Patents by Inventor Kfir Wolfson

Kfir Wolfson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11379559
    Abstract: One example method includes bringing up a clone application in a validation environment, replaying recorded incoming network traffic to the clone application, obtaining a response of the clone application to the incoming network traffic, comparing the response of the clone application to recorded outgoing network traffic of the production application, and making a validation determination regarding the clone application, based on the comparison of the response of the clone application to recorded outgoing network traffic of the production application. When the clone application is not validated, the example method includes identifying and resolving a problem relating to the clone application.
    Type: Grant
    Filed: July 10, 2018
    Date of Patent: July 5, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Oron Golan, Aviram Fireberger, Amos Zamir, Kfir Wolfson, Jehuda Shemer
  • Patent number: 11360845
    Abstract: One example method includes receiving information concerning a threat to stored data, correlating the information with a preemptive action which, when taken, prevents harm to the stored data by the threat, implementing the preemptive action before the threat causes harm to the stored data, and taking an action to at least partly return a system associated with the stored data to a pre-threat state. The threat may be a natural disaster, or a human-caused condition, for example.
    Type: Grant
    Filed: February 5, 2021
    Date of Patent: June 14, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Kfir Wolfson, Jehuda Shemer, Assaf Natanzon
  • Publication number: 20220174112
    Abstract: A replication system for data of mobile devices is disclosed. The data of a mobile device is uploaded to stations in an area. Metadata associated with the objects is stored in a centralized or decentralized system. The metadata can be accessed to identify the stations storing the device's objects and the data of the mobile device can then be retrieved from the stations and reconstructed.
    Type: Application
    Filed: February 10, 2022
    Publication date: June 2, 2022
    Inventors: Assaf Natanzon, Kfir Wolfson, Jehuda Shemer
  • Patent number: 11341099
    Abstract: Described is a system that provides deduplication management at a virtualization layer allowing virtual machines to store deduplicated data amongst various back-end data storage architectures. For example, the system may be storage-agnostic by operating at a hypervisor layer to fully leverage the benefits provided by virtualization. Accordingly, implementing deduplication by a hypervisor results in “pluggable” software-defined storage management. In addition, such a system may be implemented on any on-demand infrastructure (e.g. Infrastructure as a Service (IaaS)) environment that includes varying types of back-end storage solutions including solutions from various vendors. In addition, by operating within the virtualized layer of an on-demand computing resource environment (e.g. cloud environment), the system may provide deduplication across different resource clusters (e.g. hypervisor clusters) and environments.
    Type: Grant
    Filed: April 15, 2019
    Date of Patent: May 24, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Kfir Wolfson, Jehuda Shemer, Itay Azaria
  • Publication number: 20220116216
    Abstract: A secure approval chain for runtime protection is disclosed. As an application or pod is developed in a pipeline, an approval engine ensures that the pod is approved by all approvers. The approval engine generates a deployment token that is added to the configuration data of the pod and that can be used at deployment to perform various security operations including pod verification, runtime environment control and enforcement, and pod or application verification.
    Type: Application
    Filed: October 13, 2020
    Publication date: April 14, 2022
    Inventors: Kfir Wolfson, Jehuda Shemer, Stav Sapir, Naor Radami
  • Patent number: 11290492
    Abstract: Embodiments for detecting malicious modification of data in a network, by: setting, by a first layer of network resources, a number of markers associated with input/output (I/O) operations of the network; saving the markers, location, and associated metadata in a marker database; reading, by a second layer of the network resources, the markers corresponding to relevant I/O operations; and verifying each scanned I/O operation against a corresponding marker to determine whether or not data for a scanned specific I/O operation has been improperly modified for the first and second layers and any intermediate layer resulting in a fault condition, and if so, taking remedial action to flag or abort the specific I/O operation.
    Type: Grant
    Filed: April 26, 2019
    Date of Patent: March 29, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Kfir Wolfson, Udi Shemer, Amos Zamir
  • Publication number: 20220092192
    Abstract: One example method includes packaging a containerized application into at least two images. The first image may include the main application and the second image includes a decryptor. Sensitive information associated with the application is encrypted and included in the second image. The decryptor operates separately from the main application. After the decryptor successfully completes, the main application is run. The main application may include a copier layer to copy any data decrypted by the decryptor into the main application.
    Type: Application
    Filed: September 18, 2020
    Publication date: March 24, 2022
    Inventors: Kfir Wolfson, Jehuda Shemer, Stav Sapir, Amos Zamir, Naor Radami
  • Patent number: 11283867
    Abstract: A replication system for data of mobile devices is disclosed. The data of a mobile device is uploaded to stations in an area. Metadata associated with the objects is stored in a centralized or decentralized system. The metadata can be accessed to identify the stations storing the device's objects and the data of the mobile device can then be retrieved from the stations and reconstructed.
    Type: Grant
    Filed: September 21, 2020
    Date of Patent: March 22, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Assaf Natanzon, Kfir Wolfson, Jehuda Shemer
  • Publication number: 20220083433
    Abstract: One example method includes determining a respective available data storage capacity for each of the edge sites, receiving available data storage capacity information from each of the edge sites, storing the available data storage capacity information, creating a backup dataset, determining whether the group of edge sites have an aggregate amount of available storage capacity to store the backup dataset, and storing the backup dataset across the edge sites when the aggregate amount of available storage capacity is sufficient to store the entire backup dataset.
    Type: Application
    Filed: September 17, 2020
    Publication date: March 17, 2022
    Inventors: Yossef Saad, Kfir Wolfson
  • Patent number: 11275658
    Abstract: A data protection system configured to replicate data may generate rescue packages that allow the system to recover when communication between a splitter or source of the production data being replicated and an appliance that stores the replicated data is disrupted. The rescue package is stored on a datastore and is then retrieved by the data protection system or another splitter. After processing the rescue package, which may contain IOs that the data protection is unaware of due to the communication disruption, replication may resume normally.
    Type: Grant
    Filed: February 27, 2020
    Date of Patent: March 15, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Jehuda Shemer, Saar Cohen, Kfir Wolfson, Itay Azaria
  • Patent number: 11269541
    Abstract: Embodiments for dynamically allocating journal space for Do streams across multiple applications. A shared Do stream process has a dynamic block allocation component that provides a certain amount of buffering of a data flush for an application, using space that would normally be allocated for, but unused by, other applications, thus preventing the need for one or more of the applications to move to fast-forward mode when possible. Certain machine learning techniques are used in order to predict the required Do stream for each application according to past experience with the application, and this prediction is used to intelligently allocate Do Streams between the different applications.
    Type: Grant
    Filed: October 24, 2019
    Date of Patent: March 8, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Amihai Savir, Avitan Gefen, Kfir Wolfson, Itay Azaria
  • Publication number: 20220066987
    Abstract: One example method includes monitoring performance of an element of a runtime environment, where the monitoring includes collecting performance information concerning the element, analyzing the collected information, detecting, based on the analysis of the collected information, an anomaly in the performance of the element and, in response to detection of the anomaly, automatically marking a snapshot of the runtime environment element, and the marking of the snapshot overrides a retention policy applicable to the snapshot.
    Type: Application
    Filed: November 10, 2021
    Publication date: March 3, 2022
    Inventors: Amihai Savir, Avitan Gefen, Kfir Wolfson, Itay Azaria
  • Publication number: 20220066986
    Abstract: One example method includes monitoring performance of an element of a runtime environment, where the monitoring includes collecting performance information concerning the element, analyzing the collected information, detecting, based on the analysis of the collected information, an anomaly in the performance of the element and, in response to detection of the anomaly, automatically marking a snapshot of the runtime environment element, and the marking of the snapshot overrides a retention policy applicable to the snapshot.
    Type: Application
    Filed: November 10, 2021
    Publication date: March 3, 2022
    Inventors: Amihai Savir, Avitan Gefen, Kfir Wolfson, Itay Azaria
  • Patent number: 11249944
    Abstract: One example method includes monitoring performance of an element of a runtime environment, where the monitoring includes collecting performance information concerning the element, analyzing the collected information, detecting, based on the analysis of the collected information, an anomaly in the performance of the element and, in response to detection of the anomaly, automatically marking a snapshot of the runtime environment element, and the marking of the snapshot overrides a retention policy applicable to the snapshot.
    Type: Grant
    Filed: October 16, 2019
    Date of Patent: February 15, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Amihai Savir, Avitan Gefen, Kfir Wolfson, Itay Azaria
  • Publication number: 20220043916
    Abstract: One example method includes inserting a signal layer in an image, the signal layer indicating that a sensitive layer in the image is a candidate for encryption, creating a single layer archive file that includes the sensitive layer, encrypting the single layer archive file to create an encrypted layer, constructing a new image that includes the encrypted layer, inserting, in the new image, a decryptor layer that is operable to decrypt the encrypted layer, and designating the decryptor layer as an entry point of the new image.
    Type: Application
    Filed: August 7, 2020
    Publication date: February 10, 2022
    Inventors: Kfir Wolfson, Jehuda Shemer, Stav Sapir, Amos Zamir, Naor Radami
  • Patent number: 11243978
    Abstract: Disclosed is a method, apparatus, and system for processing a data update message in a multi-agent system comprising a plurality of agents, the operations comprising: receiving, at a second agent, the data update message comprising data for a node in a shared data tree and a first node context map from a first agent, the first node context map comprising last known contexts of all the agents for the node according to knowledge of the first agent; determining, at the second agent, whether any of three conditions relating to the first node context map and a second node context map is true, the second node context map comprising last known contexts of all the agents for the node according to knowledge of the second agent; and in response to determining that none of the three conditions relating to the first node context map and the second node context map is true, updating, at the second agent, the node based on the data update message from the first agent.
    Type: Grant
    Filed: June 29, 2018
    Date of Patent: February 8, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: David Ben-David, Kfir Wolfson, Jonathan Volij
  • Publication number: 20210406139
    Abstract: One example method includes performing, as part a planned failover procedure, operations that include connecting a replica OS disk to a replica VM, powering up the replica VM, booting an OS of the replica VM, disconnecting a source VM from a network, and connecting replica data disks to the replica VM. IOs issued by an application at the source VM continue to be processed by the source VM while the replica OS disk is connected, the replica VM is powered up, and the OS of the replica VM is booted.
    Type: Application
    Filed: June 24, 2020
    Publication date: December 30, 2021
    Inventors: Jawad Said, Kfir Wolfson, Jehuda Shemer
  • Publication number: 20210406133
    Abstract: On-the-fly point-in-time recovery operations are disclosed. During a recovery operation, the PiT being restored can be changed on-the-fly or during the existing recovery operation without restarting the recovery process from the beginning. In one example, this improves recovery time operation (RTO) and prevents aspects of the recovery operation to be avoided when changing to a different PiT.
    Type: Application
    Filed: June 24, 2020
    Publication date: December 30, 2021
    Inventors: Jehuda Shemer, Kfir Wolfson, Tomer Kushnir, Jawad Said
  • Publication number: 20210365330
    Abstract: On-the-fly point-in-time recovery operations are disclosed. During a recovery operation, the PiT being restored can be changed on-the-fly or during the existing recovery operation without restarting the recovery process from the beginning. IN one example, this improves recovery time operation (RTO) and prevents aspects of the recovery operation to be avoided when changing to a different PiT.
    Type: Application
    Filed: May 21, 2020
    Publication date: November 25, 2021
    Inventors: Tomer Kushnir, Jehuda Shemer, Jawad Said, Kfir Wolfson
  • Publication number: 20210365186
    Abstract: Data protection operations including replication operations are disclosed. Virtual machines, applications, and/or application data are replicated according to at least one strategy. The replication strategy can improve performance of the recovery operation.
    Type: Application
    Filed: May 19, 2020
    Publication date: November 25, 2021
    Inventors: Bing Liu, Jehuda Shemer, Kfir Wolfson, Jawad Said