Patents by Inventor Mor Griv
Mor Griv has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10929018Abstract: A mega cluster storage system includes clusters of multiple storage modules. Each module is able to access a portion of the data within the mega cluster and serves as a proxy in order for another storage module to access the remaining portion of the data. A cluster is assigned to a unique cluster volume and all the data within the cluster volume is accessible by all of the modules within the cluster. Each host connection to the mega cluster is associated with a particular cluster volume. A module that receives a host I/O request determines whether the I/O request should be satisfied by a module within its own cluster or be satisfied by a module within a different cluster. The module may forward the I/O request to a module within a different cluster as indicated by a distribution data structure that is allocated and stored within each storage module.Type: GrantFiled: September 20, 2019Date of Patent: February 23, 2021Assignee: International Business Machines CorporationInventors: Zah Barzik, Dan Ben-Yaacov, Mor Griv, Maxim Kalaev, Rivka M. Matosevich
-
Publication number: 20200019316Abstract: A mega cluster storage system includes clusters of multiple storage modules. Each module is able to access a portion of the data within the mega cluster and serves as a proxy in order for another storage module to access the remaining portion of the data. A cluster is assigned to a unique cluster volume and all the data within the cluster volume is accessible by all of the modules within the cluster. Each host connection to the mega cluster is associated with a particular cluster volume. A module that receives a host I/O request determines whether the I/O request should be satisfied by a module within its own cluster or be satisfied by a module within a different cluster. The module may forward the I/O request to a module within a different cluster as indicated by a distribution data structure that is allocated and stored within each storage module.Type: ApplicationFiled: September 20, 2019Publication date: January 16, 2020Inventors: Zah Barzik, Dan Ben-Yaacov, Mor Griv, Maxim Kalaev, Rivka M. Matosevich
-
Patent number: 10521112Abstract: A mega cluster storage system includes clusters of multiple storage modules. Each module is able to access a portion of the data within the mega cluster and serves as a proxy in order for another storage module to access the remaining portion of the data. A cluster is assigned to a unique cluster volume and all the data within the cluster volume is accessible by all of the modules within the cluster. Each host connection to the mega cluster is associated with a particular cluster volume. A module that receives a host I/O request determines whether the I/O request should be satisfied by a module within its own cluster or be satisfied by a module within a different cluster. The module may forward the I/O request to a module within a different cluster as indicated by a distribution data structure that is allocated and stored within each storage module.Type: GrantFiled: March 17, 2017Date of Patent: December 31, 2019Assignee: International Business Machines CorporationInventors: Zah Barzik, Dan Ben-Yaacov, Mor Griv, Maxim Kalaev, Rivka M. Matosevich
-
Publication number: 20180267707Abstract: A mega cluster storage system includes clusters of multiple storage modules. Each module is able to access a portion of the data within the mega cluster and serves as a proxy in order for another storage module to access the remaining portion of the data. A cluster is assigned to a unique cluster volume and all the data within the cluster volume is accessible by all of the modules within the cluster. Each host connection to the mega cluster is associated with a particular cluster volume. A module that receives a host I/O request determines whether the I/O request should be satisfied by a module within its own cluster or be satisfied by a module within a different cluster. The module may forward the I/O request to a module within a different cluster as indicated by a distribution data structure that is allocated and stored within each storage module.Type: ApplicationFiled: March 17, 2017Publication date: September 20, 2018Inventors: Zah Barzik, Dan Ben-Yaacov, Mor Griv, Maxim Kalaev, Rivka M. Matosevich
-
Patent number: 9043924Abstract: A method and a system for detecting one or more security vulnerabilities. The method comprises providing test instructions for an application, such as a web application or a client server application, adding test code to a code segment of the application according to the test instructions, sending at least one message to the application according to the test instructions at runtime thereof, monitoring test information pertaining to at least one reaction of the application to the at least one message during an execution of the test code, performing an analysis of the at least one reaction, and detecting a presence or an absence of at least one security vulnerability according to the analysis.Type: GrantFiled: May 12, 2014Date of Patent: May 26, 2015Assignee: Seeker Security Ltd.Inventors: Ofer Maor, Eran Tamir, Tamir Shavro, Mor Griv
-
Publication number: 20140331327Abstract: A method and a system for detecting one or more security vulnerabilities. The method comprises providing test instructions for an application, such as a web application or a client server application, adding test code to a code segment of the application according to the test instructions, sending at least one message to the application according to the test instructions at runtime thereof, monitoring test information pertaining to at least one reaction of the application to the at least one message during an execution of the test code, performing an analysis of the at least one reaction, and detecting a presence or an absence of at least one security vulnerability according to the analysis.Type: ApplicationFiled: May 12, 2014Publication date: November 6, 2014Applicant: Seeker Security Ltd.Inventors: Ofer MAOR, Eran Tamir, Tamir Shavro, Mor Griv
-
Patent number: 8726394Abstract: A method and a system for detecting one or more security vulnerabilities. The method comprises providing test instructions for an application, such as a web application or a client server application, adding test code to a code segment of the application according to the test instructions, sending at least one message to the application according to the test instructions at runtime thereof, monitoring test information pertaining to at least one reaction of the application to the at least one message during an execution of the test code, performing an analysis of the at least one reaction, and detecting a presence or an absence of at least one security vulnerability according to the analysis.Type: GrantFiled: December 14, 2010Date of Patent: May 13, 2014Assignee: Seeker Security Ltd.Inventors: Ofer Maor, Eran Tamir, Tamir Shavro, Mor Griv
-
Publication number: 20120260344Abstract: A method and a system for detecting one or more security vulnerabilities. The method comprises providing test instructions for an application, such as a web application or a client server application, adding test code to a code segment of the application according to the test instructions, sending at least one message to the application according to the test instructions at runtime thereof, monitoring test information pertaining to at least one reaction of the application to the at least one message during an execution of the test code, performing an analysis of the at least one reaction, and detecting a presence or an absence of at least one security vulnerability according to the analysis.Type: ApplicationFiled: December 14, 2010Publication date: October 11, 2012Inventors: Ofer Maor, Eran Tamir, Tamir Shavro, Mor Griv
-
Publication number: 20060136685Abstract: A method and system is disclosed to maintain data consistency over an internet small computer system interface (iSCSI) network, for disaster recovery and remote data replication purposes. Data consistency and replication is maintained between primary and secondary sites geographically distant from each other. According to the method, a primary journal volume logs all changes (data writes) made to a primary volume, transmits the changes based on a preconfigured policy to a secondary journal volume, and thereafter merges the changes stored in the secondary journal volume with a secondary volume. Changes in the journal volumes are ordered in point-in-time (PiT) frames and transmitted using a vendor specific SCSI command utilizing the iSCSI protocol.Type: ApplicationFiled: December 17, 2004Publication date: June 22, 2006Inventors: Mor Griv, Ronny Sayag, Philip Derbeko
-
Publication number: 20050198186Abstract: A method and apparatus for automatic discovery of logical units (LUs) and storage devices connected to a device in a storage network, the LUs being discovered with their associated LU paths. The method and apparatus performs, for each target path, discovering LUs exposed on said target path; iteratively, for each discovered LU generating a list of LU paths associated with the discovered LU; retrieving at least attributes related to said discovered LU; and, correlating between identical LUs, thereby identifying LU paths directing to the same LU.Type: ApplicationFiled: January 20, 2004Publication date: September 8, 2005Inventor: Mor Griv
-
Publication number: 20050114464Abstract: A virtualization switch and method for executing at least SCSI commands and performing virtualization in a in a Storage Area Network. The virtualization switch optimizes the data received from the network to fit the capacity of the target storage devices, thus providing higher throughput and low latency. The virtualization is preformed within the data path between the hosts and the storage devices and without the assistance of devices, such as a management stations or agents installed in the hosts.Type: ApplicationFiled: October 27, 2003Publication date: May 26, 2005Inventors: Shai Amir, Sarel Altshuler, Philip Derbeko, Mor Griv, Ronny Sayag