Patents by Inventor Lior SHLOMOV

Lior SHLOMOV has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10805073
    Abstract: Provided are a computer program product, system, and method for generating master and wrapper keys for connected devices in a key generation scheme. For each of the devices, a wrapped master key comprising a master key for the device and a wrapper key is stored. The wrapper keys for a plurality of the devices are generated by another of the devices. For each of a plurality of the devices, the master key for the device is used to generate the wrapper key for a target device comprising another of the devices. For each of the devices, the wrapper key for the device is used to decrypt the stored wrapped master key. At least one of the devices uses the master key for the device to encrypt and decrypt data at the device.
    Type: Grant
    Filed: January 2, 2019
    Date of Patent: October 13, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ronen Gazit, Ron S. Shapiro, Lior Shlomov, Ariel Waizel, Guy-Arie Yur
  • Patent number: 10657013
    Abstract: Provided are a computer program product, computer system, and method for smart selection of a storage module to be excluded when a connection between two storage modules is broken. An indication is received from a first storage module that a connection between the first storage module and a second storage module is broken. In response to determining that the second storage module is accessible, values of exclusion criteria for the first storage module are determined and summed to identify a first exclusion total. Then, values of exclusion criteria for the second storage module are determined and summed to identify a second exclusion total. In response to determining that the first exclusion total exceeds the second exclusion total, the second storage node is excluded from the cluster. In response to determining that the second exclusion total exceeds the first exclusion total, the first storage node is excluded from the cluster.
    Type: Grant
    Filed: December 5, 2017
    Date of Patent: May 19, 2020
    Assignee: International Business Machines Corporation
    Inventors: Michael Keller, Ofer Leneman, Osnat Shasha, Lior Shlomov, Ariel Waizel
  • Patent number: 10452614
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include configuring a storage system to store multiple storage entities for access by one or more host computers in communication with the storage system, and specifying a compression condition including a minimum compression ratio. The storage system can then estimate an expected compression ratio for a given storage entity, compress the given storage entity upon the expected compression ratio meeting the compression condition, and provide, to a given host computer, access to the compressed given storage entity.
    Type: Grant
    Filed: June 12, 2015
    Date of Patent: October 22, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan Amit, Nir Friedman, Danny Harnik, Chaim Koifman, Sergey Marenkov, Lior Shlomov, Dmitry Sotnikov, Shai Taharlev
  • Publication number: 20190140824
    Abstract: Provided are a computer program product, system, and method for generating master and wrapper keys for connected devices in a key generation scheme. For each of the devices, a wrapped master key comprising a master key for the device and a wrapper key is stored. The wrapper keys for a plurality of the devices are generated by another of the devices. For each of a plurality of the devices, the master key for the device is used to generate the wrapper key for a target device comprising another of the devices. For each of the devices, the wrapper key for the device is used to decrypt the stored wrapped master key. At least one of the devices uses the master key for the device to encrypt and decrypt data at the device.
    Type: Application
    Filed: January 2, 2019
    Publication date: May 9, 2019
    Inventors: Ronen Gazit, Ron S. Shapiro, Lior Shlomov, Ariel Waizel, Guy-Arie Yur
  • Patent number: 10237061
    Abstract: Provided are a computer program product, system, and method for generating master and wrapper keys for connected devices in a key generation scheme. For each of the devices, a wrapped master key comprising a master key for the device and a wrapper key is stored. The wrapper keys for a plurality of the devices are generated by another of the devices. For each of a plurality of the devices, the master key for the device is used to generate the wrapper key for a target device comprising another of the devices. For each of the devices, the wrapper key for the device is used to decrypt the stored wrapped master key. At least one of the devices uses the master key for the device to encrypt and decrypt data at the device.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: March 19, 2019
    Assignee: International Business Machines Corporation
    Inventors: Ronen Gazit, Ron S. Shapiro, Lior Shlomov, Ariel Waizel, Guy-Arie Yur
  • Patent number: 10223000
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include configuring multiple storage system resources to manage a storage entity distributed among the storage system resources. Upon receiving, by a first given storage system resource from a host computer, an I/O request for data in the storage entity, a second given storage system resource responsible for managing the storage entity data referenced in the I/O request is identified, and the I/O request is forwarded to the second given storage system resource. Upon receiving the forwarded I/O request, the second given storage system resource performs a data compression operation while processing the I/O request, and conveys a result of the I/O operation to the first given storage system resource. Upon receiving the result from the second given storage system resource, the first given storage system resource forwards the result to the host computer.
    Type: Grant
    Filed: May 21, 2015
    Date of Patent: March 5, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ehood Garmiza, Orit Nissan-Messing, Ron S. Shapiro, Lior Shlomov, Assaf Yaari
  • Patent number: 10061638
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include configuring, at a first time, a clustered storage system comprising multiple modules to store and process storage requests for respective sets of data objects. While processing the storage requests, respective subsets of the data objects having one or more data errors are identified, and at a second time subsequent to the first time, respective modules storing each of the data objects having at least one data error are identified. computing, based on the identified modules, a frequency distribution of the identified data errors in the data objects over the multiple modules. Based on the frequency distribution, a failure in a given module is identified, and the identified module is removed from the storage system. In some embodiments, prior to the second time, the data objects can be redistributed among the modules of the storage system.
    Type: Grant
    Filed: March 29, 2016
    Date of Patent: August 28, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan Fischer-Toubol, Ronen Gazit, Afief Halumi, Lior Shlomov, Ariel Waizel
  • Publication number: 20180095853
    Abstract: Provided are a computer program product, computer system, and method for smart selection of a storage module to be excluded when a connection between two storage modules is broken. An indication is received from a first storage module that a connection between the first storage module and a second storage module is broken. In response to determining that the second storage module is accessible, values of exclusion criteria for the first storage module are determined and summed to identify a first exclusion total. Then, values of exclusion criteria for the second storage module are determined and summed to identify a second exclusion total. In response to determining that the first exclusion total exceeds the second exclusion total, the second storage node is excluded from the cluster. In response to determining that the second exclusion total exceeds the first exclusion total, the first storage node is excluded from the cluster.
    Type: Application
    Filed: December 5, 2017
    Publication date: April 5, 2018
    Inventors: Michael Keller, Ofer Leneman, Osnat Shasha, Lior Shlomov, Ariel Waizel
  • Patent number: 9898378
    Abstract: Provided are a computer program product, computer system, and method for smart selection of a storage module to be excluded when a connection between two storage modules is broken. An indication is received from a first storage module that a connection between the first storage module and a second storage module is broken. In response to determining that the second storage module is accessible, values of exclusion criteria for the first storage module are determined and summed to identify a first exclusion total. Then, values of exclusion criteria for the second storage module are determined and summed to identify a second exclusion total. In response to determining that the first exclusion total exceeds the second exclusion total, the second storage node is excluded from the cluster. In response to determining that the second exclusion total exceeds the first exclusion total, the first storage node is excluded from the cluster.
    Type: Grant
    Filed: November 10, 2015
    Date of Patent: February 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Michael Keller, Ofer Leneman, Osnat Shasha, Lior Shlomov, Ariel Waizel
  • Publication number: 20170286206
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include configuring, at a first time, a clustered storage system comprising multiple modules to store and process storage requests for respective sets of data objects. While processing the storage requests, respective subsets of the data objects having one or more data errors are identified, and at a second time subsequent to the first time, respective modules storing each of the data objects having at least one data error are identified. computing, based on the identified modules, a frequency distribution of the identified data errors in the data objects over the multiple modules. Based on the frequency distribution, a failure in a given module is identified, and the identified module is removed from the storage system. In some embodiments, prior to the second time, the data objects can be redistributed among the modules of the storage system.
    Type: Application
    Filed: March 29, 2016
    Publication date: October 5, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan FISCHER-TOUBOL, Ronen GAZIT, Afief HALUMI, Lior SHLOMOV, Ariel WAIZEL
  • Publication number: 20170132100
    Abstract: Provided are a computer program product, computer system, and method for smart selection of a storage module to be excluded when a connection between two storage modules is broken. An indication is received from a first storage module that a connection between the first storage module and a second storage module is broken. In response to determining that the second storage module is accessible, values of exclusion criteria for the first storage module are determined and summed to identify a first exclusion total. Then, values of exclusion criteria for the second storage module are determined and summed to identify a second exclusion total. In response to determining that the first exclusion total exceeds the second exclusion total, the second storage node is excluded from the cluster. In response to determining that the second exclusion total exceeds the first exclusion total, the first storage node is excluded from the cluster.
    Type: Application
    Filed: November 10, 2015
    Publication date: May 11, 2017
    Inventors: Michael Keller, Ofer Leneman, Osnat Shasha, Lior Shlomov, Ariel Waizel
  • Publication number: 20170093563
    Abstract: Provided are a computer program product, system, and method for generating master and wrapper keys for connected devices in a key generation scheme. For each of the devices, a wrapped master key comprising a master key for the device and a wrapper key is stored. The wrapper keys for a plurality of the devices are generated by another of the devices. For each of a plurality of the devices, the master key for the device is used to generate the wrapper key for a target device comprising another of the devices. For each of the devices, the wrapper key for the device is used to decrypt the stored wrapped master key. At least one of the devices uses the master key for the device to encrypt and decrypt data at the device.
    Type: Application
    Filed: September 25, 2015
    Publication date: March 30, 2017
    Inventors: Ronen Gazit, Ron S. Shapiro, Lior Shlomov, Ariel Waizel, Guy-Arie Yur
  • Publication number: 20170052711
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include configuring multiple storage system resources to manage a storage entity distributed among the storage system resources. Upon receiving, by a first given storage system resource from a host computer, an I/O request for data in the storage entity, a second given storage system resource responsible for managing the storage entity data referenced in the I/O request is identified, and the I/O request is forwarded to the second given storage system resource. Upon receiving the forwarded I/O request, the second given storage system resource performs a data compression operation while processing the I/O request, and conveys a result of the I/O operation to the first given storage system resource. Upon receiving the result from the second given storage system resource, the first given storage system resource forwards the result to the host computer.
    Type: Application
    Filed: May 21, 2015
    Publication date: February 23, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ehood GARMIZA, Orit NISSAN-MESSING, Ron S. SHAPIRO, Lior SHLOMOV, Assaf YAARI
  • Publication number: 20160364401
    Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include configuring a storage system to store multiple storage entities for access by one or more host computers in communication with the storage system, and specifying a compression condition including a minimum compression ratio. The storage system can then estimate an expected compression ratio for a given storage entity, compress the given storage entity upon the expected compression ratio meeting the compression condition, and provide, to a given host computer, access to the compressed given storage entity.
    Type: Application
    Filed: June 12, 2015
    Publication date: December 15, 2016
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan AMIT, Nir FRIEDMAN, Danny HARNIK, Chaim KOIFMAN, Sergey MARENKOV, Lior SHLOMOV, Dmitry SOTNIKOV, Shai TAHARLEV