Patents by Inventor Dean Har'el Lorenz

Dean Har'el Lorenz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240086217
    Abstract: According to an aspect, a network interface card having a processor, a set of resources, and a plurality of virtual functions is provided. Each virtual function of the network interface card is configured to provide network access to a workload. The processor of the network interface card is configured to allocate the set of resources among the plurality of virtual functions, and wherein the allocation of the set of resources is non-uniform across the plurality of virtual functions.
    Type: Application
    Filed: September 9, 2022
    Publication date: March 14, 2024
    Inventors: Etai Lev Ran, Dean Har'el Lorenz, LIRAN SCHOUR
  • Patent number: 11924179
    Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be communicated from the user space software to a network communication device via an application programming interface. Outbound session packets can be communicated from the user space software to the network communication device. The network communication device can generate encrypted outbound session packets by encrypting the outbound session packets using the private session key; communicate to the client device, via the secured communication tunnel, the encrypted outbound session packets; receive, by the network communication device from the client device, via the secured communication tunnel, inbound session packets; generate decrypted inbound session packets by decrypting the inbound session packets using the private session key; and communicate the decrypted inbound session packets.
    Type: Grant
    Filed: August 8, 2022
    Date of Patent: March 5, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
  • Patent number: 11916890
    Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be accessed from a cryptographic service. The private session key can be communicated from the user space software to a network communication device. Outbound session packets can be communicated from the user space software to the network communication device. The network communication device can be configured to generate encrypted outbound session packets by encrypting the outbound session packets using the private session key; communicate to the client device, via the secured communication tunnel, the encrypted outbound session packets; receive from the client device, via the secured communication tunnel, inbound session packets; generate decrypted inbound session packets by decrypting the inbound session packets using the private session key; and communicate the decrypted inbound session packets.
    Type: Grant
    Filed: August 8, 2022
    Date of Patent: February 27, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
  • Publication number: 20240048541
    Abstract: A protocol stack can be offloaded to a network communication device. A private session key can be communicated from the user space software to a network communication device via an application programming interface. Outbound session packets can be communicated from the user space software to the network communication device. The network communication device can be configured to process headers in the outbound session packets, generate encrypted outbound session packets by encrypting the outbound session packets using the private session key, and communicate to a client device via the secured communication tunnel, the encrypted outbound session packets.
    Type: Application
    Filed: August 8, 2022
    Publication date: February 8, 2024
    Inventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
  • Publication number: 20240048536
    Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be communicated from the user space software to a network communication device via an application programming interface. Outbound session packets can be communicated from the user space software to the network communication device. The network communication device can generate encrypted outbound session packets by encrypting the outbound session packets using the private session key; communicate to the client device, via the secured communication tunnel, the encrypted outbound session packets; receive, by the network communication device from the client device, via the secured communication tunnel, inbound session packets; generate decrypted inbound session packets by decrypting the inbound session packets using the private session key; and communicate the decrypted inbound session packets.
    Type: Application
    Filed: August 8, 2022
    Publication date: February 8, 2024
    Inventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
  • Publication number: 20240048537
    Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be accessed from a cryptographic service. The private session key can be communicated from the user space software to a network communication device. Outbound session backets can be communicated from the user space software to the network communication device. The network communication device can be configured to generate encrypted outbound session packets by encrypting the outbound session packets using the private session key; communicate to the client device, via the secured communication tunnel, the encrypted outbound session packets; receive from the client device, via the secured communication tunnel, inbound session packets; generate decrypted inbound session packets by decrypting the inbound session packets using the private session key; and communicate the decrypted inbound session packets.
    Type: Application
    Filed: August 8, 2022
    Publication date: February 8, 2024
    Inventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
  • Publication number: 20240048373
    Abstract: A network communication device can receive a private session key from a data processing system. A first work queue element can be received in a send queue of the network communication device. The first work queue element can indicate outbound session data to be communicated to a client device. Responsive to receiving the first work queue element, the network communication device can generate encrypted outbound session data by encrypting the outbound session data using the private session key. The network communication device can communicate, via remote directory memory access (RDMA) over a secured communication tunnel, the encrypted outbound session data to the client device.
    Type: Application
    Filed: August 8, 2022
    Publication date: February 8, 2024
    Inventors: Renato J. Recio, Eran Gampel, Gal Sagi, Ryan Moats, Bernard Metzler, Ravinder Reddy Amanaganti, Etai Lev Ran, Dean Har'el Lorenz
  • Publication number: 20240048538
    Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be communicated from the user space software to a network communication device in at least one User Datagram Protocol datagram. Outbound session backets can be communicated from the user space software to the network communication device.
    Type: Application
    Filed: August 31, 2023
    Publication date: February 8, 2024
    Inventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Etai Lev Ran, Dean Har'el Lorenz, Ravinder Reddy Amanaganti
  • Patent number: 11765142
    Abstract: A secure communication tunnel between user space software and a client device can be established. A private session key can be communicated from the user space software to a network communication device in at least one User Datagram Protocol datagram. Outbound session backets can be communicated from the user space software to the network communication device.
    Type: Grant
    Filed: August 8, 2022
    Date of Patent: September 19, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Renato J. Recio, Ryan Moats, Eran Gampel, Gal Sagi, Etai Lev Ran, Dean Har'el Lorenz, Ravinder Reddy Amanaganti
  • Patent number: 11616721
    Abstract: Various embodiments are directed to receiving, at a receiving device, a packet from a node in a first network. determining a version identifier for the packet, encoding the version identifier into the packet, and transmitting the packet containing the encoded version identifier to a load balancing device in a second network. The version identifier may be encoded into a destination port field of the packet. The receiving device may be a perimeter network address translation device. The packet is received at the load balancing device, where the version identifier is extracted and a hash of source address information is performed. The version and hash are used to select a back-end device in the second network. The packet is transmitted to the selected back-end device.
    Type: Grant
    Filed: November 24, 2020
    Date of Patent: March 28, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dean Har′el Lorenz, Katherine Barabash, Etai Lev Ran, Alexey Roytman
  • Publication number: 20220166719
    Abstract: Various embodiments are directed to receiving, at a receiving device, a packet from a node in a first network. determining a version identifier for the packet, encoding the version identifier into the packet, and transmitting the packet containing the encoded version identifier to a load balancing device in a second network. The version identifier may be encoded into a destination port field of the packet. The receiving device may be a perimeter network address translation device. The packet is received at the load balancing device, where the version identifier is extracted and a hash of source address information is performed. The version and hash are used to select a back-end device in the second network. The packet is transmitted to the selected back-end device.
    Type: Application
    Filed: November 24, 2020
    Publication date: May 26, 2022
    Inventors: Dean Har'el Lorenz, KATHERINE BARABASH, Etai Lev Ran, Alexey Roytman
  • Patent number: 11150953
    Abstract: Embodiments of the present systems and methods may provide a consistent hash function that provides reduced memory use and complexity, reduced computational complexity, and relatively low numbers of keys that must be reshuffled compared to current techniques. For example, in an embodiment, a computer-implemented method for controlling computing resources may comprise storing a set of labels of potential resources comprising a plurality of labels of working resources allocated to actual resources and a plurality of labels of reserved resources available to be allocated, generating an initial assignment to one of the set of labels of potential resources, when the assignment to one of a set of labels of potential resources is to one of the labels of reserved resources, reassigning the request to another label of a resource selected from a subset of the labels of potential resources, and repeating the reassigning until the request is assigned to a label of a working resource.
    Type: Grant
    Filed: November 6, 2019
    Date of Patent: October 19, 2021
    Assignee: International Business Machines Corporation
    Inventors: Dean Har'el Lorenz, Gal Mendelson, Valleriya Perelman
  • Patent number: 11068351
    Abstract: Switching from primary to backup data storage by preparing a backup copy of multiple data sets, where, prior to the preparing, the backup copy is updated in accordance with a backup protocol specifying synchronously updating the backup copy to reflect changes made to one type of data stored in a primary copy of the data sets, and asynchronously updating the backup copy to reflect changes made to another type of data stored in the primary copy, and where the preparing includes identifying any inconsistency in any interdependent data in the data sets of the backup copy in accordance with a predefined schema of interdependent data in the data sets, and correcting any identified inconsistency in the data sets of the backup copy in accordance with a predefined inconsistency correction protocol, and causing the backup copy to be used in place of the primary copy for directly servicing data transactions.
    Type: Grant
    Filed: November 19, 2018
    Date of Patent: July 20, 2021
    Assignee: International Business Machines Corporation
    Inventors: Dean Har'el Lorenz, Roie Melamed, Alexey Roytman, Aidan Shribman
  • Patent number: 10749765
    Abstract: A method, system and computer program product, the method comprising: in response to receiving a packet from a stream of packets transmitted to a computing platform, determining, based on a meta-data of the packet, whether to capture the packet or avoid capturing thereof, said determining comprising: subject to the meta-data indicating that a sequence number of the packet is within a first range or within a second range, wherein a distance between an end of the first range and a beginning of the second range is at least of a predetermined size, wherein a distance, through a wraparound, between an end of the second range and a beginning of the first range is at least of the predetermined size, thereby a wraparound situation is identifiable within the stream of packets; and in response to determining to capture the packet: capturing the packet; and transmitting the packet to analysis.
    Type: Grant
    Filed: January 8, 2019
    Date of Patent: August 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: Katherine Barabash, Dean Har'el Lorenz, Eran Raichstein, Liran Schour
  • Publication number: 20200220794
    Abstract: A method, system and computer program product, the method comprising: in response to receiving a packet from a stream of packets transmitted to a computing platform, determining, based on a meta-data of the packet, whether to capture the packet or avoid capturing thereof, said determining comprising: subject to the meta-data indicating that a sequence number of the packet is within a first range or within a second range, wherein a distance between an end of the first range and a beginning of the second range is at least of a predetermined size, wherein a distance, through a wraparound, between an end of the second range and a beginning of the first range is at least of the predetermined size, thereby a wraparound situation is identifiable within the stream of packets; and in response to determining to capture the packet: capturing the packet; and transmitting the packet to analysis.
    Type: Application
    Filed: January 8, 2019
    Publication date: July 9, 2020
    Inventors: Katherine Barabash, Dean Har'el Lorenz, Eran Raichstein, Liran Schour
  • Publication number: 20200159626
    Abstract: Switching from primary to backup data storage by preparing a backup copy of multiple data sets, where, prior to the preparing, the backup copy is updated in accordance with a backup protocol specifying synchronously updating the backup copy to reflect changes made to one type of data stored in a primary copy of the data sets, and asynchronously updating the backup copy to reflect changes made to another type of data stored in the primary copy, and where the preparing includes identifying any inconsistency in any interdependent data in the data sets of the backup copy in accordance with a predefined schema of interdependent data in the data sets, and correcting any identified inconsistency in the data sets of the backup copy in accordance with a predefined inconsistency correction protocol, and causing the backup copy to be used in place of the primary copy for directly servicing data transactions.
    Type: Application
    Filed: November 19, 2018
    Publication date: May 21, 2020
    Inventors: Dean Har'el Lorenz, Roie Melamed, Alexey Roytman, Aidan Shribman
  • Publication number: 20200073719
    Abstract: Embodiments of the present systems and methods may provide a consistent hash function that provides reduced memory use and complexity, reduced computational complexity, and relatively low numbers of keys that must be reshuffled compared to current techniques. For example, in an embodiment, a computer-implemented method for controlling computing resources may comprise storing a set of labels of potential resources comprising a plurality of labels of working resources allocated to actual resources and a plurality of labels of reserved resources available to be allocated, generating an initial assignment to one of the set of labels of potential resources, when the assignment to one of a set of labels of potential resources is to one of the labels of reserved resources, reassigning the request to another label of a resource selected from a subset of the labels of potential resources, and repeating the reassigning until the request is assigned to a label of a working resource.
    Type: Application
    Filed: November 6, 2019
    Publication date: March 5, 2020
    Inventors: Dean Har'el LORENZ, Gal MENDELSON, Valleriya PERELMAN
  • Publication number: 20200026567
    Abstract: Embodiments of the present systems and methods may provide a consistent hash function that provides reduced memory use and complexity, reduced computational complexity, and relatively low numbers of keys that must be reshuffled compared to current techniques. For example, in an embodiment, a computer-implemented method for controlling computing resources may comprise storing a set of labels of potential resources comprising a plurality of labels of working resources allocated to actual resources and a plurality of labels of reserved resources available to be allocated, generating an initial assignment to one of the set of labels of potential resources, when the assignment to one of a set of labels of potential resources is to one of the labels of reserved resources, reassigning the request to another label of a resource selected from a subset of the labels of potential resources, and repeating the reassigning until the request is assigned to a label of a working resource.
    Type: Application
    Filed: July 18, 2018
    Publication date: January 23, 2020
    Inventors: DEAN HAR'EL LORENZ, Gal Mendelson, Valleriya Perelman
  • Patent number: 10540207
    Abstract: Embodiments of the present systems and methods may provide a consistent hash function that provides reduced memory use and complexity, reduced computational complexity, and relatively low numbers of keys that must be reshuffled compared to current techniques. For example, in an embodiment, a computer-implemented method for controlling computing resources may comprise storing a set of labels of potential resources comprising a plurality of labels of working resources allocated to actual resources and a plurality of labels of reserved resources available to be allocated, generating an initial assignment to one of the set of labels of potential resources, when the assignment to one of a set of labels of potential resources is to one of the labels of reserved resources, reassigning the request to another label of a resource selected from a subset of the labels of potential resources, and repeating the reassigning until the request is assigned to a label of a working resource.
    Type: Grant
    Filed: July 18, 2018
    Date of Patent: January 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Dean Har'el Lorenz, Gal Mendelson, Valleriya Perelman
  • Patent number: 10541909
    Abstract: An embodiment of the invention may include a method, computer program product, and system for data transfer management. The embodiment may include receiving a data packet, by a first server, from a load balancer. The received data packet is part of a data flow. The embodiment may include determining, by the first server, whether the received data packet is part of an existing data flow connection served by the first server. Based on determining that the received data packet is not part of an existing data flow served by the first server, the embodiment may include determining, by the first server, whether the received data packet is part of a new data flow connection. Based on determining that the received data packet is not part of a new data flow connection, the embodiment may include notifying, by the first server, the load balancer.
    Type: Grant
    Filed: June 23, 2017
    Date of Patent: January 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Dean Har'el Lorenz, Valleriya Perelman