Patents by Inventor Kenneth Dorman

Kenneth Dorman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11831762
    Abstract: Secure credentials (e.g., Diffie Helman (DH) key pairs) may be generated independently of requests to establish communication channels between storage system ports (SSPs) and remote ports, such that secure credentials are pre-generated relative to the requests for which they are utilized to establish secure communication channels. For example, DH key pairs may be pre-generated, and each DH key pair stored in an entry of a DH key table. The number of DH keys to generate and store may be determined based on user input and/or the number of potential communication channels for the storage system. In response to a request to establish a communication channel, an IKE session may be executed, during which a pre-generated DH key pair may be obtained from the DH key table, from which symmetric for secure communication between the SSP and the remote port may be derived.
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: November 28, 2023
    Assignee: EMC IP Holding Company LLC
    Inventors: Venkata L R Ippatapu, Kenneth Dorman
  • Patent number: 11546136
    Abstract: The described technology is generally directed towards generating shared authentication keys using network connection characteristics. According to an embodiment, a system can comprise a processor and a memory that can store executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise generating a first authenticator based on a first authentication key generated based on a first connection characteristic of the first device and a second connection characteristic of a second device. The operations can further comprise incorporating the first authenticator into first content for authentication by the second device employing a second authentication key, generated by the second device based on the first connection characteristic and the second connection characteristic. The operations can further comprise establishing, based on the first content, a connection with the second device.
    Type: Grant
    Filed: August 27, 2019
    Date of Patent: January 3, 2023
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Venkata L. R. Ippatapu, Kenneth Dorman
  • Publication number: 20220300161
    Abstract: Storage arrays in a mirror relationship use dynamic compression dictionary size adjustment and data buffer merging to more efficiently compress data associated with maintenance of consistency of a replicated storage object. A compression dictionary size selector selects a supported compression dictionary size based on the aggregate size of the updates enqueued for transmission in the data buffers, e.g., a compression dictionary size that is greater than or equal to, and as close as possible to, the aggregate size of the enqueued updates. A combiner selects enqueued updates based on the selected compression dictionary size, e.g., aggregate enqueued update size less than or equal to, and as close as possible to, the selected compression dictionary size. The selected updates are coalesced and compressed using the selected compression dictionary size.
    Type: Application
    Filed: March 19, 2021
    Publication date: September 22, 2022
    Applicant: EMC IP HOLDING COMPANY LLC
    Inventors: Kenneth Dorman, Venkata Ippatapu
  • Patent number: 11449262
    Abstract: Storage arrays in a mirror relationship use dynamic compression dictionary size adjustment and data buffer merging to more efficiently compress data associated with maintenance of consistency of a replicated storage object. A compression dictionary size selector selects a supported compression dictionary size based on the aggregate size of the updates enqueued for transmission in the data buffers, e.g., a compression dictionary size that is greater than or equal to, and as close as possible to, the aggregate size of the enqueued updates. A combiner selects enqueued updates based on the selected compression dictionary size, e.g., aggregate enqueued update size less than or equal to, and as close as possible to, the selected compression dictionary size. The selected updates are coalesced and compressed using the selected compression dictionary size.
    Type: Grant
    Filed: March 19, 2021
    Date of Patent: September 20, 2022
    Assignee: Dell Products L.P.
    Inventors: Kenneth Dorman, Venkata Ippatapu
  • Patent number: 11438243
    Abstract: The described technology is generally directed towards adjusting communication channels. According to an embodiment, a system can comprise a memory that can store computer executable components, and a processor that can execute the computer executable components stored in the memory. The computer executable components can comprise a network metric monitor to monitor a network metric of a communication channel between a first device and a second device, a change in performance of the communication channel based on the network metric. The computer executable components further comprise a channel rating component to adjust a rating of the network connection based on the change in performance of the network connection, resulting in an adjusted rating. The computer executable components further comprise a link controller to adjust the communication channel based on the rating, resulting in an adjusted communication channel.
    Type: Grant
    Filed: April 12, 2019
    Date of Patent: September 6, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Venkata L. R. Ippatapu, Kenneth Dorman
  • Patent number: 11231867
    Abstract: Techniques for processing write operations may include: receiving, at a first data storage system, a first write operation that writes first data to a first device, wherein the first device is configured for replication on a second device of a second data storage system; performing first processing that determines whether the first data written by the first write operation is a duplicate of an existing entry in a first hash table of the first data storage system; responsive to determining the first data written by the first write operation is a duplicate of an existing entry in the first hash table, performing second processing; responsive to determining the first data written by the first write operation is unique and is not a duplicate of an existing entry in the first hash table, performing third processing; and transmitting the final buffer to the second data storage system.
    Type: Grant
    Filed: January 25, 2018
    Date of Patent: January 25, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Venkata L R Ippatapu, Kenneth Dorman
  • Patent number: 11012473
    Abstract: A consolidated default security policy for a storage node is created by combining a system-wide default security policy with default security policies for multiple protocols and default security policies for multiple applications. The default security policies for protocols and applications include IKE parameters and parameter values. In response to receipt of an IKE request from a peer, the storage node obtains dynamically-assigned source and destination information and finds matching parameters and parameter values in the consolidated default security policy. The matching parameters and parameter values are used with the dynamically-assigned source and destination information to auto-generate a secure channel with the peer.
    Type: Grant
    Filed: November 1, 2019
    Date of Patent: May 18, 2021
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Venkata L. R. Ippatapu, Kenneth Dorman
  • Publication number: 20210136116
    Abstract: A consolidated default security policy for a storage node is created by combining a system-wide default security policy with default security policies for multiple protocols and default security policies for multiple applications. The default security policies for protocols and applications include IKE parameters and parameter values. In response to receipt of an IKE request from a peer, the storage node obtains dynamically-assigned source and destination information and finds matching parameters and parameter values in the consolidated default security policy. The matching parameters and parameter values are used with the dynamically-assigned source and destination information to auto-generate a secure channel with the peer.
    Type: Application
    Filed: November 1, 2019
    Publication date: May 6, 2021
    Applicant: EMC IP HOLDING COMPANY LLC
    Inventors: Venkata L. R. Ippatapu, Kenneth Dorman
  • Publication number: 20210067325
    Abstract: The described technology is generally directed towards generating shared authentication keys using network connection characteristics. According to an embodiment, a system can comprise a processor and a memory that can store executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise generating a first authenticator based on a first authentication key generated based on a first connection characteristic of the first device and a second connection characteristic of a second device. The operations can further comprise incorporating the first authenticator into first content for authentication by the second device employing a second authentication key, generated by the second device based on the first connection characteristic and the second connection characteristic. The operations can further comprise establishing, based on the first content, a connection with the second device.
    Type: Application
    Filed: August 27, 2019
    Publication date: March 4, 2021
    Inventors: Venkata L.R. Ippatapu, Kenneth Dorman
  • Patent number: 10817341
    Abstract: The described technology is generally directed towards adaptively tuning thread weights for multithreaded processors. According to an embodiment, a system can comprise a memory that can store computer executable components, and a processor that can execute the computer executable components stored in the memory. The computer executable components can comprise a thread activity analyzer to determine a first likelihood of a first thread of a multithreaded processor entering a spin mode based on analysis of previous activity of the first thread. The system can further comprise a thread weight component to assign a thread weight to the first thread based on the first likelihood, wherein a share of resources of the multithreaded processor is assigned to the first thread based on the thread weight of the first thread.
    Type: Grant
    Filed: April 10, 2019
    Date of Patent: October 27, 2020
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Venkata L. R. Ippatapu, Kenneth Dorman
  • Publication number: 20200326985
    Abstract: The described technology is generally directed towards adaptively tuning thread weights for multithreaded processors. According to an embodiment, a system can comprise a memory that can store computer executable components, and a processor that can execute the computer executable components stored in the memory. The computer executable components can comprise a thread activity analyzer to determine a first likelihood of a first thread of a multithreaded processor entering a spin mode based on analysis of previous activity of the first thread. The system can further comprise a thread weight component to assign a thread weight to the first thread based on the first likelihood, wherein a share of resources of the multithreaded processor is assigned to the first thread based on the thread weight of the first thread.
    Type: Application
    Filed: April 10, 2019
    Publication date: October 15, 2020
    Inventors: Venkata L.R. Ippatapu, Kenneth Dorman
  • Publication number: 20200328954
    Abstract: The described technology is generally directed towards adjusting communication channels. According to an embodiment, a system can comprise a memory that can store computer executable components, and a processor that can execute the computer executable components stored in the memory. The computer executable components can comprise a network metric monitor to monitor a network metric of a communication channel between a first device and a second device, a change in performance of the communication channel based on the network metric. The computer executable components further comprise a channel rating component to adjust a rating of the network connection based on the change in performance of the network connection, resulting in an adjusted rating. The computer executable components further comprise a link controller to adjust the communication channel based on the rating, resulting in an adjusted communication channel.
    Type: Application
    Filed: April 12, 2019
    Publication date: October 15, 2020
    Inventors: Venkata L.R. Ippatapu, Kenneth Dorman
  • Patent number: 10521317
    Abstract: An apparatus comprises a first storage system comprising a plurality of storage devices. The first storage system is configured to participate in a replication process with a second storage system. The first storage system is further configured to identify data to be replicated to the second storage system as part of the replication process, to obtain information characterizing network behavior of at least one network connecting the first storage system to the second storage system, to select a compression method from a set of available compression methods based on the obtained information characterizing the network behavior of said at least one network, to compress the data to be replicated to the second storage system utilizing the selected compression method, and to provide the compressed data to the second storage system.
    Type: Grant
    Filed: October 26, 2017
    Date of Patent: December 31, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Venkata L.R. Ippatapu, Kenneth Dorman