Compatibly extending offload token size
First Claim
Patent Images
1. A method performed on a computing device that includes at least one processor and memory, the method comprising:
- receiving, by the computing device, two or more subtokens, each of a fixed size, the subtokens together representing a larger token of a size larger than the fixed size, the larger token representing data that is immutable as long as the larger token is valid;
obtaining, by the computing device from one or more of the subtokens, a cryptographically secure key and information that identifies a source from which the data represented by the lamer token is obtainable; and
providing, by the computing device to an offload provider that comprises at least one other computing device that is separate from the computing device, evidence of the key to obtain a portion of the data represented by the larger token without the portion of the data passing through an initiator that provided the subtokens.
3 Assignments
0 Petitions
Accused Products
Abstract
Aspects of the subject matter described herein relate to offload technology. In aspects, a mechanism is described that allows an offload provider to use larger tokens. The larger token may be physical or virtual. In response to an offload read command, a larger token may be created and data from the larger token may be split or injected into multiple tokens of a smaller size. In response to an offload write command, data from the multiple tokens may be combined into a larger token and/or extracted and used to obtain bulk data.
108 Citations
17 Claims
-
1. A method performed on a computing device that includes at least one processor and memory, the method comprising:
-
receiving, by the computing device, two or more subtokens, each of a fixed size, the subtokens together representing a larger token of a size larger than the fixed size, the larger token representing data that is immutable as long as the larger token is valid; obtaining, by the computing device from one or more of the subtokens, a cryptographically secure key and information that identifies a source from which the data represented by the lamer token is obtainable; and providing, by the computing device to an offload provider that comprises at least one other computing device that is separate from the computing device, evidence of the key to obtain a portion of the data represented by the larger token without the portion of the data passing through an initiator that provided the subtokens. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a computing device that includes at least one processor and memory; and at least one program module that, based on execution by the at least one processor, configures the computing device to receive an offload read message initiated by an initiator; generate in response to the received offload read message, a cryptographically secure key; and provide, to a separate computing device, subtokens, each of a fixed size, the subtokens representing a larger token of a size larger than the fixed size data corresponding to the larger token maintained by an offload provider, the subtokens comprising information that identifies a source from which the data represented by the lamer token is obtainable, the larger token representing data that is immutable as long as the larger token is valid, the larger token including the cryptographically secure key. - View Dependent Claims (12, 13, 14)
-
-
15. At least one hardware computer storage medium having computer-executable instructions that, based on execution by at least one processor of at least one computing device that include at least one memory, configure the computing device to perform actions, comprising:
-
initiating, by the at least one computing device, an offload read request by communicating with a component of a source storage stack; receiving, by the at least one computing device from at least one separate computing device in response to the offload read request, subtokens, the subtokens representing a larger token that is larger than any of the subtokens individually, the larger token representing data that is immutable as long as the larger token is valid, where the received subtokens comprise information that identifies a source from which the data represented by the lamer token is obtainable; and initiating, by the at least one computing device, an offload write request by providing the subtokens to a destination storage stack. - View Dependent Claims (16, 17)
-
Specification