Patents by Inventor Udi Shemer
Udi Shemer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11290492Abstract: Embodiments for detecting malicious modification of data in a network, by: setting, by a first layer of network resources, a number of markers associated with input/output (I/O) operations of the network; saving the markers, location, and associated metadata in a marker database; reading, by a second layer of the network resources, the markers corresponding to relevant I/O operations; and verifying each scanned I/O operation against a corresponding marker to determine whether or not data for a scanned specific I/O operation has been improperly modified for the first and second layers and any intermediate layer resulting in a fault condition, and if so, taking remedial action to flag or abort the specific I/O operation.Type: GrantFiled: April 26, 2019Date of Patent: March 29, 2022Assignee: EMC IP Holding Company LLCInventors: Kfir Wolfson, Udi Shemer, Amos Zamir
-
Patent number: 11106810Abstract: An apparatus, in one example, comprises a storage system configured to perform one or more deduplication operations on encrypted datasets received for a plurality of tenants and store at least a portion of the encrypted datasets, the datasets having been encrypted for respective ones of the plurality of tenants using a common encryption key. The apparatus further comprises a cryptographic module associated with the storage system, the cryptographic module configured to, in response to a request to access an encrypted dataset stored by the storage system corresponding to a given one of the plurality of tenants, further encrypt the encrypted dataset using a tenant encryption key associated with the given one of the plurality of tenants. The storage system is further configured to send the further encrypted dataset to the given one of the plurality of tenants that requested access.Type: GrantFiled: July 30, 2018Date of Patent: August 31, 2021Assignee: EMC IP Holding Company LLCInventors: Assaf Natanzon, Udi Shemer, Zvi Schneider, Amitai Alkalay
-
Patent number: 11086837Abstract: Embodiments for providing memory for continuous data protection in a data storage system by storing a first key-value map as a data structure wherein the key is an address of a volume and the value comprises timestamp and hash value pairs for each time the address had data written thereto, and corresponding hash values of the written data, and storing a second key-value map as a data structure wherein the key comprises the hash value and the value comprises the written data. The first key-value map and second key-value map are implemented as a driver component in a server computer of the data storage system. The driver exposes a block device protocol on the server computer and leverages the key-value data structures for use with a deduplication storage system.Type: GrantFiled: January 15, 2019Date of Patent: August 10, 2021Assignee: EMC IP Holding Company LLCInventors: Kfir Wolfson, Udi Shemer, Assaf Natanzon
-
Patent number: 10929203Abstract: Embodiments for providing compare and swap (CAS) functionality to key value storage to allow multi-threaded applications to share storage devices and synchronize multiple concurrent threads or processes. A key-value application programming interface (API) is modified to include a CAS API in addition to the standard Put and Get APIs. The CAS function uses a key, expected old value, and new value to compare and swap an existing key value only if its current value equals the expected old value. Hash values of the key value and expected old value may be used by the CAS function to improve performance and reduce bandwidth.Type: GrantFiled: January 16, 2019Date of Patent: February 23, 2021Assignee: EMC IP Holding Company LLCInventors: Kfir Wolfson, Udi Shemer, Assaf Natanzon
-
Publication number: 20200344264Abstract: Embodiments for detecting malicious modification of data in a network, by: setting, by a first layer of network resources, a number of markers associated with input/output (I/O) operations of the network; saving the markers, location, and associated metadata in a marker database; reading, by a second layer of the network resources, the markers corresponding to relevant I/O operations; and verifying each scanned I/O operation against a corresponding marker to determine whether or not data for a scanned specific I/O operation has been improperly modified for the first and second layers and any intermediate layer resulting in a fault condition, and if so, taking remedial action to flag or abort the specific I/O operation.Type: ApplicationFiled: April 26, 2019Publication date: October 29, 2020Inventors: Kfir Wolfson, Udi Shemer, Amos Zamir
-
Patent number: 10725967Abstract: A system, method, and computer program product comprising receiving replicated IO direct to an image on a production site; wherein the replicated IO is a copy of IO for application to the image on the production site, storing the replicated IO in a differential structure in a journal, processing the IO on the image on the replication site, and periodically processing the differential structure to be become a differential snapshot; wherein the differential snapshot may be used by a hypervisor to provide instant access to the point in time corresponding to the differential snapshot.Type: GrantFiled: September 30, 2014Date of Patent: July 28, 2020Assignee: EMC IP Holding Company LLCInventors: Assaf Natanzon, Jehuda Udi Shemer
-
Publication number: 20200226115Abstract: Embodiments for providing memory for continuous data protection in a data storage system by storing a first key-value map as a data structure wherein the key is an address of a volume and the value comprises timestamp and hash value pairs for each time the address had data written thereto, and corresponding hash values of the written data, and storing a second key-value map as a data structure wherein the key comprises the hash value and the value comprises the written data. The first key-value map and second key-value map are implemented as a driver component in a server computer of the data storage system. The driver exposes a block device protocol on the server computer and leverages the key-value data structures for use with a deduplication storage system.Type: ApplicationFiled: January 15, 2019Publication date: July 16, 2020Inventors: Kfir Wolfson, Udi Shemer, Assaf Natanzon
-
Publication number: 20200226000Abstract: Embodiments for providing compare and swap (CAS) functionality to key value storage to allow multi-threaded applications to share storage devices and synchronize multiple concurrent threads or processes. A key-value application programming interface (API) is modified to include a CAS API in addition to the standard Put and Get APIs. The CAS function uses a key, expected old value, and new value to compare and swap an existing key value only if its current value equals the expected old value. Hash values of the key value and expected old value may be used by the CAS function to improve performance and reduce bandwidth.Type: ApplicationFiled: January 16, 2019Publication date: July 16, 2020Inventors: Kfir Wolfson, Udi Shemer, Assaf Natanzon
-
Patent number: 10715554Abstract: Existing policies enforced at or above an operating system (OS) layer of a device are obtained. Translation rules are stored that include data structure descriptions of conditions, corresponding actions performed when the conditions are satisfied, and attributes specified in the existing policies, and attributes of one or more layers below the OS layer that are relevant to policy enforcement in the one or more layers below the OS layer. The existing policies are parsed using the data structure descriptions to identify the conditions, corresponding actions, and attributes specified in the existing policies. New policies are generated that are consistent with the existing policies. The new policies include the identified attributes specified in the existing policies and the attributes relevant to policy enforcement in the one or more layers below the OS layer. The new policies are enforced in the one or more layers below the OS layer.Type: GrantFiled: September 26, 2018Date of Patent: July 14, 2020Assignee: EMC IP Holding Company LLCInventors: Oron Golan, Kfir Wolfson, Amos Zamir, Aviram Fireberger, Udi Shemer
-
Patent number: 10642511Abstract: Embodiments for providing continuous data protection in a data processing and storage system with a storage server and storage devices, by providing a solid state disk (SSD) device having a processor and non-volatile memory and an interface to a host device, providing a resident continuous data protection program on the SSD and executed by the processor, recording, for each write command, a memory address offset and a timestamp for the write command, and maintaining one of: an undo journal storing data in a location that is to be overwritten by the write command with the timestamp, or a log-structured file exposing a single large file as a volume to an upper layer of a host software stack for storing periodic snapshot backups of data created by the write command.Type: GrantFiled: October 5, 2018Date of Patent: May 5, 2020Assignee: EMC IP Holding Company LLCInventors: Assaf Natanzon, Udi Shemer, Kfir Wolfson
-
Publication number: 20200110546Abstract: Embodiments for providing continuous data protection in a data processing and storage system with a storage server and storage devices, by providing a solid state disk (SSD) device having a processor and non-volatile memory and an interface to a host device, providing a resident continuous data protection program on the SSD and executed by the processor, recording, for each write command, a memory address offset and a timestamp for the write command, and maintaining one of: an undo journal storing data in a location that is to be overwritten by the write command with the timestamp, or a log-structured file exposing a single large file as a volume to an upper layer of a host software stack for storing periodic snapshot backups of data created by the write command.Type: ApplicationFiled: October 5, 2018Publication date: April 9, 2020Inventors: Assaf Natanzon, Udi Shemer, Kfir Wolfson
-
Publication number: 20200099721Abstract: Existing policies enforced at or above an operating system (OS) layer of a device are obtained. Translation rules are stored that include data structure descriptions of conditions, corresponding actions performed when the conditions are satisfied, and attributes specified in the existing policies, and attributes of one or more layers below the OS layer that are relevant to policy enforcement in the one or more layers below the OS layer. The existing policies are parsed using the data structure descriptions to identify the conditions, corresponding actions, and attributes specified in the existing policies. New policies are generated that are consistent with the existing policies. The new policies include the identified attributes specified in the existing policies and the attributes relevant to policy enforcement in the one or more layers below the OS layer. The new policies are enforced in the one or more layers below the OS layer.Type: ApplicationFiled: September 26, 2018Publication date: March 26, 2020Inventors: Oron Golan, Kfir Wolfson, Amos Zamir, Aviram Fireberger, Udi Shemer
-
Publication number: 20200097650Abstract: An enterprise storage system and method detects the probability of encryption of data by comparing the level of randomness in the data to a set of increasing thresholds to determine the severity of encryption. Encryption exceeding a high predetermined threshold is determined to be due to ransomware. Upon determining the level of encryption, an appropriate action is taken based upon one or both of the policy of the enterprise or local governmental regulations as to encryption or non-encryption of data.Type: ApplicationFiled: September 26, 2018Publication date: March 26, 2020Applicant: EMC IP Holding Company LLCInventors: Oron Golan, Kfir Wolfson, Amos Zamir, Udi Shemer
-
Publication number: 20200034284Abstract: Embodiments are directed to a bug reproduction system and method to reproduce non-probabilistic bug conditions in programs, such as those that involve multi-threaded race conditions and/or containerized systems. To consistently reproduce a phenomenon that usually happens with low probability, embodiments provide an effective approach to consistently reproducing bugs by combining multi-point-in-time replication (like RecoverPoint), CPU lockstep and the same constructs used in implementing VMware VMotion functionality. The result is a system that once there is an initial reconstruction, will be able to consistently reproduce the same issue one hundred percent of the time.Type: ApplicationFiled: July 25, 2018Publication date: January 30, 2020Inventors: Alex Solan, Udi Shemer
-
Publication number: 20200034560Abstract: An apparatus, in one example, comprises a storage system configured to perform one or more deduplication operations on encrypted datasets received for a plurality of tenants and store at least a portion of the encrypted datasets, the datasets having been encrypted for respective ones of the plurality of tenants using a common encryption key. The apparatus further comprises a cryptographic module associated with the storage system, the cryptographic module configured to, in response to a request to access an encrypted dataset stored by the storage system corresponding to a given one of the plurality of tenants, further encrypt the encrypted dataset using a tenant encryption key associated with the given one of the plurality of tenants. The storage system is further configured to send the further encrypted dataset to the given one of the plurality of tenants that requested access.Type: ApplicationFiled: July 30, 2018Publication date: January 30, 2020Inventors: Assaf Natanzon, Udi Shemer, Zvi Schneider, Amitai Alkalay