会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Efficient content meta-data collection and trace generation from deduplicated storage
    • 从重复数据删除的存储中高效内容元数据收集和跟踪生成
    • US08667032B1
    • 2014-03-04
    • US13335750
    • 2011-12-22
    • Philip ShilaneGrant WallaceFrederick Douglis
    • Philip ShilaneGrant WallaceFrederick Douglis
    • G06F7/00G06F17/30
    • G06F17/30156G06F11/3034G06F11/3476G06F2201/83
    • The method and apparatus collect file recipes from deduplicated data storage systems, the file recipes consist of a list of fingerprints of data chunks of a file. Detailed meta-data for each unique data chunk is also collected. In an offline process, research and analysis can be performed on either the meta-data itself or on a reconstruction of a full trace of meta-data constructed by matching recipe fingerprints to the corresponding meta-data. The method and system can generate the full meta-data trace efficiently in an on-line or off-line process. Typical deduplicated storage systems achieve 10× or higher deduplication rates, and the meta-data collection is faster than processing all of the original files and produces compact meta-data that is smaller to store.
    • 该方法和设备从重复数据删除的数据存储系统收集文件配方,文件配方由文件数据块指纹列表组成。 还收集了每个唯一数据块的详细元数据。 在离线过程中,可以对元数据本身进行研究和分析,也可以对通过将配方指纹与对应的元数据进行匹配而构建的完整的元数据轨迹进行重构。 该方法和系统可以在线或离线过程中有效地生成完整的元数据跟踪。 典型的重复数据删除存储系统实现10倍或更高的重复数据删除率,元数据收集比处理所有原始文件更快,并生成较小存储的紧凑型元数据。
    • 5. 发明授权
    • Method and system for detecting unwanted content of files
    • 用于检测不需要的文件内容的方法和系统
    • US08825626B1
    • 2014-09-02
    • US13216020
    • 2011-08-23
    • Grant WallacePhilip N. ShilaneFrederick Douglis
    • Grant WallacePhilip N. ShilaneFrederick Douglis
    • G06F17/30
    • G06F17/30994
    • Techniques for detecting unwanted data are described herein. In one embodiment, a request is received for storing a data object in a storage system from a client over a network, where the request includes first representative data representing the data object without including actual content of the data object. It is detected whether the data object contains unwanted content by comparing the first representative data with second representative data without accessing the actual content of the data object, where the second representative data represents the unwanted content. A response is transmitted to the client over the network indicating whether the data object is likely to contain the unwanted object based on comparison of the first and second representative data.
    • 本文描述了用于检测不需要的数据的技术。 在一个实施例中,接收到用于通过网络从客户端将数据对象存储在存储系统中的请求,其中请求包括表示数据对象的第一代表数据,而不包括数据对象的实际内容。 通过将第一代表数据与第二代表数据进行比较来检测数据对象是否包含不需要的内容,而不访问数据对象的实际内容,其中第二代表数据表示不需要的内容。 基于第一和第二代表数据的比较,通过网络向客户端发送响应,指示数据对象是否可能包含不需要的对象。