Patents by Inventor Ariel Waizel
Ariel Waizel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230123734Abstract: Establishing proxy-less connectivity from logically isolated virtual private clouds (VPC)within a cloud environment without the use of VPN or VPC peering is provided. Establishing a service attachment in one VPC, related to a service which is to be accessed, and a service endpoint in another VPC allows for private communication between the two networks without exposing the service to other VPCs in the cloud environment.Type: ApplicationFiled: October 20, 2022Publication date: April 20, 2023Inventors: Eli Oxman, Salomon Sonny Ben-Shimon, Anshuman Gupta, Alok Kumar, Ittai Balaban, Benjamin John Benardos, Sameer Adhikari, Mukta Gupta, Anjin Guo, Pierre-Emmanuel Ettori, Noam Lampert, Uday Ramakrishna Naik, Jesse Louis Alpert, Ines Clara Envid Lazaro, Uri Goren, Ariel Waizel
-
Patent number: 10805073Abstract: Provided are a computer program product, system, and method for generating master and wrapper keys for connected devices in a key generation scheme. For each of the devices, a wrapped master key comprising a master key for the device and a wrapper key is stored. The wrapper keys for a plurality of the devices are generated by another of the devices. For each of a plurality of the devices, the master key for the device is used to generate the wrapper key for a target device comprising another of the devices. For each of the devices, the wrapper key for the device is used to decrypt the stored wrapped master key. At least one of the devices uses the master key for the device to encrypt and decrypt data at the device.Type: GrantFiled: January 2, 2019Date of Patent: October 13, 2020Assignee: International Business Machines CorporationInventors: Ronen Gazit, Ron S. Shapiro, Lior Shlomov, Ariel Waizel, Guy-Arie Yur
-
Patent number: 10657013Abstract: Provided are a computer program product, computer system, and method for smart selection of a storage module to be excluded when a connection between two storage modules is broken. An indication is received from a first storage module that a connection between the first storage module and a second storage module is broken. In response to determining that the second storage module is accessible, values of exclusion criteria for the first storage module are determined and summed to identify a first exclusion total. Then, values of exclusion criteria for the second storage module are determined and summed to identify a second exclusion total. In response to determining that the first exclusion total exceeds the second exclusion total, the second storage node is excluded from the cluster. In response to determining that the second exclusion total exceeds the first exclusion total, the first storage node is excluded from the cluster.Type: GrantFiled: December 5, 2017Date of Patent: May 19, 2020Assignee: International Business Machines CorporationInventors: Michael Keller, Ofer Leneman, Osnat Shasha, Lior Shlomov, Ariel Waizel
-
Publication number: 20190140824Abstract: Provided are a computer program product, system, and method for generating master and wrapper keys for connected devices in a key generation scheme. For each of the devices, a wrapped master key comprising a master key for the device and a wrapper key is stored. The wrapper keys for a plurality of the devices are generated by another of the devices. For each of a plurality of the devices, the master key for the device is used to generate the wrapper key for a target device comprising another of the devices. For each of the devices, the wrapper key for the device is used to decrypt the stored wrapped master key. At least one of the devices uses the master key for the device to encrypt and decrypt data at the device.Type: ApplicationFiled: January 2, 2019Publication date: May 9, 2019Inventors: Ronen Gazit, Ron S. Shapiro, Lior Shlomov, Ariel Waizel, Guy-Arie Yur
-
Patent number: 10237061Abstract: Provided are a computer program product, system, and method for generating master and wrapper keys for connected devices in a key generation scheme. For each of the devices, a wrapped master key comprising a master key for the device and a wrapper key is stored. The wrapper keys for a plurality of the devices are generated by another of the devices. For each of a plurality of the devices, the master key for the device is used to generate the wrapper key for a target device comprising another of the devices. For each of the devices, the wrapper key for the device is used to decrypt the stored wrapped master key. At least one of the devices uses the master key for the device to encrypt and decrypt data at the device.Type: GrantFiled: September 25, 2015Date of Patent: March 19, 2019Assignee: International Business Machines CorporationInventors: Ronen Gazit, Ron S. Shapiro, Lior Shlomov, Ariel Waizel, Guy-Arie Yur
-
Patent number: 10061638Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include configuring, at a first time, a clustered storage system comprising multiple modules to store and process storage requests for respective sets of data objects. While processing the storage requests, respective subsets of the data objects having one or more data errors are identified, and at a second time subsequent to the first time, respective modules storing each of the data objects having at least one data error are identified. computing, based on the identified modules, a frequency distribution of the identified data errors in the data objects over the multiple modules. Based on the frequency distribution, a failure in a given module is identified, and the identified module is removed from the storage system. In some embodiments, prior to the second time, the data objects can be redistributed among the modules of the storage system.Type: GrantFiled: March 29, 2016Date of Patent: August 28, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jonathan Fischer-Toubol, Ronen Gazit, Afief Halumi, Lior Shlomov, Ariel Waizel
-
Publication number: 20180159758Abstract: Examples described herein relate to virtual Media Access Control (MAC) addresses. In some such examples, a method includes receiving, at a first provider edge router, a discovery request for a MAC address of a first host communicatively coupled to the first provider edge router. The first provider edge router assigns a virtual Media Access Control (MAC) address to the first host. The virtual MAC address includes a host identifier of the first host. The virtual MAC address is provided from the first provider edge router to a second provider edge router for communication with the first host by a second host communicatively coupled to the second provider edge router.Type: ApplicationFiled: December 1, 2016Publication date: June 7, 2018Inventor: Ariel Waizel
-
Publication number: 20180095853Abstract: Provided are a computer program product, computer system, and method for smart selection of a storage module to be excluded when a connection between two storage modules is broken. An indication is received from a first storage module that a connection between the first storage module and a second storage module is broken. In response to determining that the second storage module is accessible, values of exclusion criteria for the first storage module are determined and summed to identify a first exclusion total. Then, values of exclusion criteria for the second storage module are determined and summed to identify a second exclusion total. In response to determining that the first exclusion total exceeds the second exclusion total, the second storage node is excluded from the cluster. In response to determining that the second exclusion total exceeds the first exclusion total, the first storage node is excluded from the cluster.Type: ApplicationFiled: December 5, 2017Publication date: April 5, 2018Inventors: Michael Keller, Ofer Leneman, Osnat Shasha, Lior Shlomov, Ariel Waizel
-
Patent number: 9898378Abstract: Provided are a computer program product, computer system, and method for smart selection of a storage module to be excluded when a connection between two storage modules is broken. An indication is received from a first storage module that a connection between the first storage module and a second storage module is broken. In response to determining that the second storage module is accessible, values of exclusion criteria for the first storage module are determined and summed to identify a first exclusion total. Then, values of exclusion criteria for the second storage module are determined and summed to identify a second exclusion total. In response to determining that the first exclusion total exceeds the second exclusion total, the second storage node is excluded from the cluster. In response to determining that the second exclusion total exceeds the first exclusion total, the first storage node is excluded from the cluster.Type: GrantFiled: November 10, 2015Date of Patent: February 20, 2018Assignee: International Business Machines CorporationInventors: Michael Keller, Ofer Leneman, Osnat Shasha, Lior Shlomov, Ariel Waizel
-
Publication number: 20170286206Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include configuring, at a first time, a clustered storage system comprising multiple modules to store and process storage requests for respective sets of data objects. While processing the storage requests, respective subsets of the data objects having one or more data errors are identified, and at a second time subsequent to the first time, respective modules storing each of the data objects having at least one data error are identified. computing, based on the identified modules, a frequency distribution of the identified data errors in the data objects over the multiple modules. Based on the frequency distribution, a failure in a given module is identified, and the identified module is removed from the storage system. In some embodiments, prior to the second time, the data objects can be redistributed among the modules of the storage system.Type: ApplicationFiled: March 29, 2016Publication date: October 5, 2017Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jonathan FISCHER-TOUBOL, Ronen GAZIT, Afief HALUMI, Lior SHLOMOV, Ariel WAIZEL
-
Publication number: 20170132100Abstract: Provided are a computer program product, computer system, and method for smart selection of a storage module to be excluded when a connection between two storage modules is broken. An indication is received from a first storage module that a connection between the first storage module and a second storage module is broken. In response to determining that the second storage module is accessible, values of exclusion criteria for the first storage module are determined and summed to identify a first exclusion total. Then, values of exclusion criteria for the second storage module are determined and summed to identify a second exclusion total. In response to determining that the first exclusion total exceeds the second exclusion total, the second storage node is excluded from the cluster. In response to determining that the second exclusion total exceeds the first exclusion total, the first storage node is excluded from the cluster.Type: ApplicationFiled: November 10, 2015Publication date: May 11, 2017Inventors: Michael Keller, Ofer Leneman, Osnat Shasha, Lior Shlomov, Ariel Waizel
-
Publication number: 20170093563Abstract: Provided are a computer program product, system, and method for generating master and wrapper keys for connected devices in a key generation scheme. For each of the devices, a wrapped master key comprising a master key for the device and a wrapper key is stored. The wrapper keys for a plurality of the devices are generated by another of the devices. For each of a plurality of the devices, the master key for the device is used to generate the wrapper key for a target device comprising another of the devices. For each of the devices, the wrapper key for the device is used to decrypt the stored wrapped master key. At least one of the devices uses the master key for the device to encrypt and decrypt data at the device.Type: ApplicationFiled: September 25, 2015Publication date: March 30, 2017Inventors: Ronen Gazit, Ron S. Shapiro, Lior Shlomov, Ariel Waizel, Guy-Arie Yur