Patents Assigned to NeoScale Systems
  • Publication number: 20090119752
    Abstract: A method processing one or more files using a security application. The method includes a method processing one or more files using a security application. The method includes connecting the client to a proxy server, which is coupled to one or more NAS servers. The method includes requesting for a file from a client to the proxy server and authenticating a requesting user of the client. The method also includes authorizing the requesting user for the file requested; requesting for the file from the one or more NAS servers after authenticating and authorizing; and requesting for the file from the one or more storage elements. The file is transferred from the one or more storage elements through the NAS server to the proxy server. The method determines header information on the file at the proxy server and identifies a policy based upon the header information at the proxy server. The method also includes processing (e.g.
    Type: Application
    Filed: November 29, 2007
    Publication date: May 7, 2009
    Applicant: NeoScale Systems, Inc.
    Inventors: Ganesan Chandrashekhar, Sanjay Sawhney, Hemant Puri, Aseem Vaid, Dharmesh Shah
  • Publication number: 20090013016
    Abstract: System and method for processing data for data security. A method for encrypting a data file includes a step for providing an input file, which can be characterized by an input length, and providing a number of output files that include a first output file and a second output file. The first output is characterized by a first output length. The first output length is associated with the input length and the number of output files. The first output file includes a header section and a data section. The header section includes information associated with the number. In addition, the method includes a step for determining a first location and a second location of the input file. The second location is behind the first location by a known length.
    Type: Application
    Filed: July 6, 2007
    Publication date: January 8, 2009
    Applicant: NeoScale Systems, Inc.
    Inventors: Landon Curt Noll, Charles Adley LeBlanc
  • Publication number: 20080273706
    Abstract: Embodiments of the present invention provide controlled access to key management servers using store and forward protocols. A computer-implemented method for providing controlled key management includes generating a request indicative of a key management function. The request is received at the first of a number of intermediate parties capable of relaying the request toward a key management server. The key management function is performed subsequent to receiving the request from the last of the intermediate parties which is authorized to provide the request to the key management server. A response to the request is then generated.
    Type: Application
    Filed: May 4, 2007
    Publication date: November 6, 2008
    Applicant: NeoScale Systems
    Inventor: Landon Curt Noll
  • Publication number: 20060277387
    Abstract: System and method for hardware allocation of memory resources. According to an embodiment, the present invention provides a method for allocating memory resources. The method includes a step for providing a plurality of lookup table. Each of the lookup table includes indicators indicating an availability for memory locations. The plurality of lookup table includes at least one top level lookup table and one or more bottom level lookup tables. The method includes a step for providing at least one pointer. The at least one pointer is used to indicate one or more sequential sets of available memory blocks. Additionally, the method includes a step for determining whether a first condition is satisfied. The first condition is associated with an availability of memory blocks being indicated by the at least one pointer. Furthermore, the method includes a step for determining a next pointer if the first condition is satisfied.
    Type: Application
    Filed: April 18, 2006
    Publication date: December 7, 2006
    Applicant: NeoScale Systems, Inc.
    Inventor: Robert Rhoades
  • Publication number: 20050080761
    Abstract: An apparatus for security applications, e.g., encryption. The apparatus has an interface (e.g., MAC) coupled to a fiber channel. The interface is adapted to receive a frame from the fiber channel. The apparatus also has a classifier coupled to the interface, which is adapted to determine an information type associated with the frame. The type is selected from at least an initiator, data, or terminator. The classifier is adapted to determine header information associated with the frame. A content addressable memory is coupled to the classifier.
    Type: Application
    Filed: October 14, 2003
    Publication date: April 14, 2005
    Applicant: NeoScale Systems
    Inventors: Kumar Sundararajan, Upendra Mardikar, Richard Moeller, Soummya Mallick, Rainer Enders, Sanjay Sawhney
  • Publication number: 20050041812
    Abstract: A system (and methods) for performing a service operation on a Fibre Channel or other like channels. The system has an interface coupled to a Fibre Channel. A classifier is coupled to the interface. The classifier is adapted to receive an initiator frame from the interface. The classifier is adapted to determine header information from the initiator frame and is also adapted to determine source information, destination information, and exchange information from the header information. A flow content addressable memory is coupled to the classifier. The flow content addressable memory is configured to store one or more header information. Each of the one or more header information is associated with a state. The system has a rule content addressable memory coupled to the classifier. The rule content addressable memory is configured to store one of a plurality of policies. A processing module is coupled to the classifier.
    Type: Application
    Filed: October 17, 2003
    Publication date: February 24, 2005
    Applicant: NeoScale Systems, Inc.
    Inventors: Kumar Sundararajan, Dharmesh Shah, Sanjay Sawhney, Atul Pandit, Aseem Vaid, Richard Moeller
  • Publication number: 20050033988
    Abstract: A method processing one or more files using a security application. The method includes a method processing one or more files using a security application. The method includes connecting the client to a proxy server, which is coupled to one or more NAS servers. The method includes requesting for a file from a client to the proxy server and authenticating a requesting user of the client. The method also includes authorizing the requesting user for the file requested; requesting for the file from the one or more NAS servers after authenticating and authorizing; and requesting for the file from the one or more storage elements. The file is transferred from the one or more storage elements through the NAS server to the proxy server. The method determines header information on the file at the proxy server and identifies a policy based upon the header information at the proxy server. The method also includes processing (e.g.
    Type: Application
    Filed: October 17, 2003
    Publication date: February 10, 2005
    Applicant: NeoScale Systems, Inc.
    Inventors: Ganesan Chandrashekhar, Sanjay Sawhney, Hemant Puri, Aseem Vaid, Dharmesh Shah