Patents by Inventor Dean Har'el Lorenz
Dean Har'el Lorenz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12088567Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be communicated from the user space software to a network communication device in at least one User Datagram Protocol datagram. Outbound session backets can be communicated from the user space software to the network communication device.Type: GrantFiled: August 31, 2023Date of Patent: September 10, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Etai Lev Ran, Dean Har'el Lorenz, Ravinder Reddy Amanaganti
-
Publication number: 20240086217Abstract: According to an aspect, a network interface card having a processor, a set of resources, and a plurality of virtual functions is provided. Each virtual function of the network interface card is configured to provide network access to a workload. The processor of the network interface card is configured to allocate the set of resources among the plurality of virtual functions, and wherein the allocation of the set of resources is non-uniform across the plurality of virtual functions.Type: ApplicationFiled: September 9, 2022Publication date: March 14, 2024Inventors: Etai Lev Ran, Dean Har'el Lorenz, LIRAN SCHOUR
-
Patent number: 11924179Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be communicated from the user space software to a network communication device via an application programming interface. Outbound session packets can be communicated from the user space software to the network communication device. The network communication device can generate encrypted outbound session packets by encrypting the outbound session packets using the private session key; communicate to the client device, via the secured communication tunnel, the encrypted outbound session packets; receive, by the network communication device from the client device, via the secured communication tunnel, inbound session packets; generate decrypted inbound session packets by decrypting the inbound session packets using the private session key; and communicate the decrypted inbound session packets.Type: GrantFiled: August 8, 2022Date of Patent: March 5, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
-
Patent number: 11916890Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be accessed from a cryptographic service. The private session key can be communicated from the user space software to a network communication device. Outbound session packets can be communicated from the user space software to the network communication device. The network communication device can be configured to generate encrypted outbound session packets by encrypting the outbound session packets using the private session key; communicate to the client device, via the secured communication tunnel, the encrypted outbound session packets; receive from the client device, via the secured communication tunnel, inbound session packets; generate decrypted inbound session packets by decrypting the inbound session packets using the private session key; and communicate the decrypted inbound session packets.Type: GrantFiled: August 8, 2022Date of Patent: February 27, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
-
Publication number: 20240048538Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be communicated from the user space software to a network communication device in at least one User Datagram Protocol datagram. Outbound session backets can be communicated from the user space software to the network communication device.Type: ApplicationFiled: August 31, 2023Publication date: February 8, 2024Inventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Etai Lev Ran, Dean Har'el Lorenz, Ravinder Reddy Amanaganti
-
Publication number: 20240048537Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be accessed from a cryptographic service. The private session key can be communicated from the user space software to a network communication device. Outbound session backets can be communicated from the user space software to the network communication device. The network communication device can be configured to generate encrypted outbound session packets by encrypting the outbound session packets using the private session key; communicate to the client device, via the secured communication tunnel, the encrypted outbound session packets; receive from the client device, via the secured communication tunnel, inbound session packets; generate decrypted inbound session packets by decrypting the inbound session packets using the private session key; and communicate the decrypted inbound session packets.Type: ApplicationFiled: August 8, 2022Publication date: February 8, 2024Inventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
-
Publication number: 20240048373Abstract: A network communication device can receive a private session key from a data processing system. A first work queue element can be received in a send queue of the network communication device. The first work queue element can indicate outbound session data to be communicated to a client device. Responsive to receiving the first work queue element, the network communication device can generate encrypted outbound session data by encrypting the outbound session data using the private session key. The network communication device can communicate, via remote directory memory access (RDMA) over a secured communication tunnel, the encrypted outbound session data to the client device.Type: ApplicationFiled: August 8, 2022Publication date: February 8, 2024Inventors: Renato J. Recio, Eran Gampel, Gal Sagi, Ryan Moats, Bernard Metzler, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
-
Publication number: 20240048541Abstract: A protocol stack can be offloaded to a network communication device. A private session key can be communicated from the user space software to a network communication device via an application programming interface. Outbound session packets can be communicated from the user space software to the network communication device. The network communication device can be configured to process headers in the outbound session packets, generate encrypted outbound session packets by encrypting the outbound session packets using the private session key, and communicate to a client device via the secured communication tunnel, the encrypted outbound session packets.Type: ApplicationFiled: August 8, 2022Publication date: February 8, 2024Inventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
-
Publication number: 20240048536Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be communicated from the user space software to a network communication device via an application programming interface. Outbound session packets can be communicated from the user space software to the network communication device. The network communication device can generate encrypted outbound session packets by encrypting the outbound session packets using the private session key; communicate to the client device, via the secured communication tunnel, the encrypted outbound session packets; receive, by the network communication device from the client device, via the secured communication tunnel, inbound session packets; generate decrypted inbound session packets by decrypting the inbound session packets using the private session key; and communicate the decrypted inbound session packets.Type: ApplicationFiled: August 8, 2022Publication date: February 8, 2024Inventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
-
Patent number: 11765142Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be communicated from the user space software to a network communication device in at least one User Datagram Protocol datagram. Outbound session backets can be communicated from the user space software to the network communication device.Type: GrantFiled: August 8, 2022Date of Patent: September 19, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Etai Lev Ran, Dean Har'el Lorenz, Ravinder Reddy Amanaganti
-
Patent number: 11616721Abstract: Various embodiments are directed to receiving, at a receiving device, a packet from a node in a first network. determining a version identifier for the packet, encoding the version identifier into the packet, and transmitting the packet containing the encoded version identifier to a load balancing device in a second network. The version identifier may be encoded into a destination port field of the packet. The receiving device may be a perimeter network address translation device. The packet is received at the load balancing device, where the version identifier is extracted and a hash of source address information is performed. The version and hash are used to select a back-end device in the second network. The packet is transmitted to the selected back-end device.Type: GrantFiled: November 24, 2020Date of Patent: March 28, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dean Har′el Lorenz, Katherine Barabash, Etai Lev Ran, Alexey Roytman
-
Publication number: 20220166719Abstract: Various embodiments are directed to receiving, at a receiving device, a packet from a node in a first network. determining a version identifier for the packet, encoding the version identifier into the packet, and transmitting the packet containing the encoded version identifier to a load balancing device in a second network. The version identifier may be encoded into a destination port field of the packet. The receiving device may be a perimeter network address translation device. The packet is received at the load balancing device, where the version identifier is extracted and a hash of source address information is performed. The version and hash are used to select a back-end device in the second network. The packet is transmitted to the selected back-end device.Type: ApplicationFiled: November 24, 2020Publication date: May 26, 2022Inventors: Dean Har'el Lorenz, KATHERINE BARABASH, Etai Lev Ran, Alexey Roytman
-
Patent number: 11150953Abstract: Embodiments of the present systems and methods may provide a consistent hash function that provides reduced memory use and complexity, reduced computational complexity, and relatively low numbers of keys that must be reshuffled compared to current techniques. For example, in an embodiment, a computer-implemented method for controlling computing resources may comprise storing a set of labels of potential resources comprising a plurality of labels of working resources allocated to actual resources and a plurality of labels of reserved resources available to be allocated, generating an initial assignment to one of the set of labels of potential resources, when the assignment to one of a set of labels of potential resources is to one of the labels of reserved resources, reassigning the request to another label of a resource selected from a subset of the labels of potential resources, and repeating the reassigning until the request is assigned to a label of a working resource.Type: GrantFiled: November 6, 2019Date of Patent: October 19, 2021Assignee: International Business Machines CorporationInventors: Dean Har'el Lorenz, Gal Mendelson, Valleriya Perelman
-
Patent number: 11068351Abstract: Switching from primary to backup data storage by preparing a backup copy of multiple data sets, where, prior to the preparing, the backup copy is updated in accordance with a backup protocol specifying synchronously updating the backup copy to reflect changes made to one type of data stored in a primary copy of the data sets, and asynchronously updating the backup copy to reflect changes made to another type of data stored in the primary copy, and where the preparing includes identifying any inconsistency in any interdependent data in the data sets of the backup copy in accordance with a predefined schema of interdependent data in the data sets, and correcting any identified inconsistency in the data sets of the backup copy in accordance with a predefined inconsistency correction protocol, and causing the backup copy to be used in place of the primary copy for directly servicing data transactions.Type: GrantFiled: November 19, 2018Date of Patent: July 20, 2021Assignee: International Business Machines CorporationInventors: Dean Har'el Lorenz, Roie Melamed, Alexey Roytman, Aidan Shribman
-
Patent number: 10749765Abstract: A method, system and computer program product, the method comprising: in response to receiving a packet from a stream of packets transmitted to a computing platform, determining, based on a meta-data of the packet, whether to capture the packet or avoid capturing thereof, said determining comprising: subject to the meta-data indicating that a sequence number of the packet is within a first range or within a second range, wherein a distance between an end of the first range and a beginning of the second range is at least of a predetermined size, wherein a distance, through a wraparound, between an end of the second range and a beginning of the first range is at least of the predetermined size, thereby a wraparound situation is identifiable within the stream of packets; and in response to determining to capture the packet: capturing the packet; and transmitting the packet to analysis.Type: GrantFiled: January 8, 2019Date of Patent: August 18, 2020Assignee: International Business Machines CorporationInventors: Katherine Barabash, Dean Har'el Lorenz, Eran Raichstein, Liran Schour
-
Publication number: 20200220794Abstract: A method, system and computer program product, the method comprising: in response to receiving a packet from a stream of packets transmitted to a computing platform, determining, based on a meta-data of the packet, whether to capture the packet or avoid capturing thereof, said determining comprising: subject to the meta-data indicating that a sequence number of the packet is within a first range or within a second range, wherein a distance between an end of the first range and a beginning of the second range is at least of a predetermined size, wherein a distance, through a wraparound, between an end of the second range and a beginning of the first range is at least of the predetermined size, thereby a wraparound situation is identifiable within the stream of packets; and in response to determining to capture the packet: capturing the packet; and transmitting the packet to analysis.Type: ApplicationFiled: January 8, 2019Publication date: July 9, 2020Inventors: Katherine Barabash, Dean Har'el Lorenz, Eran Raichstein, Liran Schour
-
Publication number: 20200159626Abstract: Switching from primary to backup data storage by preparing a backup copy of multiple data sets, where, prior to the preparing, the backup copy is updated in accordance with a backup protocol specifying synchronously updating the backup copy to reflect changes made to one type of data stored in a primary copy of the data sets, and asynchronously updating the backup copy to reflect changes made to another type of data stored in the primary copy, and where the preparing includes identifying any inconsistency in any interdependent data in the data sets of the backup copy in accordance with a predefined schema of interdependent data in the data sets, and correcting any identified inconsistency in the data sets of the backup copy in accordance with a predefined inconsistency correction protocol, and causing the backup copy to be used in place of the primary copy for directly servicing data transactions.Type: ApplicationFiled: November 19, 2018Publication date: May 21, 2020Inventors: Dean Har'el Lorenz, Roie Melamed, Alexey Roytman, Aidan Shribman
-
Publication number: 20200073719Abstract: Embodiments of the present systems and methods may provide a consistent hash function that provides reduced memory use and complexity, reduced computational complexity, and relatively low numbers of keys that must be reshuffled compared to current techniques. For example, in an embodiment, a computer-implemented method for controlling computing resources may comprise storing a set of labels of potential resources comprising a plurality of labels of working resources allocated to actual resources and a plurality of labels of reserved resources available to be allocated, generating an initial assignment to one of the set of labels of potential resources, when the assignment to one of a set of labels of potential resources is to one of the labels of reserved resources, reassigning the request to another label of a resource selected from a subset of the labels of potential resources, and repeating the reassigning until the request is assigned to a label of a working resource.Type: ApplicationFiled: November 6, 2019Publication date: March 5, 2020Inventors: Dean Har'el LORENZ, Gal MENDELSON, Valleriya PERELMAN
-
Publication number: 20200026567Abstract: Embodiments of the present systems and methods may provide a consistent hash function that provides reduced memory use and complexity, reduced computational complexity, and relatively low numbers of keys that must be reshuffled compared to current techniques. For example, in an embodiment, a computer-implemented method for controlling computing resources may comprise storing a set of labels of potential resources comprising a plurality of labels of working resources allocated to actual resources and a plurality of labels of reserved resources available to be allocated, generating an initial assignment to one of the set of labels of potential resources, when the assignment to one of a set of labels of potential resources is to one of the labels of reserved resources, reassigning the request to another label of a resource selected from a subset of the labels of potential resources, and repeating the reassigning until the request is assigned to a label of a working resource.Type: ApplicationFiled: July 18, 2018Publication date: January 23, 2020Inventors: DEAN HAR'EL LORENZ, Gal Mendelson, Valleriya Perelman
-
Patent number: 10540207Abstract: Embodiments of the present systems and methods may provide a consistent hash function that provides reduced memory use and complexity, reduced computational complexity, and relatively low numbers of keys that must be reshuffled compared to current techniques. For example, in an embodiment, a computer-implemented method for controlling computing resources may comprise storing a set of labels of potential resources comprising a plurality of labels of working resources allocated to actual resources and a plurality of labels of reserved resources available to be allocated, generating an initial assignment to one of the set of labels of potential resources, when the assignment to one of a set of labels of potential resources is to one of the labels of reserved resources, reassigning the request to another label of a resource selected from a subset of the labels of potential resources, and repeating the reassigning until the request is assigned to a label of a working resource.Type: GrantFiled: July 18, 2018Date of Patent: January 21, 2020Assignee: International Business Machines CorporationInventors: Dean Har'el Lorenz, Gal Mendelson, Valleriya Perelman