G06F2213/0008

SYSTEM AND METHOD FOR PROVIDING IN-STORAGE ACCELERATION (ISA) IN DATA STORAGE DEVICES
20190107956 · 2019-04-11 ·

A data storage device includes: a data storage medium; a processor comprising a plurality of processor cores; a plurality of application acceleration black-box (AABB) slots including reconfigurable logic blocks, interconnects, and memories; a host interface that receives a host command from a remote application running on a remote host computer, wherein the host command includes an image file including a register-transfer level (RTL) bitstream and a firmware driver; and a configuration controller that downloads the RTL bitstream to an AABB slot of the plurality of AABB slots and reconfigure the AABB slot, and load the firmware driver to a processor core of the processor. The processor core loaded with the firmware driver runs a data acceleration process of the remote application to access and process data stored in the data storage medium using the RTL bitstream downloaded in the AABB slot.

SYSTEM AND METHOD FOR PROVIDING NEAR STORAGE COMPUTE USING A BRIDGE DEVICE
20190108158 · 2019-04-11 ·

A bridge device includes: a first interface configured to receive a first set of commands from an application running on a host computer; one or more command processors, each of the one or more command processors being configured to translate the first set of commands and generate a second set of commands based on the first set of commands; a second interface configured to provide the second set of commands to a data storage device; and a computing processor configured to issue an internal command to fetch data from the data storage device and write data to the data storage device in a background mode in an agnostic manner to the host computer while running the application.

SYSTEM AND METHOD FOR SECURELY CONNECTING TO A PERIPHERAL DEVICE
20190087359 · 2019-03-21 ·

A device connectable between a host computer and a computer peripheral over a standard bus interface is disclosed, used to improve security, and to detect and prevent malware operation. Messages passing between the host computer and the computer peripherals are intercepted and analyzed based on pre-configured criteria, and legitimate messages transparently pass through the device, while suspected messages are blocked. The device communicates with the host computer and the computer peripheral using proprietary or industry standard protocol or bus, which may be based on a point-to-point serial communication such as USB or SATA. The messages may be stored in the device for future analysis, and may be blocked based on current or past analysis of the messages. The device may serve as a VPN client and securely communicate with a VPN server using the host Internet connection.

LITE NETWORK SWITCH ARCHITECTURE

Disclosed embodiments include a network switch having a first number of switch elements and a second number of switch elements cross-connected to the first switch elements to passively route network traffic through the network switch in accordance with a predefined configuration.

System and method for securely connecting to a peripheral device

A device connectable between a host computer and a computer peripheral over a standard bus interface is disclosed, used to improve security, and to detect and prevent malware operation. Messages passing between the host computer and the computer peripherals are intercepted and analyzed based on pre-configured criteria, and legitimate messages transparently pass through the device, while suspected messages are blocked. The device communicates with the host computer and the computer peripheral using proprietary or industry standard protocol or bus, which may be based on a point-to-point serial communication such as USB or SATA. The messages may be stored in the device for future analysis, and may be blocked based on current or past analysis of the messages. The device may serve as a VPN client and securely communicate with a VPN server using the host Internet connection.

System and method for securely connecting to a peripheral device

A device connectable between a host computer and a computer peripheral over a standard bus interface is disclosed, used to improve security, and to detect and prevent malware operation. Messages passing between the host computer and the computer peripherals are intercepted and analyzed based on pre-configured criteria, and legitimate messages transparently pass through the device, while suspected messages are blocked. The device communicates with the host computer and the computer peripheral using proprietary or industry standard protocol or bus, which may be based on a point-to-point serial communication such as USB or SATA. The messages may be stored in the device for future analysis, and may be blocked based on current or past analysis of the messages. The device may serve as a VPN client and securely communicate with a VPN server using the host Internet connection.

Prioritizing Dedicated Host Ports When N-Port ID Virtualization is enabled in a Storage Controller
20180335945 · 2018-11-22 ·

Executing connections from a data processing system to a storage controller using ports specified in a TPG report. The storage controller receives a RTPG SCSI request from the data processing system via a FC fabric. The storage controller determines whether NPIV is enabled on the storage controller and, if so, the storage controller modifies the TPG report to include one or more dedicated N-Ports and one or more multi-purpose N-Ports, where AAS bits of a dedicated N-Port descriptor associated with the dedicated N-Ports are set as Active/optimized. The storage controller sends the modified TPG report to the data processing system. The storage controller then processes an access request received from the data processing system where the access request is received on one of the one or more dedicated N-Ports and the one or more multi-purpose N-Ports according to the TPG report and a device type of the data processing system.

SYSTEM AND METHOD FOR PROVIDING IN-STORAGE ACCELERATION (ISA) IN DATA STORAGE DEVICES
20240320182 · 2024-09-26 ·

A data storage device includes: a data storage medium; a processor comprising a plurality of processor cores; a plurality of application acceleration black-box (AABB) slots including reconfigurable logic blocks, interconnects, and memories; a host interface that receives a host command from a remote application running on a remote host computer, wherein the host command includes an image file including a register-transfer level (RTL) bitstream and a firmware driver; and a configuration controller that downloads the RTL bitstream to an AABB slot of the plurality of AABB slots and reconfigure the AABB slot, and load the firmware driver to a processor core of the processor. The processor core loaded with the firmware driver runs a data acceleration process of the remote application to access and process data stored in the data storage medium using the RTL bitstream downloaded in the AABB slot.

Multiple transaction data flow control unit for high-speed interconnect

Methods, apparatus, and systems, for transporting data units comprising multiple pieces of transaction data over high-speed interconnects. A flow control unit, called a KTI (Keizer Technology Interface) Flit, is implemented in a coherent multi-layer protocol supporting coherent memory transactions. The KTI Flit has a basic format that supports use of configurable fields to implement KTI Flits with specific formats that may be used for corresponding transactions. In one aspect, the KTI Flit may be formatted as multiple slots used to support transfer of multiple respective pieces of transaction data in a single Flit. The KTI Flit can also be configured to support various types of transactions and multiple KTI Flits may be combined into packets to support transfer of data such as cache line transfers.

SYSTEM AND METHOD FOR SECURELY CONNECTING TO A PERIPHERAL DEVICE

A device connectable between a host computer and a computer peripheral over a standard bus interface is disclosed, used to improve security, and to detect and prevent malware operation. Messages passing between the host computer and the computer peripherals are intercepted and analyzed based on pre-configured criteria, and legitimate messages transparently pass through the device, while suspected messages are blocked. The device communicates with the host computer and the computer peripheral using proprietary or industry standard protocol or bus, which may be based on a point-to-point serial communication such as USB or SATA. The messages may be stored in the device for future analysis, and may be blocked based on current or past analysis of the messages. The device may serve as a VPN client and securely communicate with a VPN server using the host Internet connection.