Patents by Inventor Kiyoshi James Komatsu

Kiyoshi James Komatsu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10360237
    Abstract: One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within which storage resources (e.g., files, logical unit numbers (LUNs), volumes, etc.) are stored. The first storage controller may establish an access policy with a001 second storage controller to which data is to be replicated from the first storage. The access policy may define an authentication mechanism for the first storage controller to authenticate the second storage controller, an authorization mechanism specifying a type of access that the second storage controller has for a storage resource, and an access control mechanism specifying how the second storage controller's access to data of the storage resource is to be controlled. In this way, data replication requests may be authenticated and authorized so that data may be provided, according to the access control mechanism, in a secure manner.
    Type: Grant
    Filed: November 22, 2017
    Date of Patent: July 23, 2019
    Assignee: NetApp Inc.
    Inventors: Vijay M. Deshmukh, Pranab Patnaik, Uday Madhav Joshi, Kiyoshi James Komatsu
  • Publication number: 20180316756
    Abstract: To replicate a source LUN to a different storage system platform, a first storage system transmits a request to replicate a LUN along with attributes for the LUN to a second storage system. The second storage system maps the attributes to attributes used and understood by the platform of the second storage system. The second storage system then creates a destination LUN based on the mapped attributes. Since the destination LUN is created with similar attributes as the source LUN, the destination LUN can store the replicated data of the source LUN while still being accessed and recognized as a LUN by the second storage system. The second storage system also stores any proprietary attributes received from the first storage system so that the proprietary attributes can be supplied to the first storage system to recover the source LUN after a data loss event.
    Type: Application
    Filed: April 28, 2017
    Publication date: November 1, 2018
    Inventors: Ravindra Kuramkote, Kiyoshi James Komatsu, Ling Na Zheng, Rachita Kothiyal, Michael Lee Federwisch, Vijay Mohan Deshmukh
  • Publication number: 20180276090
    Abstract: One or more techniques and/or computing devices are provided for cross-platform replication. For example, a replication relationship may be established between a first storage endpoint and a second storage endpoint, where at least one of the storage endpoints, such as the first storage endpoint, lacks or has incompatible functionality to perform and manage replication because the storage endpoints have different storage platforms that store data differently, use different control operations and interfaces, etc. Accordingly, replication destination workflow, replication source workflow, and/or a proxy representing the first storage endpoint may be implemented at the second storage endpoint comprising the replication functionality.
    Type: Application
    Filed: June 1, 2018
    Publication date: September 27, 2018
    Inventors: Atul Ramesh Pandit, Vijay M. Deskmukh, Michael Lee Federwisch, Ling Zheng, Kiyoshi James Komatsu, Rachita Kothiyal
  • Patent number: 9990260
    Abstract: One or more techniques and/or computing devices are provided for cross-platform replication. For example, a replication relationship may be established between a first storage endpoint and a second storage endpoint, where at least one of the storage endpoints, such as the first storage endpoint, lacks or has incompatible functionality to perform and manage replication because the storage endpoints have different storage platforms that store data differently, use different control operations and interfaces, etc. Accordingly, replication destination workflow, replication source workflow, and/or a proxy representing the first storage endpoint may be implemented at the second storage endpoint comprising the replication functionality.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: June 5, 2018
    Assignee: NetApp Inc.
    Inventors: Atul Ramesh Pandit, Vijay M. Deshmukh, Michael Lee Federwisch, Ling Zheng, Kiyoshi James Komatsu, Rachita Kothiyal
  • Publication number: 20180107727
    Abstract: One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within which storage resources (e.g., files, logical unit numbers (LUNs), volumes, etc.) are stored. The first storage controller may establish an access policy with a001 second storage controller to which data is to be replicated from the first storage. The access policy may define an authentication mechanism for the first storage controller to authenticate the second storage controller, an authorization mechanism specifying a type of access that the second storage controller has for a storage resource, and an access control mechanism specifying how the second storage controller's access to data of the storage resource is to be controlled. In this way, data replication requests may be authenticated and authorized so that data may be provided, according to the access control mechanism, in a secure manner.
    Type: Application
    Filed: November 22, 2017
    Publication date: April 19, 2018
    Inventors: Vijay M. Deshmukh, Pranab Patnaik, Uday Madhav Joshi, Kiyoshi James Komatsu
  • Patent number: 9842154
    Abstract: One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within which storage resources (e.g., files, logical unit numbers (LUNs), volumes, etc.) are stored. The first storage controller may establish an access policy with a001 second storage controller to which data is to be replicated from the first storage. The access policy may define an authentication mechanism for the first storage controller to authenticate the second storage controller, an authorization mechanism specifying a type of access that the second storage controller has for a storage resource, and an access control mechanism specifying how the second storage controller's access to data of the storage resource is to be controlled. In this way, data replication requests may be authenticated and authorized so that data may be provided, according to the access control mechanism, in a secure manner.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: December 12, 2017
    Assignee: NetApp, Inc.
    Inventors: Vijay M. Deshmukh, Pranab Patnaik, Uday Madhav Joshi, Kiyoshi James Komatsu
  • Publication number: 20170318089
    Abstract: One or more techniques and/or computing devices are provided for cross-platform replication. For example, a replication relationship may be established between a first storage endpoint and a second storage endpoint, where at least one of the storage endpoints, such as the first storage endpoint, lacks or has incompatible functionality to perform and manage replication because the storage endpoints have different storage platforms that store data differently, use different control operations and interfaces, etc. Accordingly, replication destination workflow, replication source workflow, and/or a proxy representing the first storage endpoint may be implemented at the second storage endpoint comprising the replication functionality.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Atul Ramesh Pandit, Vijay M. Deshmukh, Michael Lee Federwisch, Ling Zheng, Kiyoshi James Komatsu, Rachita Kothiyal
  • Publication number: 20170316075
    Abstract: One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within which storage resources (e.g., files, logical unit numbers (LUNs), volumes, etc.) are stored. The first storage controller may establish an access policy with a001 second storage controller to which data is to be replicated from the first storage. The access policy may define an authentication mechanism for the first storage controller to authenticate the second storage controller, an authorization mechanism specifying a type of access that the second storage controller has for a storage resource, and an access control mechanism specifying how the second storage controller's access to data of the storage resource is to be controlled. In this way, data replication requests may be authenticated and authorized so that data may be provided, according to the access control mechanism, in a secure manner.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Vijay M. Deshmukh, Pranab Patnaik, Uday Madhav Joshi, Kiyoshi James Komatsu