会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Restricted access devices
    • 受限访问设备
    • US06842810B1
    • 2005-01-11
    • US09982492
    • 2001-10-18
    • John T. FitzgeraldAlexander VeprinskyPhilip E. TamerJonathan I. KrasnerArieh Don
    • John T. FitzgeraldAlexander VeprinskyPhilip E. TamerJonathan I. KrasnerArieh Don
    • G06F3/06G06F13/00G06F21/00H04L29/06
    • H04L63/101G06F3/0622G06F3/0637G06F3/0689G06F21/78
    • Described are techniques in connection with restricting access to devices within a computer system. Access to a device may be restricted to one or more particular hosts within the computer system, and also further restricted to a particular software program executing within the particular hosts. The restricted access device (RAD) may be recognized by one or more hosts only having access to specific portions of the RAD unless special RAD I/O opcodes are used in connection with performing I/O operations. Access to a device may be obtained by enabling a particular use of the special RAD I/O opcodes. Subsequently, access to the same device may be disabled by stopping use of the special RAD I/O opcodes by a particular host and/or software executing in the host. RADs may be used in a variety of applications including, for example, restricting access to shared logs or journals and protecting a database.
    • 描述了与限制对计算机系统内的设备的访问有关的技术。 对设备的访问可以限于计算机系统内的一个或多个特定主机,并且还进一步限于在特定主机内执行的特定软件程序。 受限访问设备(RAD)可以被一个或多个仅能访问RAD的特定部分的主机识别,除非在执行I / O操作时使用特殊的RAD I / O操作码。 可以通过使用特殊的RAD I / O操作码来获得对设备的访问。 随后,可以通过由主机中执行的特定主机和/或软件停止使用特殊的RAD I / O操作码来禁用对同一设备的访问。 RAD可以用于各种应用,包括例如限制对共享日志或日志的访问和保护数据库。
    • 5. 发明授权
    • Protecting database records against a failed write operation
    • 保护数据库记录免于写入操作失败
    • US07254752B1
    • 2007-08-07
    • US10396033
    • 2003-03-25
    • Arieh DonAlexandr VeprinskyMichael ScharlandTerry Seto LeePhilip E. Tamer
    • Arieh DonAlexandr VeprinskyMichael ScharlandTerry Seto LeePhilip E. Tamer
    • G06F11/00
    • G06F11/1004
    • Described are techniques for processing data requests in connection with an I/O operation. A write data request is sent from a host to a target data storage system. The host performs a data validation, such as a checksum calculation, using the data of the data request. The data request is sent to the target data storage system. The target data storage system may be enabled to perform data validation processing on a per device basis by setting one or more device flag bits for a device. The target data storage system performs data validation processing in accordance with the flag bit settings of a device associated with a data request. A target checksum value using the data received on the target data storage system is determined and compared to the host checksum value in order to determined data validity. Data recovery processing is performed if data corruption is determined. A partial write of the data requested may be performed for those data portions occurring prior to the corrupted data that have been successfully validated.
    • 描述了用于处理与I / O操作有关的数据请求的技术。 写数据请求从主机发送到目标数据存储系统。 主机使用数据请求的数据执行数据验证,例如校验和计算。 数据请求被发送到目标数据存储系统。 可以通过为设备设置一个或多个设备标志位来使目标数据存储系统能够在每个设备的基础上执行数据验证处理。 目标数据存储系统根据与数据请求相关联的设备的标志位设置执行数据验证处理。 确定使用目标数据存储系统上接收到的数据的目标校验和值,并将其与主机校验和值进行比较,以确定数据有效性。 如果确定数据损坏,则执行数据恢复处理。 可以对已经成功验证的损坏的数据之前发生的那些数据部分执行所请求的数据的部分写入。
    • 7. 发明授权
    • Techniques for adjusting priorities associated with servicing requests
    • 调整与服务请求相关联的优先级的技术
    • US08584128B1
    • 2013-11-12
    • US11900062
    • 2007-09-10
    • Arieh DonJames L. DavidsonAlexander VeprinskyYechiel YochaiPatrick Brian Riordan
    • Arieh DonJames L. DavidsonAlexander VeprinskyYechiel YochaiPatrick Brian Riordan
    • G06F9/46
    • G06F9/5011G06F11/3442G06F11/3485
    • Described are techniques for servicing data requests in a data storage system. One or more data requests from an application executing on the host are received. The data storage system allocates a first amount of resources for use in servicing data requests from the application. Behavior of the host is monitored for occurrences of I/O failure. In accordance with criteria and the occurrences of I/O failure, it is determined whether at least one of the host or the application is in a state of pending failure. If it is determined that at least one of the host or the application is in a state of pending failure, a second amount of resources larger than the first amount are allocated for a time period when servicing data requests from the application. After the time period, data requests from the application are serviced in accordance with the first amount of resources.
    • 描述了用于维护数据存储系统中的数据请求的技术。 接收来自在主机上执行的应用程序的一个或多个数据请求。 数据存储系统分配用于服务来自应用的数据请求的第一数量的资源。 主机监视I / O故障的发生。 根据标准和I / O故障的发生,确定主机或应用程序中的至少一个是否处于等待故障的状态。 如果确定主机或应用程序中的至少一个处于等待故障的状态,则在服务来自应用的数据请求的时间段内分配大于第一数量的第二数量的资源。 在该时间段之后,根据第一资源量来服务来自应用的数据请求。