Patent classifications
G06F3/0674
Method, electronic device and computer program product of allocating storage disks
Techniques for allocating storage disks involve: determining, from storage disks to be allocated, groups of storage disks, where each of groups of storage disks includes storage disks corresponding to one disk array; selecting, from the groups of storage disks, a group of target storage disks, the group of target storage disks having an unavailable capacity lower than a first capacity threshold; and creating, based on the storage disks, a storage disk set including at least the group of target storage disks. Accordingly, the storage disk set with optimized available capacity may be found with fewer computing overheads.
Techniques for using local key management in a data storage system
A data security technique for a data storage system includes in response to connection of an external storage device to a port of the data storage system, retrieving an authentication key encryption key (AKEK) for the data storage system from the external storage device to the data storage system. A random wrapper key (RWK) is generated based on the AKEK and an encrypted random wrapper key (ERWK) for the data storage system (retrieved from a first key repository of the data storage system). The ERWK is retrieved from a first key repository of the data storage system. A master key (retrieved from a second key repository of the data storage system) is decrypted for the data storage system using the RWK. A device access key (DAK) is derived based on the master key. The DAK is used to encrypt/decrypt data for a drive associated with the DAK.
STORAGE DEVICE INCLUDING MEMORY CONTROLLER, AND NON-VOLATILE MEMORY SYSTEM INCLUDING THE SAME AND OPERATING METHOD THEREOF
A storage device is configured to be connected to a host device via a physical cable which includes a power line and a data line. The storage device includes a non-volatile memory, a data path controller configured to temporarily deactivate the data line while power is supplied from the host device via the power line, and a memory controller. The memory controller includes a biometric module configured to receive biometric data and perform user authentication based on the biometric data; a biometric processing circuit configured to change a state of the memory controller, based on a result of the user authentication; and a data processing circuit configured to encrypt and decrypt data. The data path controller is configured to temporarily deactivate the data line in response to the changed state of the memory controller.
Upgrading on-disk format without service interruption
A logical map represents fragments from separate versions of a data object. Migration of data from a first (old) version to the second (new) version happens gradually, where write operations go to the new version of the data object. The logical map initially points to the old data object, but is updated to point to the portions of the new data object as write operations are performed on the new data object. A background migration copies data from the old data object to the new data object.
METHOD AND APPARATUS FOR COMPRESSING DATA OF STORAGE SYSTEM, DEVICE, AND READABLE STORAGE MEDIUM
In a method of storing data block, a storage device has stored a plurality of data block groups, each data block group having a common part that is contained in another data block in that group. For a target block to be stored, the storage device selects from the data block groups a target data block group has one data block whose common part is identical to a part of the target data block. The storage device then saves the target block by storing a target reference block of the target data block group and differential data between the target data block and the target reference block.
Data storage device with configurable policy-based storage device behavior
In an embodiment, a storage device is provided. A device controller with a memory is coupled with the storage device. The memory stores an application with instructions that direct the controller to receive a storage device policy. The instructions further direct the controller to store content from a storage request in accordance with the storage device policy, and record storage information, including at least a content identifier, to the memory. Subsequent to storing the content, the instructions further direct the controller to retrieve the content according to the storage information received in a storage request. According to an implementation, the instructions further provide instruction to refuse a delete request in accordance to the storage information. According to an implementation, the instructions provide direction to store the storage information at a remote location.
Method and device for baseboard management controller mounting folder with KVM
A method for a baseboard management controller mounting a folder with KVM includes following steps. A first size of a to-be-mounted folder is calculated. A second size of a mirror image file corresponding to the to-be-mounted folder is calculated based on the first size. A default storage path is allocated for the mirror image file, and it is obtained a remaining storage capacity of a disk where the default storage path is located. If the remaining storage capacity is less than the second size, a prompt dialog box, for selecting a user storage path for the mirror image file, is displayed to the user. If the remaining storage capacity of the disk where the default storage path or the user storage path is located is greater than the second size, the to-be-mounted folder is mounted to a server.
SECURE ERASURE OF A DRIVE ARRAY USING DRIVE-DEFINED, TRUSTED COMPUTING GROUP BANDS
Partitions of drives are used to form a volume of a drive array. Each partition is associated with a trusted computing group (TCG) band. Each drive encrypts data stored on the partition with a key unique to the TCG band. The volume is formed using the partitions of the drives. In response to a band-based erasure being invoked on the volume, each drive of the plurality of drives overwrites the key of the TCG band associated with the partition and provides an erasure certificate attesting to the overwriting of the key. The erasure certifications from the drives are compiled into a consolidated erasure certification that attests to the erasure of the volume.
Disk access method and host
A disk access method is provided. The method includes: generating an input/output IO request, where the IO request carries a logical unit number LUN and a virtual address of to-be-accessed data; finding, based on the LUN, an LU to be accessed, and determining, based on the virtual address, a virtual address space into which the virtual address falls; determining, based on the determined virtual address space, an access path corresponding to the virtual address space (S230); and delivering, along the access path, the IO request to a controller pointed by the access path.
Methods, apparatuses and computer program products for reallocating resource in a disk system
Techniques perform resource reallocation for a disk system. Such techniques involve: determining, based on conditions of allocated disk extents in a plurality of disks and wear levels of the plurality of disks, an enhanced neighbor matrix characterizing both distribution evenness of the disk extents on the plurality of disks and the wear levels of the plurality of disks; and performing a resource reallocation operation on the plurality of disks based on the enhanced neighbor matrix. Accordingly, it is possible to, through the enhanced neighbor matrix that is based on the wear level, simultaneously consider both the distribution evenness of disk extents and the wear level of the disk while performing resource reallocation, thereby avoiding the problem of ping-pang resource reallocation caused by inconsistent standards between different resource reallocation methods, and having good compatibility with existing storage systems.