会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 133. 发明申请
    • DATA MIGRATION SYSTEM AND DATA MIGRATION METHOD
    • 数据移动系统和数据迁移方法
    • US20120096231A1
    • 2012-04-19
    • US12992383
    • 2010-10-14
    • Noboru MorishitaHideo SaitoYoshiaki EguchiMasayuki YamamotoAkira Yamamoto
    • Noboru MorishitaHideo SaitoYoshiaki EguchiMasayuki YamamotoAkira Yamamoto
    • G06F12/02
    • G06F3/0647G06F3/0608G06F3/0611G06F3/0619G06F3/0644G06F3/0665G06F3/067
    • A second storage maps a migration source volume to a virtual volume of a migration destination volume according to storage virtualization technology. A host system including a host switches an access path from an access path to the migration source volume to an access path to the migration destination volume. The second storage executes copy processing of migrating, from the migration source volume to the migration destination volume, data in an assigned area of a virtual volume according to thin provisioning of the migration source volume based on the information contained in the first thin provisioning information in the first storage, and copying that data from the migration destination volume to a virtual volume according to thin provisioning of a copy destination volume in the second storage. The second storage associates the virtual volume of the copy destination volume with the migration destination volume in substitute for the original virtual volume.
    • 根据存储虚拟化技术,第二个存储将迁移源卷映射到迁移目标卷的虚拟卷。 包括主机的主机系统将从访问路径到迁移源卷的访问路径切换到迁移目的地卷的访问路径。 所述第二存储器执行复制处理,所述复制处理根据所述第一精简配置信息中包含的信息,执行从所述迁移源卷迁移到所述迁移目的地卷的虚拟卷的分配区域中的数据, 第一存储器,以及根据第二存储器中的复制目的地卷的精简配置将数据从迁移目的地卷复制到虚拟卷。 第二个存储将复制目标卷的虚拟卷与迁移目标卷相关联,以替代原始虚拟卷。
    • 135. 发明授权
    • Management method for archive system security
    • 归档系统安全管理方法
    • US08132025B2
    • 2012-03-06
    • US12017361
    • 2008-01-22
    • Toru TanakaYuichi TaguchiMasayuki YamamotoJun Mizuno
    • Toru TanakaYuichi TaguchiMasayuki YamamotoJun Mizuno
    • G06F11/30
    • G06F21/6227
    • Creating a plaintext index from a text that is extracted from a file presents the risk of a leak of confidential information from the created index. To address this problem, provided is a computer system which has a computer, a storage subsystem coupled to the computer, and a network coupling the computer and the storage subsystem. The computer has an interface coupled to the network, a first processor coupled to the interface, and a memory coupled to the first processor. The storage subsystem has a disk device which stores data. A storage area of the disk device is divided into a plurality of storage areas including, at least, a first storage area and a second storage area. The first processor reads a part of data stored in the first storage area, encrypts the part of data read from the first storage area when the data stored in the first storage area is judged as encrypted data, and writes the encrypted part of data in the second storage area.
    • 从文件中提取的文本中创建明文索引会导致从创建的索引中泄露机密信息的风险。 为了解决这个问题,提供了一种具有计算机,耦合到计算机的存储子系统和耦合计算机和存储子系统的网络的计算机系统。 计算机具有耦合到网络的接口,耦合到接口的第一处理器和耦合到第一处理器的存储器。 存储子系统具有存储数据的磁盘设备。 磁盘装置的存储区域被划分为至少包括第一存储区域和第二存储区域的多个存储区域。 第一处理器读取存储在第一存储区域中的数据的一部分,当存储在第一存储区域中的数据被判定为加密数据时,对从第一存储区域读取的部分数据进行加密,并将加密的数据部分写入 第二存储区域。