Patents by Inventor Zongliang Li
Zongliang Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250103231Abstract: The disclosure herein describes converting a disk cluster to a different format. A format conversion instruction associated with a disk cluster is received. A first subgroup of disks of the disk cluster that are the emptiest disks of the disk cluster are identified and all data is evacuated from the first subgroup of disks to other disks of the disk cluster. The first subgroup of disks is reformatted based on the received format conversion instruction. A group of data objects stored in the disk cluster is converted based on the format conversion instruction and the converted group of data objects are written to the reformatted first subgroup of disks. The process iterates through the disks of the disk cluster to reformat all disks and convert all data objects based on the received format conversion instruction. The process reduces the write operations required to convert the format of the disk cluster.Type: ApplicationFiled: September 21, 2023Publication date: March 27, 2025Inventors: Ruiling Dou, Tao Xie, Zongliang Li, Asit Desai, Wenguang Wang, Litao Xia
-
Patent number: 12260105Abstract: The disclosure herein describes converting a disk cluster to a different format. A format conversion instruction associated with a disk cluster is received. A first subgroup of disks of the disk cluster that are the emptiest disks of the disk cluster are identified and all data is evacuated from the first subgroup of disks to other disks of the disk cluster. The first subgroup of disks is reformatted based on the received format conversion instruction. A group of data objects stored in the disk cluster is converted based on the format conversion instruction and the converted group of data objects are written to the reformatted first subgroup of disks. The process iterates through the disks of the disk cluster to reformat all disks and convert all data objects based on the received format conversion instruction. The process reduces the write operations required to convert the format of the disk cluster.Type: GrantFiled: September 21, 2023Date of Patent: March 25, 2025Assignee: VMware LLCInventors: Ruiling Dou, Tao Xie, Zongliang Li, Asit Desai, Wenguang Wang, Litao Xia
-
Patent number: 12212474Abstract: The present disclosure relates to bootstrapping an encrypted single node VSAN cluster. One method includes receiving a request to create an encrypted VSAN cluster from a single host in a software-defined datacenter, deploying a virtual server on a VSAN datastore of the software-defined datacenter, registering a native key provider (NKP) in the virtual server, creating an empty VSAN cluster encrypted by the NKP, adding the single host to the encrypted empty cluster to create a one-host encrypted cluster, registering a KMIP KMS in the virtual server, switching encryption of the one-host encrypted cluster from the NKP to the KMIP KMS, and adding another host to the one-host encrypted cluster to create the encrypted cluster.Type: GrantFiled: September 28, 2022Date of Patent: January 28, 2025Assignee: VMware LLCInventors: Tao Xie, Ruiling Dou, Wenguang Wang, Zongliang Li, Zhao Jin
-
Publication number: 20230421462Abstract: The present disclosure relates to bootstrapping an encrypted single node VSAN cluster. One method includes receiving a request to create an encrypted VSAN cluster from a single host in a software-defined datacenter, deploying a virtual server on a VSAN datastore of the software-defined datacenter, registering a native key provider (NKP) in the virtual server, creating an empty VSAN cluster encrypted by the NKP, adding the single host to the encrypted empty cluster to create a one-host encrypted cluster, registering a KMIP KMS in the virtual server, switching encryption of the one-host encrypted cluster from the NKP to the KMIP KMS, and adding another host to the one-host encrypted cluster to create the encrypted cluster.Type: ApplicationFiled: September 28, 2022Publication date: December 28, 2023Applicant: VMware, Inc.Inventors: Tao Xie, Ruiling Dou, Wenguang Wang, Zongliang Li, Zhao Jin
-
Patent number: 11580078Abstract: A method of enhancing security in object based datastores is provided. The method mounts first and second datastores identified, respectively, by first and second datastore identifiers. The first and second datastores include, respectively, first and second namespace objects that are mapped to first and second subfolders in the first and second datastores. A first file within the first subfolder references a first object via a first object identifier, while a second file within the second subfolder references a second object via a second object identifier. The first and second objects are tagged with the first and second datastores' identifiers. The first and second datastores share an underlying storage and may be configured to have separate access permissions. The method receives a command to access the first object via a datastore identifier, compares the datastore identifier with the first datastore identifier, and if they match, allows access to the first object.Type: GrantFiled: May 11, 2020Date of Patent: February 14, 2023Assignee: VMWARE, INC.Inventors: Peng Dai, Tao Xie, Banghui Luo, Zongliang Li
-
Patent number: 11366617Abstract: Example methods are provided for unbalanced storage resource usage configuration for a distributed storage system in a virtualized computing environment. An example method may include obtaining usage data associated with multiple storage resources forming the distributed storage system. The multiple storage resources are supported by the multiple hosts. Based on the usage data, the method may further include determining a higher usage set and a lower usage set of one or more storage resources from the multiple storage resources and configuring the multiple hosts to use the multiple storage resources in an unbalanced manner by using the higher usage set of one or more storage resources at a higher usage level compared to the lower usage set of one or more storage resources.Type: GrantFiled: November 30, 2020Date of Patent: June 21, 2022Assignee: VMWARE, INC.Inventors: Zongliang Li, Wenguang Wang, Christian Dickmann, Mansi Shah, Tao Xie, Ye Zhang
-
Patent number: 11347536Abstract: Architectures for computing clusters with enhanced scalability and fault isolation capabilities are described. The enhanced capabilities are enabled by partitioning hosts of the clusters into multiple storage domains of the cluster. Each of the hosts includes processing and storage resources. The resources are logically partitioned into a processing layer and a storage layer of the cluster. The processing layer includes a virtualized processing resource for each of the storage domains. The storage layer includes a virtualized datastore for each of the storage domains. The processing layer provides users with access to virtualized machines (VMs). The storage layer provides the VMs with access to virtualized datastores of the associated storage domain. The aggregated resources of the host computing devices within the cluster may be employed to instantiate the processing layer and the storage layer of the cluster.Type: GrantFiled: April 3, 2020Date of Patent: May 31, 2022Assignee: VMware, Inc.Inventors: Christian Dickmann, Zhao Jin, Zongliang Li
-
Publication number: 20210303530Abstract: A method of enhancing security in object based datastores is provided. The method mounts first and second datastores identified, respectively, by first and second datastore identifiers. The first and second datastores include, respectively, first and second namespace objects that are mapped to first and second subfolders in the first and second datastores. A first file within the first subfolder references a first object via a first object identifier, while a second file within the second subfolder references a second object via a second object identifier. The first and second objects are tagged with the first and second datastores' identifiers. The first and second datastores share an underlying storage and may be configured to have separate access permissions. The method receives a command to access the first object via a datastore identifier, compares the datastore identifier with the first datastore identifier, and if they match, allows access to the first object.Type: ApplicationFiled: May 11, 2020Publication date: September 30, 2021Inventors: Peng Dai, Tao Xie, Banghui Luo, Zongliang Li
-
Publication number: 20210224097Abstract: Architectures for computing clusters with enhanced scalability and fault isolation capabilities are described. The enhanced capabilities are enabled by partitioning hosts of the clusters into multiple storage domains of the cluster. Each of the hosts includes processing and storage resources. The resources are logically partitioned into a processing layer and a storage layer of the cluster. The processing layer includes a virtualized processing resource for each of the storage domains. The storage layer includes a virtualized datastore for each of the storage domains. The processing layer provides users with access to virtualized machines (VMs). The storage layer provides the VMs with access to virtualized datastores of the associated storage domain. The aggregated resources of the host computing devices within the cluster may be employed to instantiate the processing layer and the storage layer of the cluster.Type: ApplicationFiled: April 3, 2020Publication date: July 22, 2021Applicant: VMware, Inc.Inventors: Christian DICKMANN, Zhao JIN, Zongliang LI
-
Publication number: 20210103410Abstract: Example methods are provided for unbalanced storage resource usage configuration for a distributed storage system in a virtualized computing environment. An example method may include obtaining usage data associated with multiple storage resources forming the distributed storage system. The multiple storage resources are supported by the multiple hosts. Based on the usage data, the method may further include determining a higher usage set and a lower usage set of one or more storage resources from the multiple storage resources and configuring the multiple hosts to use the multiple storage resources in an unbalanced manner by using the higher usage set of one or more storage resources at a higher usage level compared to the lower usage set of one or more storage resources.Type: ApplicationFiled: November 30, 2020Publication date: April 8, 2021Applicant: VMware, Inc.Inventors: ZONGLIANG LI, WENGUANG WANG, CHRISTIAN DICKMANN, MANSI SHAH, TAO XIE, YE ZHANG
-
Patent number: 10866762Abstract: Example methods are provided for unbalanced storage resource usage configuration for a distributed storage system in a virtualized computing environment. The method may comprise: obtaining usage data associated with multiple storage resources forming the distributed storage system; and based on the usage data, determining a higher usage set and a lower usage set from the multiple storage resources. The method also comprise configuring the multiple hosts to use the multiple storage resources in an unbalanced manner by using the higher usage set at a higher usage level compared to the lower usage set.Type: GrantFiled: July 25, 2018Date of Patent: December 15, 2020Assignee: VMWARE, INC.Inventors: Zongliang Li, Wenguang Wang, Christian Dickmann, Mansi Shah, Tao Xie, Ye Zhang
-
Publication number: 20200034075Abstract: Example methods are provided for unbalanced storage resource usage configuration for a distributed storage system in a virtualized computing environment. The method may comprise: obtaining usage data associated with multiple storage resources forming the distributed storage system; and based on the usage data, determining a higher usage set and a lower usage set from the multiple storage resources. The method also comprise configuring the multiple hosts to use the multiple storage resources in an unbalanced manner by using the higher usage set at a higher usage level compared to the lower usage set.Type: ApplicationFiled: July 25, 2018Publication date: January 30, 2020Applicant: VMware, Inc.Inventors: ZONGLIANG LI, WENGUANG WANG, CHRISTIAN DICKMANN, MANSI SHAH, TAO XIE, YE ZHANG
-
Patent number: 10154086Abstract: Example embodiments of the present invention relate to a method, a system, and a computer program product for data recovery from an unavailable peer node of a plurality of peer nodes in a network detected as unavailable. The method includes recovering from neighboring peer nodes of the plurality of peer nodes in the network neighboring the unavailable peer node a fragment of a data object distributively stored to the unavailable peer node.Type: GrantFiled: August 4, 2016Date of Patent: December 11, 2018Assignee: EMC IP Holding Company LLCInventors: Feng Zhang, Zongliang Li
-
Patent number: 9442671Abstract: Example embodiments of the present invention relate to a method and apparatus for distributively storing a data object from a client node to a logical storage group in a network. The method includes selecting a plurality of storage nodes in the network. Portions of storage available at each selected storage node are then allocated as storage units. Further, the data object may be divided by the client node into a plurality of chunks. Each respective chunk is then encoded by the client node as a plurality of fragments. Storage units allocated at each selected storage node are then assigned to the logical storage group to store respective fragments of the data object.Type: GrantFiled: December 23, 2010Date of Patent: September 13, 2016Assignee: EMC CorporationInventors: Feng Zhang, Zongliang Li