compression, or deduplication, of the dataset prior to storage of the dataset in the volume.
    Type: Grant
    Filed: June 9, 2021
    Date of Patent: May 14, 2024
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Jehuda Shemer, Arieh Don, Krishna Deepak Nuthakki
  • Publication number: 20240152383
    Abstract: A data protection system includes a splitter configured to reduce latencies when splitting writes in a computing environment. The splitter captures a write and adds metadata to augment the write with virtual related information. The augmented data is provided to a smartNIC while the write is then processed in the IO stack. The smartNIC may have a volume only visible to the splitter. The smartNIC also includes processing power that allows data protection operations to be performed at the smartNIC rather than with the processing resources of the host.
    Type: Application
    Filed: January 18, 2024
    Publication date: May 9, 2024
    Inventors: Jehuda Shemer, Srinivas Kangyampeta
  • Patent number: 11977517
    Abstract: Compressing files is disclosed. An input file to be compressed is first aligned. Aligning the file includes splitting the file into sequences that can be aligned. The result is a compression matrix, where each row of the matrix corresponds to part of the file. The compression matrix may also serve as a warm start if additional compression is desired. Compression may be performed in stages, where an initial compression matrix is generated in a first stage using larger letter sizes for alignment and then a second compression stage is performed using smaller letter sizes. A consensus sequence id determined from the compression matrix. Using the consensus sequence, pointer pairs are generated. Each pointer pair identifies a subsequence of the consensus matrix. The compressed file includes the pointer pairs and the consensus sequence.
    Type: Grant
    Filed: April 12, 2022
    Date of Patent: May 7, 2024
    Assignee: DELL PRODUCTS L.P.
    Inventors: Ofir Ezrielev, Ilan Buyum, Jehuda Shemer
  • Publication number: 20240143545
    Abstract: Organizing data for data protection based on content data stored in a large-scale data storage system. Embodiments create a dataset by grouping metadata for unstructured data objects that are grouped together by one or more filters. Datasets can be static or dynamic and can span multiple storage devices of different types, so that it defines a single data protection unit for the corresponding content data. A user initiated query generates the one or more filters, and a protection policy is defined that protects the dataset as the single unit based on data content rather than data location. Datasets are stored in a catalog, and are generated by running queries on the catalog, where a query comprises metadata selectors as tags applied to the catalog, where the tags define at least one of a file type, name, location, creation time, or file characteristic.
    Type: Application
    Filed: October 27, 2022
    Publication date: May 2, 2024
    Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Chris E. Rowen
  • Publication number: 20240143451
    Abstract: Providing content based data protection for data stored in a large-scale data storage system by creating a dataset by grouping metadata for unstructured data objects that are grouped together by one or more filters. The dataset can span multiple storage devices of different types, so that it defines a single data protection unit for the corresponding content data. A user initiated query generates the one or more filters, and a protection policy is defined that protects the dataset as the single unit based on data content rather than data location. Datasets are stored in a catalog, and are generated by running queries on the catalog, where a query comprises metadata selectors as tags applied to the catalog, where the tags define at least one of a file type, name, location, creation time, or file characteristic.
    Type: Application
    Filed: October 26, 2022
    Publication date: May 2, 2024
    Inventors: Jehuda Shemer, Steven Sadhwani, Adam Brenner, Chris E. Rowen
  • Publication number: 20240143610
    Abstract: Embodiments of monitoring data assets in a system to apply rules to optimize storage and access of the data assets based on data content rather than data location, by defining rules based on the monitoring attributes, wherein a rule dictates a storage location of selected data or access permissions to the data by one or more persons or groups in the system. The selected data is tagged with a defined metadata tag, and a dataset is created by running a query against a data catalog to derive the dataset. A component monitors data usage and access of data elements referenced by the dataset to detect any violations of the defined rules, and provides a notification of any violation to facilitate remedial action by a user or process. The dataset can span multiple storage devices of different types to define a single processing unit for the monitoring attributes.
    Type: Application
    Filed: October 27, 2022
    Publication date: May 2, 2024
    Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Valerie Lotosh, Erez Sharvit
  • Publication number: 20240143789
    Abstract: Providing content-based encryption to content data in a data processing system by creating datasets by grouping metadata for data objects that are intended to be encrypted with a common encryption key, where each dataset spans multiple storage devices of different storage types, and defines a single data encryption unit for the data objects referenced by a respective dataset. Each dataset is tagged with an encryption tag to enable or disable use of a self-selected encryption key. Encryption keys stored in or made available to the system are accessed for encrypting the data objects using an encryption process. A key management component maps each dataset to a corresponding encryption key of the encryption keys, and an encryption component encrypts, for each dataset, referenced data objects using a corresponding mapped encryption key.
    Type: Application
    Filed: October 27, 2022
    Publication date: May 2, 2024
    Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Valerie Lotosh, Erez Sharvit
  • Publication number: 20240143628
    Abstract: Optimizing data movement from a source data center to a target data center by grouping metadata of data objects into a dataset that encompasses data processed identically by a data processing operation, where the dataset defines a single data access unit for these data objects, and the data processing operation processes them as a single unit based on data content rather than physical or logical data location of the data objects. A mobility process correlates an increase in a number of metadata elements in the dataset with a growth rate of the dataset, and compares the dataset growth rate with historical or similar dataset growth rate data. The comparison is used to determine when and where to move data from the source to the target data center based on a forecast of accelerated growth indicated by the comparing step, and a consideration of target data center resources, data move costs, and streaming data effects.
    Type: Application
    Filed: October 28, 2022
    Publication date: May 2, 2024
    Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Valerie Lotosh, Erez Sharvit
  • Publication number: 20240143452
    Abstract: Providing content based data protection for data stored in a large-scale data storage system by scanning data stored in one or more databases for discovery of metadata, and extracting the discovered metadata, for storage in a data catalog, the data catalog having a scanning function performing the scanning step, and comprising a database storing the metadata in one or more tables. A protection policy is defined to commonly protect content data referenced by metadata in the data catalog, and applied to the referenced content data to perform a data protection operation the content data. Datasets stored in the catalog are generated by running queries on the catalog, where a query comprises metadata selectors as tags applied to the catalog, where the tags define at least one of a file type, name, location, creation time, or file characteristic.
    Type: Application
    Filed: October 27, 2022
    Publication date: May 2, 2024
    Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Chris E. Rowen
  • Publication number: 20240143815
    Abstract: Managing versioning of data objects for a project revised from a first version to a revised version by producing a dataset representing the data objects as a group by scanning the data objects to identify metadata of the grouped data to be processed similarly within a current version of the lifecycle, and storing the identified metadata in the dataset. Data object changed from the first version to the revised version are identified, and the corresponding metadata for changed data objects in the dataset is updated. A version control operation is then performed on the dataset to update all data objects referenced by the dataset from the first version to the revised version. A commit-map and commit-tree are stored in a repository, and version control operations including commit, checkout, merge, branch and merge-branch are performed on the dataset snapshot.
    Type: Application
    Filed: October 28, 2022
    Publication date: May 2, 2024
    Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Valerie Lotosh, Erez Sharvit
  • Publication number: 20240143817
    Abstract: One example method includes defining an airgap control policy that specifies a threshold data value, generating a value for a set of data, determining whether the value that has been generated for the data meets or exceeds the threshold data value, and opening the air gap when the value that has been generated for the data meets or exceeds the threshold data value. The airgap is closed automatically when the value that has been generated for the data meets or exceeds the threshold data value.
    Type: Application
    Filed: October 26, 2022
    Publication date: May 2, 2024
    Inventors: Ofir Ezrielev, Jehuda Shemer, Amihai Savir
  • Publication number: 20240143810
    Abstract: Providing content based data access protection for data stored in a system by creating a dataset by grouping metadata for data objects that are grouped together by one or more filters. The dataset can span multiple storage devices of different types to define a single data access protection unit for the corresponding content data. A user query generates the one or more filters, and an access rule is defined that allows or denies access to the dataset by users or processes as the single unit based on data content rather than location. The access rule can comprise at least one of an Access Control List (ACL) rule or a Role-Based Access Control (RBAC) rule, where the ACL lists permissions associated with certain data elements that grant access to specific users or processes, and the RBAC rules allow or deny access on the basis of role-permissions within the system.
    Type: Application
    Filed: October 27, 2022
    Publication date: May 2, 2024
    Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Valerie Lotosh, Erez Sharvit
  • Publication number: 20240143811
    Abstract: Managing a lifecycle of data by identifying data objects that are subject to same control rules in each stage of the lifecycle as grouped data, where the control rules allow only authorized access to or authorized operations on the grouped data based on a current stage of the lifecycle. A dataset is generated for the grouped data by identifying metadata of the grouped data to be processed similarly within the lifecycle, and storing the metadata in the dataset. The control rules associated with the grouped data as stage tags for the dataset. Actions performed on the data referenced by the dataset are monitored to ensure that the monitored actions comply with control rules using the stage tags of the dataset.
    Type: Application
    Filed: October 27, 2022
    Publication date: May 2, 2024
    Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Valerie Lotosh, Erez Sharvit
  • Publication number: 20240143812
    Abstract: Providing content-based protection and process control to data objects in a multi-network system, by scanning content data to identify metadata associated with data objects to be protected by a defined protection policy. The content data is stored in storage devices comprising network attached storage (NAS), object storage, local storage, or cloud networks, and where the storage devices are deployed in different networks including core networks, edge networks, and cloud networks. The gathered metadata is stored in a catalog, and a user entered query is executed against the catalog to generate a dataset. The defined protection policy is then applied to the dataset to operate on the corresponding data objects referenced by the dataset as a single unit based on data content rather than data location in a file directory or physical location within the multi-network system.
    Type: Application
    Filed: October 27, 2022
    Publication date: May 2, 2024
    Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Valerie Lotosh, Erez Sharvit
  • Publication number: 20240143813
    Abstract: Classifying data objects for the content-based protection and process control in a system and modifying a classification based on evolving data. Data objects stored in the system are scanned to identify data objects to be processed similarly with respect to data protection or access control. A dataset comprising metadata for corresponding data objects is generated, and a classifier labels the dataset with a classifier tag to indicate an ownership group. Data objects that belong to the dataset are similarly tagged with the classifier so that the same operations are performed on this data regardless of location. A monitor tracks changes in the dataset based system evolution to determine a change in the classifier for the dataset based on the change. A classifier behavior tag is appended to the dataset specify an operation of the classifier to accommodate the tracked change.
    Type: Application
    Filed: October 27, 2022
    Publication date: May 2, 2024
    Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Valerie Lotosh, Erez Sharvit
  • Publication number: 20240143824
    Abstract: Enforcing a legal hold procedure in a system by scanning multiple data sources to identify data objects for processing as a unitary group with respect to common access and control processes of the legal hold to preserve the data for a defined period of time and protected against modification and unauthorized access. The metadata is stored in a static dataset that defines a single data access unit for the referenced data. A user query regarding a referenced data object is processed, and accesses the data through the dataset as a single unit based on data content rather than data location in a file directory of the system. The data may be sensitive data and the legal hold procedure may be implemented as court rules in accordance with Federal Rules of Civil Procedure.
    Type: Application
    Filed: October 28, 2022
    Publication date: May 2, 2024
    Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Valerie Lotosh, Erez Sharvit, Chris E. Rowen
  • Publication number: 20240144384
    Abstract: Performing charge/showback operations in a large-scale data system by scanning multiple data sources to identify data objects for processing as a unitary group with respect to common characteristics that have an impact on finances within the system. Metadata of the identified data objects are stored in a dynamic dataset that defines a single data access unit for the referenced data objects. The system processes a user query regarding cost allocations, cost forecasts, and resource usage of respective groups within an organization. The query initiates a charge-back or show-back operation that allocates costs associated with each respective usage of resources by a department or cost center, and accesses the referenced data objects through the dataset as a single unit based on data content rather than data location in a file directory of the system.
    Type: Application
    Filed: October 28, 2022
    Publication date: May 2, 2024
    Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Valerie Lotosh, Erez Sharvit, Chris E. Rowen
  • Publication number: 20240143823
    Abstract: Embodiments applying data protection and control policies using content-based datasets by scanning data objects stored in the system to determine grouped data that is processed similarly with respect to data protection and access control operations defined by a policy. A dataset is produced comprising metadata the scanned data objects of the grouped data. The actions performed on the dataset will affect only the corresponding data objects referenced by the metadata. A policy attribute derivation (PAD) process determines a change in the policy affecting a subset of data objects of the dataset and dictating changed data protection and access control operations applied to this subset, and tags the change in the policy as a PAD tag to the dataset to affect the application of the changed data protection and access control operations only to the subset and not any remaining data objects of the dataset.
    Type: Application
    Filed: October 28, 2022
    Publication date: May 2, 2024
    Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Valerie Lotosh, Erez Sharvit
  • Publication number: 20240143822
    Abstract: Providing content-based sensitivity classification to content data in a data processing system, by defining sensitivity designations for data objects stored in the system, and creating datasets by grouping metadata for data objects that are intended to classified with a same sensitivity designation, wherein each dataset spans multiple storage devices of different storage types, and wherein each dataset defines a single data sensitivity unit for the data objects referenced by a respective dataset. A sensitivity classifier component tags each dataset with a sensitivity tag to specify a protection or control operation on the data objects referenced by the respective dataset, and a processing component then processes data objects for each tagged dataset in accordance with the specified protection or control operation.
    Type: Application
    Filed: October 27, 2022
    Publication date: May 2, 2024
    Inventors: Adam Brenner, Jehuda Shemer, Steven Sadhwani, Valerie Lotosh, Erez Sharvit