H04L67/1095

ENHANCED NETWORK ATTACHED STORAGE (NAS) INTEROPERATING WITH AND OVERFLOWING TO CLOUD STORAGE RESOURCES

An illustrative storage management appliance is interposed between client computing devices and one or more cloud storage resources. The appliance uses cloud storage resources in conjunction with a network attached storage device configured within the appliance to provide to the client computing devices seemingly unlimited network attached storage on respective network shares. The storage management appliance monitors data objects on the network shares and when a data object meets one or more criteria for archiving, the storage management appliance archives the data object to a cloud storage resource and replaces it with a stub and preview image on the network share. When access to the stub and/or preview image is detected, the storage management appliance restores the data object from the cloud storage resource. The criteria for archiving flexibly allow individual data objects to be archived to cloud storage without archiving frequently-accessed “neighboring” data objects on the same network share.

Distributed streaming parallel database restores

A streaming distributed decentralized database task system can perform multiple tasks of parallel jobs on clusters of nodes without overloading the clusters' computational resources, such as disk, memory, processors, and network bandwidth. A cluster master can manage a job and add items to node queues. A node manager accepts or rejects queue items based on streaming task limits that are applied at the node level.

Distributed streaming parallel database restores

A streaming distributed decentralized database task system can perform multiple tasks of parallel jobs on clusters of nodes without overloading the clusters' computational resources, such as disk, memory, processors, and network bandwidth. A cluster master can manage a job and add items to node queues. A node manager accepts or rejects queue items based on streaming task limits that are applied at the node level.

Trusted startup methods and apparatuses of blockchain integrated station

A blockchain integrated station receives a startup instruction. The blockchain integrated station sends a signature verification request for a disk image stored in the blockchain integrated station to a cryptographic acceleration card included in the blockchain integrated station. The blockchain integrated station receives a signature verification result from the cryptographic acceleration card, where the signature verification result indicates whether a signature of the disk image passes a verification. In response to determining that the signature verification result indicates that the signature of the disk image passes the verification, the blockchain integrated station executes the disk image.

SYSTEMS AND METHODS FOR ESTABLISHING AND MAINTAINING VIRTUAL COMPUTING CLOUDS
20230131748 · 2023-04-27 ·

Networking systems and methods for establishing and maintaining virtual computing clouds are disclosed. A networking system can comprise a server and various instances of a software agent, each agent being installed on a computing device participating in a virtual computing cloud. The server can maintain account setting for a user, wherein the settings can indicate which files on indicated computing devices are included in the virtual computing cloud. The networking system can selectively synchronize data between the computing devices automatically and in a secure manner, and can transmit data in real time to simulate local storage when synchronization of certain files is inappropriate in light of file incompatibility. As a result, the networking system can provide the user with a seamless, automatic system and method for accessing a total computing environment.

SYSTEMS AND METHODS FOR ESTABLISHING AND MAINTAINING VIRTUAL COMPUTING CLOUDS
20230131748 · 2023-04-27 ·

Networking systems and methods for establishing and maintaining virtual computing clouds are disclosed. A networking system can comprise a server and various instances of a software agent, each agent being installed on a computing device participating in a virtual computing cloud. The server can maintain account setting for a user, wherein the settings can indicate which files on indicated computing devices are included in the virtual computing cloud. The networking system can selectively synchronize data between the computing devices automatically and in a secure manner, and can transmit data in real time to simulate local storage when synchronization of certain files is inappropriate in light of file incompatibility. As a result, the networking system can provide the user with a seamless, automatic system and method for accessing a total computing environment.

SYSTEMS AND METHODS OF MANAGING DATA RIGHTS AND SELECTIVE DATA SHARING
20230127891 · 2023-04-27 ·

A method includes receiving an access request at a first computing device from a second computing device, the access request specifying a data structure, the data structure including first data stored in a first portion of the data structure and second data stored in a second portion of the data structure. The method also includes extracting a first key from the access request and identifying a data rights definition that is associated with the data structure and that is associated with a second key, the data rights definition indicating that the first data but not the second data is shared with an entity associated with the second computing device. The method further includes comparing the first key to the second key, and, based on the comparison, determining whether to grant the second computing device access to the first data but not the second data.

SYSTEMS AND METHODS OF MANAGING DATA RIGHTS AND SELECTIVE DATA SHARING
20230127891 · 2023-04-27 ·

A method includes receiving an access request at a first computing device from a second computing device, the access request specifying a data structure, the data structure including first data stored in a first portion of the data structure and second data stored in a second portion of the data structure. The method also includes extracting a first key from the access request and identifying a data rights definition that is associated with the data structure and that is associated with a second key, the data rights definition indicating that the first data but not the second data is shared with an entity associated with the second computing device. The method further includes comparing the first key to the second key, and, based on the comparison, determining whether to grant the second computing device access to the first data but not the second data.

SCALABLE APPLICATION-AS-A-SERVICE ENVIRONMENT AND SYSTEMS AND METHODS USEFUL IN CONJUNCTION THEREWITH
20230126746 · 2023-04-27 ·

A computerized method of managing a computer remote session operation, comprising providing a server for hosting application execution; configuring a number of predefined user accounts with low security permissions on said server, where said user accounts are not tied to any specific real user; Whenever a remote user requests to start a remote session, finding an available user account not currently in use on said computer, allocating it for the remote session and marking it as unavailable for subsequent session requests; Generating a one-time password for said user account; Communicating the assigned user account identifier and temporary password to client component on the user's side, either directly or through an intermediate broker; causing the client component to connect to the server using said user account identifier and temporary password; and, upon termination of the remote session, deleting the assigned user account's data and marking it as available again.

SCALABLE APPLICATION-AS-A-SERVICE ENVIRONMENT AND SYSTEMS AND METHODS USEFUL IN CONJUNCTION THEREWITH
20230126746 · 2023-04-27 ·

A computerized method of managing a computer remote session operation, comprising providing a server for hosting application execution; configuring a number of predefined user accounts with low security permissions on said server, where said user accounts are not tied to any specific real user; Whenever a remote user requests to start a remote session, finding an available user account not currently in use on said computer, allocating it for the remote session and marking it as unavailable for subsequent session requests; Generating a one-time password for said user account; Communicating the assigned user account identifier and temporary password to client component on the user's side, either directly or through an intermediate broker; causing the client component to connect to the server using said user account identifier and temporary password; and, upon termination of the remote session, deleting the assigned user account's data and marking it as available again.