Patents by Inventor Harsha Hegde

Harsha Hegde has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210021563
    Abstract: A method for execution by a computing device of an access layer of an object storage system includes receiving, via a network, a request message from an edge node, wherein the request message indicates a requested access of a data object. An update frequency of the data object is determined in response to receiving the request message, and a cache time to live (TTL) is determined based on the update frequency. Performance of the requested access of the data object is facilitated in response to receiving the request message, and a response message that includes the cache TTL is generated in response to performing the requested access.
    Type: Application
    Filed: July 17, 2019
    Publication date: January 21, 2021
    Inventor: Harsha Hegde
  • Publication number: 20200412768
    Abstract: A method for execution by an access layer of an object storage system includes In various embodiments, a processing system of an access layer of an object storage system includes at least one processor and a memory that stores operational instructions, that when executed by the at least one processor cause the processing system to receive a request message from a requesting entity via a network, where the request message includes a pre-signed URL. A set of custom policy parameters are extracted from the pre-signed URL. Policy verification data is generated by comparing each attribute of a determined set of attributes of the access request to a corresponding custom policy parameter of the set of custom policy parameters. An access indicated in the request message is executed in response to the policy verification data indicating that each attribute compares favorably to the corresponding custom policy parameter.
    Type: Application
    Filed: June 28, 2019
    Publication date: December 31, 2020
    Inventors: Harsha Hegde, Nicholas G. Lange
  • Publication number: 20200319971
    Abstract: A method includes detecting, by a security module of a dispersed storage network (DSN), a potentially compromised encoded data slice (EDS) of a set of EDSs. The potentially compromised EDS is stored in a storage unit of a set of storage units of the DSN. The method further includes monitoring other storage units of the set of storage units to detect one or more other potentially compromised EDSs of the set of EDSs. When the one or more other potentially compromised EDSs are detected, the method includes determining a data compromise threat level based on the potentially compromised EDSs and the one or more other potentially compromised EDSs and enabling an automatic data preservation protocol based on the data compromise threat level. The automatic data preservation protocol includes one or more of: one or more data preservation options, one or more data tracking options, and one or more notification options.
    Type: Application
    Filed: April 8, 2019
    Publication date: October 8, 2020
    Inventors: Harsha Hegde, Robert T. Veitch
  • Publication number: 20200310656
    Abstract: A method begins by receiving a data access request regarding a data object. The method continues by determining whether the data object is a primary data object. When the data object is the primary data object, the method continues by identifying one or more other data objects based on information associated with the data object. The method continues by sending a modified data object retrieval request regarding the data object and the one or more other data objects to a storage entity, where the modified data object retrieval request includes a modified header. The method continues by receiving a modified data object retrieval response from the storage entity that includes a modified response header and a modified response body that includes the primary data object and the one or more other data objects. The method continues by outputting the data object and the one or more other data objects.
    Type: Application
    Filed: March 26, 2019
    Publication date: October 1, 2020
    Inventor: Harsha Hegde
  • Patent number: 10728333
    Abstract: In a data storage network, a data storage transfer is initiated over a communications link between a source endpoint and a storage endpoint. The data storage transfer is configured to transmit at least one data object from the source endpoint to the storage endpoint using a first transfer technology protocol of a plurality of transfer technology protocols supported by the storage endpoint. The source endpoint monitors at least one network performance parameter associated with the communication link between the source endpoint and the storage endpoint. During transfer of the at least one data object, the source endpoint automatically switches from the first transfer technology protocol to a second transfer technology protocol based, at least in part, on a result of the monitoring.
    Type: Grant
    Filed: August 1, 2018
    Date of Patent: July 28, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Harsha Hegde, Robert Veitch
  • Patent number: 10693640
    Abstract: Systems and Methods for encrypting and decrypting data in a dispersed storage network are disclosed. A data object may be encrypted using a data object specific encryption key, a container specific encryption key, a tenant account specific encryption key, or a time based encryption key. This specific, or more generally, secondary encryption key can be derived from a master or primary encryption key. Encryption key metadata pertaining to the master encryption key and the specific encryption key is also created and stored in the DSN. When reading an encrypted data object, the master encryption key can be retrieved and, along with the encryption key metadata, used to derive the specific encryption key. The specific encryption key can then be used to decrypt the encrypted data object to recover the data object.
    Type: Grant
    Filed: March 17, 2017
    Date of Patent: June 23, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Adam M. Gray, Harsha Hegde, Wesley B. Leggette, Manish Motwani, Jason K. Resch, Daniel J. Scholl, Mark D. Seaborn, Rohan P. Shah, Yogesh R. Vedpathak
  • Patent number: 10592335
    Abstract: A method for responding to a read request from a user for a set of encoded data slices (EDSs) in a distributed storage network begins with a processing module determining that a threshold number of encoded data slices is not available and continues with the processing module determining that one or more copies are available for the set of EDSs. The method continues with the processing module determining whether a combination of the one or more additional EDSs within the copy of the set of EDSs and the available EDSs from the set of EDSs is at least a read threshold number of EDSs, and when a read threshold is available based on the combination the processing module responds to the request using the combination.
    Type: Grant
    Filed: August 1, 2018
    Date of Patent: March 17, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Harsha Hegde, Venkata G. Badanahatti
  • Patent number: 10585748
    Abstract: A method begins by a computing device of a dispersed storage network (DSN) maintaining a queue of pending requests to access the DSN while new requests are added to the queue and executed requests are deleted from the queue. The method continues by the computing device determining, for each pending request in the queue, a prioritization score to produce a plurality of prioritization scores. The prioritization score is determined by determining an identity of a requestor associated with a pending request, obtaining a trust score based on the requestor's identity, and obtaining a compliance score based on the requestor's identity. The trust score indicates the requestor's level of legitimate use of the DSN and the compliance score indicates the requestor's level of compliance with DSN system requests. The method continues by the computing device executing pending requests of the queue in accordance with the plurality of prioritization scores.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: March 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Andrew D. Baptist, Bart R. Cilfone, Greg R. Dhuse, Harsha Hegde, Wesley B. Leggette, Manish Motwani, Jason K. Resch, Ilya Volvovski, Ethan S. Wozniak
  • Patent number: 10558389
    Abstract: A dispersed storage (DS) processing unit and method for quality of service (QoS) management in a dispersed or distributed storage network (DSN) are disclosed. The method includes receiving a request to access a set of encoded data slices from a first user computing device of a plurality of user computing devices of the DSN, where the set of encoded data slices is stored in a set of storage units of the DSN, and where a first storage container of a plurality of storage containers of the DSN includes the set of storage units and supports a first group of logical storage vaults of a plurality of logical storage vaults of the DSN, and the first user computing device is affiliated with a first logical storage vault of the first group of logical storage vaults. The method further includes determining a quality of service (QoS) matrix regarding the request when QoS issues exists.
    Type: Grant
    Filed: September 20, 2016
    Date of Patent: February 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Harsha Hegde, Wesley B. Leggette
  • Publication number: 20200045109
    Abstract: In a data storage network, a data storage transfer is initiated over a communications link between a source endpoint and a storage endpoint. The data storage transfer is configured to transmit at least one data object from the source endpoint to the storage endpoint using a first transfer technology protocol of a plurality of transfer technology protocols supported by the storage endpoint. The source endpoint monitors at least one network performance parameter associated with the communication link between the source endpoint and the storage endpoint. During transfer of the at least one data object, the source endpoint automatically switches from the first transfer technology protocol to a second transfer technology protocol based, at least in part, on a result of the monitoring.
    Type: Application
    Filed: August 1, 2018
    Publication date: February 6, 2020
    Inventors: Harsha Hegde, Robert Veitch
  • Publication number: 20200042381
    Abstract: A method for responding to a read request from a user for a set of encoded data slices (EDSs) in a distributed storage network begins with a processing module determining that a threshold number of encoded data slices is not available and continues with the processing module determining that one or more copies are available for the set of EDSs. The method continues with the processing module determining whether a combination of the one or more additional EDSs within the copy of the set of EDSs and the available EDSs from the set of EDSs is at least a read threshold number of EDSs, and when a read threshold is available based on the combination the processing module responds to the request using the combination.
    Type: Application
    Filed: August 1, 2018
    Publication date: February 6, 2020
    Inventors: Harsha Hegde, Venkata G. Badanahatti
  • Patent number: 10545699
    Abstract: A method for execution by a computing device within a dispersed storage network (DSN). The method beings when data accesses occur for a data object of a storage container within the DSN. The method continues by updating, for at least some of the data accesses, an object value for the data object to produce an updated object value. The method continues by updating an object retention cost for the data object to produce an updated object retention cost. The method continues by updating a data object retention policy for the data object based on the updated object value and the updated object retentions costs. When one of the data accesses is a deletion event, the method continues by utilizing a current updated data object retention policy to determine a deletion-retention option for the data object. The method continues by executing the deletion-retention option on the data object.
    Type: Grant
    Filed: April 11, 2017
    Date of Patent: January 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Andrew D. Baptist, Bart R. Cilfone, Greg R. Dhuse, Harsha Hegde, Wesley B. Leggette, Manish Motwani, Jason K. Resch, Ilya Volvovski, Ethan S. Wozniak
  • Patent number: 10540229
    Abstract: A method for execution by a dispersed storage and task (DST) processing unit includes determining to determine to overwrite an original data object stored in a plurality of storage units with an updated data object. Validation level data can be determined, where the validation level data indicates a data object overwrite level, a data region overwrite level, or a data segment overwrite level. Checksum metadata associated with the original data object can be retrieved in response to determining to overwrite an original data object. Overwriting of a subset of data regions or data segments of the original data object can be foregone in response to generating validation data that indicates their checksums in the checksum metadata compare favorably to corresponding overwrite checksum values.
    Type: Grant
    Filed: June 25, 2018
    Date of Patent: January 21, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Harsha Hegde, Venkata G. Badanahatti
  • Patent number: 10540111
    Abstract: A method for execution by a container instance manager (CIM) includes determining to create a new instance of a first data container, where the first data container is stored in a first memory location. Creation of the new instance of the first data container for storage in a second memory location is facilitated in response to the determining to create the new instance. The method further includes determining to remove a duplicate instance of a second data container. Deletion of the duplicate instance of the second data container from memory is facilitated in response to the determining to remove the duplicate instance.
    Type: Grant
    Filed: June 28, 2017
    Date of Patent: January 21, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rohan P. Shah, Harsha Hegde, Wesley B. Leggette, Daniel J. Scholl, Jason K. Resch, Yogesh R. Vedpathak, Manish Motwani
  • Publication number: 20190391873
    Abstract: A method for execution by a dispersed storage and task (DST) processing unit includes determining to determine to overwrite an original data object stored in a plurality of storage units with an updated data object. Validation level data can be determined, where the validation level data indicates a data object overwrite level, a data region overwrite level, or a data segment overwrite level. Checksum metadata associated with the original data object can be retrieved in response to determining to overwrite an original data object. Overwriting of a subset of data regions or data segments of the original data object can be foregone in response to generating validation data that indicates their checksums in the checksum metadata compare favorably to corresponding overwrite checksum values.
    Type: Application
    Filed: June 25, 2018
    Publication date: December 26, 2019
    Inventors: Harsha Hegde, Venkata G. Badanahatti
  • Publication number: 20190391875
    Abstract: A method for execution by a dispersed storage and task (DST) processing unit includes determining to determine to overwrite an original data object stored in a plurality of storage units with an updated data object. Validation level data can be determined, where the validation level data indicates a data object overwrite level, a data region overwrite level, or a data segment overwrite level. Checksum metadata associated with the original data object can be retrieved in response to determining to overwrite an original data object. Overwriting of a subset of data regions or data segments of the original data object can be foregone in response to generating validation data that indicates their checksums in the checksum metadata compare favorably to corresponding overwrite checksum values.
    Type: Application
    Filed: July 22, 2019
    Publication date: December 26, 2019
    Inventors: Harsha Hegde, Venkata G. Badanahatti
  • Patent number: 10496308
    Abstract: A method for use in a distributed storage network (DSN) includes receiving, by a performance unit, access requests from a distributed storage (DS) processing unit. The access requests identify one or more storage units to which access is requested. The performance unit determines that at least a first storage unit is associated with a status level that fails to satisfy a threshold value associated with the access requests, and that at least a second storage unit is associated with a status level that does satisfy the threshold value. For the at least a first storage unit, the performance unit facilitates execution of an alternative approach to processing an access request corresponding to the first storage unit, and for the at least a second storage unit facilitates execution of a standard approach to processing an access request corresponding to the second storage unit.
    Type: Grant
    Filed: November 1, 2016
    Date of Patent: December 3, 2019
    Assignee: PURE STORAGE, INC.
    Inventor: Harsha Hegde
  • Publication number: 20190347046
    Abstract: A computer readable storage device includes a first memory section that stores operational instructions that, when executed, cause a computing device to, as data accesses occur for a plurality of data objects of a storage container, update object values to produce updated object values, update object retention costs to produce updated object retention costs, adjust a dynamic retention threshold based on the updated object values and the updated object retention costs and update a data object retention policy for a data object based on the dynamic retention threshold to produce an updated retention policy for the data object. The computer readable storage device includes a second memory section that stores operational instructions that, when executed, cause the computing device to, when a data access is a deletion request, utilizing a current updated data object retention policy to determine and execute a deletion-retention option for the data object.
    Type: Application
    Filed: July 24, 2019
    Publication date: November 14, 2019
    Inventors: Andrew D. Baptist, Bart R. Cilfone, Greg R. Dhuse, Harsha Hegde, Wesley B. Leggette, Manish Motwani, Jason K. Resch, Ilya Volvovski, Ethan S. Wozniak
  • Publication number: 20190339893
    Abstract: A method for execution by a container instance manager (CIM) includes determining to create a new instance of a first data container, where the first data container is stored in a first memory location. Creation of the new instance of the first data container for storage in a second memory location is facilitated in response to the determining to create the new instance. The method further includes determining to remove a duplicate instance of a second data container. Deletion of the duplicate instance of the second data container from memory is facilitated in response to the determining to remove the duplicate instance.
    Type: Application
    Filed: July 22, 2019
    Publication date: November 7, 2019
    Inventors: Rohan P. Shah, Harsha Hegde, Wesley B. Leggette, Daniel J. Scholl, Jason K. Resch, Yogesh R. Vedpathak, Manish Motwani
  • Patent number: 10409514
    Abstract: A method for a dispersed storage network (DSN) begins when storing data associated with a vault, by identifying a multicast IP address associated with the vault. The method continues by generating and sending a multicast IP message to a plurality of storage units of the DSN and extracting, by each storage unit receiving the multicast IP message, the multicast IP address. The method continues when the extracted IP address compares favorably to a subscribed IP address, by storing, by the storage unit, the one or more encoded data slices for storage and the corresponding slice name for each encoded data slice. The method continues by each storage unit issuing a status multicast IP message. The method continues when an extracted IP address of a plurality of received status multicast IP messages compares favorably to a subscribed IP address, by executing an associated task.
    Type: Grant
    Filed: October 24, 2016
    Date of Patent: September 10, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Harsha Hegde