会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Data retention using logical objects
    • 使用逻辑对象的数据保留
    • US08214332B2
    • 2012-07-03
    • US12480549
    • 2009-06-08
    • Matthew J. AnglinAvishai H. HochbergToby L. MarekJames P. Smith
    • Matthew J. AnglinAvishai H. HochbergToby L. MarekJames P. Smith
    • G06F17/30
    • G06F11/1448G06F11/1458
    • Various embodiments are provided for facilitation of data retention using logical objects. Following an operation creating a redundant copy of the data performed on a scheduled interval, a logical object containing a number of managed file versions, represented by a number of member objects for a recovery point, is created. The logical object is assigned a policy of a data retention policy construct associated with the recovery point. The logical object is adapted for reassignment between policies of the data retention policy construct associated with various recovery points. During the reassignment, the plurality of member objects representing the plurality of managed file versions are logically retained instead of performing a data copy operation to associate the plurality of managed file versions with another recovery point.
    • 提供了各种实施例,用于使用逻辑对象促进数据保留。 在创建在计划的间隔上执行的数据的冗余副本的操作之后,创建包含多个受管文件版本的逻辑对象,由恢复点的多个成员对象表示。 逻辑对象被分配与恢复点相关联的数据保留策略构造的策略。 逻辑对象适用于与各种恢复点相关联的数据保留策略构造的策略之间的重新分配。 在重新分配期间,表示多个管理文件版本的多个成员对象被逻辑地保留,而不是执行数据复制操作以将多个被管理文件版本与另一恢复点相关联。
    • 2. 发明授权
    • Data retention using logical objects
    • 使用逻辑对象的数据保留
    • US08515914B2
    • 2013-08-20
    • US13458669
    • 2012-04-27
    • Matthew J. AnglinAvishai H. HochbergToby L. MarekJames P. Smith
    • Matthew J. AnglinAvishai H. HochbergToby L. MarekJames P. Smith
    • G06F17/30
    • G06F11/1448G06F11/1458
    • Various embodiments are provided for facilitation of data retention using logical objects. Following an operation creating a redundant copy of the data performed on a scheduled interval, a logical object containing a number of managed file versions, represented by a number of member objects for a recovery point, is created. The logical object is assigned a policy of a data retention policy construct associated with the recovery point. The logical object is adapted for reassignment between policies of the data retention policy construct associated with various recovery points. During the reassignment, the plurality of member objects representing the plurality of managed file versions are logically retained instead of performing a data copy operation to associate the plurality of managed file versions with another recovery point.
    • 提供了各种实施例,用于使用逻辑对象促进数据保留。 在创建在计划的间隔上执行的数据的冗余副本的操作之后,创建包含多个受管文件版本的逻辑对象,由恢复点的多个成员对象表示。 逻辑对象被分配与恢复点相关联的数据保留策略构造的策略。 逻辑对象适用于与各种恢复点相关联的数据保留策略构造的策略之间的重新分配。 在重新分配期间,表示多个管理文件版本的多个成员对象被逻辑地保留,而不是执行数据复制操作以将多个被管理文件版本与另一恢复点相关联。
    • 5. 发明申请
    • APPROACH FOR SECURING DISTRIBUTED DEDUPLICATION SOFTWARE
    • 分发分发软件的保护方法
    • US20110040732A1
    • 2011-02-17
    • US12541191
    • 2009-08-14
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergAlexei KojenovJames P. SmithMark L. Yakushev
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergAlexei KojenovJames P. SmithMark L. Yakushev
    • G06F12/00G06F12/16G06F7/00
    • G06F11/1453G06F21/55G06F21/64
    • The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.
    • 本发明的各种实施例包括用于确保在源 - 重复数据删除存储管理系统中发生的重复数据删除活动的使用的技术。 这些技术旨在防止由源发起的假数据备份,目标数据污染和数据欺骗攻击。 在一个实施例中,一种技术包括限制对授权用户的块查询。 另一种技术提供对目标系统内的攻击和未授权访问密钥的检测。 附加技术包括通过验证数据块来验证来自源的数据的存在,验证数据块的数据样本或验证数据块的哈希值的组合。 进一步的实施例涉及使用策略来为目标内的块共享和链接提供授权级别。 这些技术分开并组合提供了一种全面的策略,以避免未经授权的访问目标存储系统中的数据。
    • 6. 发明授权
    • Approach for securing distributed deduplication software
    • 保护分发重复数据删除软件的方法
    • US08453257B2
    • 2013-05-28
    • US12541191
    • 2009-08-14
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergAlexei KojenovJames P. SmithMark L. Yakushev
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergAlexei KojenovJames P. SmithMark L. Yakushev
    • H04L29/06
    • G06F11/1453G06F21/55G06F21/64
    • The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.
    • 本发明的各种实施例包括用于确保在源 - 重复数据删除存储管理系统中发生的重复数据删除活动的使用的技术。 这些技术旨在防止由源发起的假数据备份,目标数据污染和数据欺骗攻击。 在一个实施例中,一种技术包括限制对授权用户的块查询。 另一种技术提供对目标系统内的攻击和未授权访问密钥的检测。 附加技术包括通过验证数据块来验证来自源的数据的存在,验证数据块的数据样本或验证数据块的哈希值的组合。 进一步的实施例涉及使用策略来为目标内的块共享和链接提供授权级别。 这些技术分开并组合提供了一种全面的策略,以避免未经授权的访问目标存储系统中的数据。