Patents by Inventor Mor Griv

Mor Griv has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10929018
    Abstract: A mega cluster storage system includes clusters of multiple storage modules. Each module is able to access a portion of the data within the mega cluster and serves as a proxy in order for another storage module to access the remaining portion of the data. A cluster is assigned to a unique cluster volume and all the data within the cluster volume is accessible by all of the modules within the cluster. Each host connection to the mega cluster is associated with a particular cluster volume. A module that receives a host I/O request determines whether the I/O request should be satisfied by a module within its own cluster or be satisfied by a module within a different cluster. The module may forward the I/O request to a module within a different cluster as indicated by a distribution data structure that is allocated and stored within each storage module.
    Type: Grant
    Filed: September 20, 2019
    Date of Patent: February 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Zah Barzik, Dan Ben-Yaacov, Mor Griv, Maxim Kalaev, Rivka M. Matosevich
  • Publication number: 20200019316
    Abstract: A mega cluster storage system includes clusters of multiple storage modules. Each module is able to access a portion of the data within the mega cluster and serves as a proxy in order for another storage module to access the remaining portion of the data. A cluster is assigned to a unique cluster volume and all the data within the cluster volume is accessible by all of the modules within the cluster. Each host connection to the mega cluster is associated with a particular cluster volume. A module that receives a host I/O request determines whether the I/O request should be satisfied by a module within its own cluster or be satisfied by a module within a different cluster. The module may forward the I/O request to a module within a different cluster as indicated by a distribution data structure that is allocated and stored within each storage module.
    Type: Application
    Filed: September 20, 2019
    Publication date: January 16, 2020
    Inventors: Zah Barzik, Dan Ben-Yaacov, Mor Griv, Maxim Kalaev, Rivka M. Matosevich
  • Patent number: 10521112
    Abstract: A mega cluster storage system includes clusters of multiple storage modules. Each module is able to access a portion of the data within the mega cluster and serves as a proxy in order for another storage module to access the remaining portion of the data. A cluster is assigned to a unique cluster volume and all the data within the cluster volume is accessible by all of the modules within the cluster. Each host connection to the mega cluster is associated with a particular cluster volume. A module that receives a host I/O request determines whether the I/O request should be satisfied by a module within its own cluster or be satisfied by a module within a different cluster. The module may forward the I/O request to a module within a different cluster as indicated by a distribution data structure that is allocated and stored within each storage module.
    Type: Grant
    Filed: March 17, 2017
    Date of Patent: December 31, 2019
    Assignee: International Business Machines Corporation
    Inventors: Zah Barzik, Dan Ben-Yaacov, Mor Griv, Maxim Kalaev, Rivka M. Matosevich
  • Publication number: 20180267707
    Abstract: A mega cluster storage system includes clusters of multiple storage modules. Each module is able to access a portion of the data within the mega cluster and serves as a proxy in order for another storage module to access the remaining portion of the data. A cluster is assigned to a unique cluster volume and all the data within the cluster volume is accessible by all of the modules within the cluster. Each host connection to the mega cluster is associated with a particular cluster volume. A module that receives a host I/O request determines whether the I/O request should be satisfied by a module within its own cluster or be satisfied by a module within a different cluster. The module may forward the I/O request to a module within a different cluster as indicated by a distribution data structure that is allocated and stored within each storage module.
    Type: Application
    Filed: March 17, 2017
    Publication date: September 20, 2018
    Inventors: Zah Barzik, Dan Ben-Yaacov, Mor Griv, Maxim Kalaev, Rivka M. Matosevich
  • Patent number: 9043924
    Abstract: A method and a system for detecting one or more security vulnerabilities. The method comprises providing test instructions for an application, such as a web application or a client server application, adding test code to a code segment of the application according to the test instructions, sending at least one message to the application according to the test instructions at runtime thereof, monitoring test information pertaining to at least one reaction of the application to the at least one message during an execution of the test code, performing an analysis of the at least one reaction, and detecting a presence or an absence of at least one security vulnerability according to the analysis.
    Type: Grant
    Filed: May 12, 2014
    Date of Patent: May 26, 2015
    Assignee: Seeker Security Ltd.
    Inventors: Ofer Maor, Eran Tamir, Tamir Shavro, Mor Griv
  • Publication number: 20140331327
    Abstract: A method and a system for detecting one or more security vulnerabilities. The method comprises providing test instructions for an application, such as a web application or a client server application, adding test code to a code segment of the application according to the test instructions, sending at least one message to the application according to the test instructions at runtime thereof, monitoring test information pertaining to at least one reaction of the application to the at least one message during an execution of the test code, performing an analysis of the at least one reaction, and detecting a presence or an absence of at least one security vulnerability according to the analysis.
    Type: Application
    Filed: May 12, 2014
    Publication date: November 6, 2014
    Applicant: Seeker Security Ltd.
    Inventors: Ofer MAOR, Eran Tamir, Tamir Shavro, Mor Griv
  • Patent number: 8726394
    Abstract: A method and a system for detecting one or more security vulnerabilities. The method comprises providing test instructions for an application, such as a web application or a client server application, adding test code to a code segment of the application according to the test instructions, sending at least one message to the application according to the test instructions at runtime thereof, monitoring test information pertaining to at least one reaction of the application to the at least one message during an execution of the test code, performing an analysis of the at least one reaction, and detecting a presence or an absence of at least one security vulnerability according to the analysis.
    Type: Grant
    Filed: December 14, 2010
    Date of Patent: May 13, 2014
    Assignee: Seeker Security Ltd.
    Inventors: Ofer Maor, Eran Tamir, Tamir Shavro, Mor Griv
  • Publication number: 20120260344
    Abstract: A method and a system for detecting one or more security vulnerabilities. The method comprises providing test instructions for an application, such as a web application or a client server application, adding test code to a code segment of the application according to the test instructions, sending at least one message to the application according to the test instructions at runtime thereof, monitoring test information pertaining to at least one reaction of the application to the at least one message during an execution of the test code, performing an analysis of the at least one reaction, and detecting a presence or an absence of at least one security vulnerability according to the analysis.
    Type: Application
    Filed: December 14, 2010
    Publication date: October 11, 2012
    Inventors: Ofer Maor, Eran Tamir, Tamir Shavro, Mor Griv
  • Publication number: 20060136685
    Abstract: A method and system is disclosed to maintain data consistency over an internet small computer system interface (iSCSI) network, for disaster recovery and remote data replication purposes. Data consistency and replication is maintained between primary and secondary sites geographically distant from each other. According to the method, a primary journal volume logs all changes (data writes) made to a primary volume, transmits the changes based on a preconfigured policy to a secondary journal volume, and thereafter merges the changes stored in the secondary journal volume with a secondary volume. Changes in the journal volumes are ordered in point-in-time (PiT) frames and transmitted using a vendor specific SCSI command utilizing the iSCSI protocol.
    Type: Application
    Filed: December 17, 2004
    Publication date: June 22, 2006
    Inventors: Mor Griv, Ronny Sayag, Philip Derbeko
  • Publication number: 20050198186
    Abstract: A method and apparatus for automatic discovery of logical units (LUs) and storage devices connected to a device in a storage network, the LUs being discovered with their associated LU paths. The method and apparatus performs, for each target path, discovering LUs exposed on said target path; iteratively, for each discovered LU generating a list of LU paths associated with the discovered LU; retrieving at least attributes related to said discovered LU; and, correlating between identical LUs, thereby identifying LU paths directing to the same LU.
    Type: Application
    Filed: January 20, 2004
    Publication date: September 8, 2005
    Inventor: Mor Griv
  • Publication number: 20050114464
    Abstract: A virtualization switch and method for executing at least SCSI commands and performing virtualization in a in a Storage Area Network. The virtualization switch optimizes the data received from the network to fit the capacity of the target storage devices, thus providing higher throughput and low latency. The virtualization is preformed within the data path between the hosts and the storage devices and without the assistance of devices, such as a management stations or agents installed in the hosts.
    Type: Application
    Filed: October 27, 2003
    Publication date: May 26, 2005
    Inventors: Shai Amir, Sarel Altshuler, Philip Derbeko, Mor Griv, Ronny Sayag