会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • STORAGE SYSTEM, COMPUTER SYSTEM AND A METHOD OF ESTABLISHING VOLUME ATTRIBUTE
    • 存储系统,计算机系统和建立体积属性的方法
    • US20090265511A1
    • 2009-10-22
    • US12424479
    • 2009-04-15
    • Takahiro FujitaFumi MiyazakiYasunori Kaneda
    • Takahiro FujitaFumi MiyazakiYasunori Kaneda
    • G06F12/00
    • H04L63/10G06F3/0607G06F3/0623G06F3/0629G06F3/0647G06F3/067G06F3/0674H04L67/1097H04L69/329
    • In order to store data in disk drives securely in an environment with a mixture of disk drives having write protection mechanisms and disk drives without write protection mechanisms, a different write protection mechanism must be checked for each of the disk drives, and write protection must be defined for each of the disk drives storing data to be saved, which may impose a large load on system administrators. There is provided a storage controller for performing data input/output processing from a computer by managing volumes of multiple storage subsystems as external volumes and by using these external volumes as virtual volumes. In the data input/output processing, write protection is achieved based on an access attribute set for each of the virtual volumes. When an access attribute is set for a virtual volume, the same access attribute is set for an external volume corresponding to the virtual volume. Thus, the write protection is achieved for the external volume corresponding to the virtual volume.
    • 为了将磁盘驱动器中的数据安全地存储在具有写保护机制的磁盘驱动器和没有写保护机制的磁盘驱动器的环境中,必须为每个磁盘驱动器检查不同的写保护机制,写保护必须 为存储要保存的数据的每个磁盘驱动器定义,这可能对系统管理员施加大量负载。 提供了一种存储控制器,用于通过将多个存储子系统的卷作为外部卷并通过将这些外部卷用作虚拟卷来从计算机执行数据输入/输出处理。 在数据输入/输出处理中,基于为每个虚拟卷设置的访问属性来实现写入保护。 当为虚拟卷设置访问属性时,将为与虚拟卷对应的外部卷设置相同的访问属性。 因此,对于与虚拟卷对应的外部卷实现写保护。
    • 4. 发明授权
    • Performance reporting method considering storage configuration
    • 考虑存储配置的性能报告方法
    • US07600072B2
    • 2009-10-06
    • US11312552
    • 2005-12-21
    • Fumi MiyazakiYuichi TaguchiYasunori Kaneda
    • Fumi MiyazakiYuichi TaguchiYasunori Kaneda
    • G06F13/10
    • G06F3/0635G06F3/061G06F3/0689H04L67/1097
    • A management computer includes a configuration information acquisition module that acquires a data volume configuration table indicative of a logical connection relationship between structural elements of the data storage apparatus from the data storage apparatus, a transmission path specification module that specifies the structural elements that exist on a transmission path of data which is required to be written by a host computer from the structural elements of the data storage apparatus on the basis of data volume configuration table that is acquired by the configuration information acquisition module, a performance data acquisition module that acquires the performance data of the structural elements that are specified by the transmission path specification module, and a screen transition control module that output the performance data that is acquired by the performance data acquisition module.
    • 管理计算机包括配置信息获取模块,其从数据存储装置获取表示数据存储装置的结构要素之间的逻辑连接关系的数据量配置表,指定存在于 基于由配置信息获取模块获取的数据量配置表,由主计算机从数据存储装置的结构要素写入的数据的传输路径,获取性能的性能数据获取模块 由传输路径规定模块指定的结构要素的数据,以及输出由演奏数据获取模块获取的演奏数据的画面转变控制模块。
    • 7. 发明授权
    • Encryption/decryption management method in computer system having storage hierarchy
    • 具有存储层次结构的计算机系统中的加密/解密管理方法
    • US07716496B2
    • 2010-05-11
    • US10988538
    • 2004-11-16
    • Yasunori KanedaYuichi TaguchiFumi Miyazaki
    • Yasunori KanedaYuichi TaguchiFumi Miyazaki
    • G06F7/04G06F17/30G06F13/00G06F13/28H04L9/32H04N7/16B41K3/38
    • G06F3/0637G06F3/0622G06F3/0635G06F3/067G06F21/805H04L9/0836H04L2209/60
    • When a computer system including a data storage apparatus having a data storage area storing encrypted data is modified to have plural encryption/decryption units, a computer cannot appropriately use the encrypted data storage area if a path including the encryption/decryption means is not adequately determined.In a computer system having a computer 10, two or more data storage apparatuses 100 and 200 arranged hierarchically, plural encryption/decryption modules 199 and 299 on a path between the computer 10 and a data storage area 101, and a management computer 500 for managing the data storage apparatuses and the like, if there is an interoperability between the encryption/decryption modules 199 and 299 and the data storage area 101 is encrypted by the first encryption/decryption module 199, the computer 10 accesses the data storage area 101 using the second encryption/decryption module 299 (or an n-th encryption/decryption module closer to the computer than the second encryption/decryption module), rather than the first encryption/decryption module.
    • 当包括具有存储加密数据的数据存储区域的数据存储装置的计算机系统被修改为具有多个加密/解密单元时,如果包括加密/解密装置的路径未被充分确定,则计算机不能适当地使用加密数据存储区域 。 在具有计算机10的计算机系统中,在计算机10和数据存储区域101之间的路径上分层布置多个加密/解密模块199和299的两个或更多个数据存储装置100和200以及用于管理计算机10的管理计算机500 数据存储装置等,如果加密/解密模块199和299之间存在互操作性,并且数据存储区域101被第一加密/解密模块199加密,则计算机10使用数据存储区域101访问数据存储区域101 第二加密/解密模块299(或比第二加密/解密模块更靠近计算机的第n个加密/解密模块),而不是第一加密/解密模块。
    • 9. 发明授权
    • Data migration method
    • 数据迁移方法
    • US07373469B2
    • 2008-05-13
    • US11264238
    • 2005-10-31
    • Toru TanakaYuichi TaguchiFumi MiyazakiYasunori Kaneda
    • Toru TanakaYuichi TaguchiFumi MiyazakiYasunori Kaneda
    • G06F12/16
    • G06F3/0647G06F3/0605G06F3/061G06F3/067G06F17/303
    • A first storage system includes a first storage area for storing data written by a computer. A second storage system includes a second storage area to which the data stored in the first storage area migrates. A third storage system includes a virtual storage area corresponding to the second storage area. An access request to the virtual storage area is converted into an access request to the second storage area to be issued. A management computer transmits, to the third storage system, an instruction to migrate the data of the second storage area to a third storage area of the third storage system based on a determination result between a value of the data migrated to the second storage area and a predetermined threshold value.
    • 第一存储系统包括用于存储由计算机写入的数据的第一存储区域。 第二存储系统包括存储在第一存储区域中的数据迁移到的第二存储区域。 第三存储系统包括对应于第二存储区域的虚拟存储区域。 对虚拟存储区域的访问请求被转换为要发布的第二存储区域的访问请求。 管理计算机根据迁移到第二存储区域的数据的值与第二存储区域的数据之间的确定结果向第三存储系统发送将第二存储区域的数据迁移到第三存储系统的第三存储区域的指令,以及 预定的阈值。
    • 10. 发明申请
    • Data Migration Method
    • 数据迁移方法
    • US20080209104A1
    • 2008-08-28
    • US12112198
    • 2008-04-30
    • Toru TanakaYuichi TaguchiFumi MiyazakiYasunori Kaneda
    • Toru TanakaYuichi TaguchiFumi MiyazakiYasunori Kaneda
    • G06F12/08
    • G06F3/0647G06F3/0605G06F3/061G06F3/067G06F17/303
    • A first storage system includes a first storage area for storing data written by a computer. A second storage system includes a second storage area to which the data stored in the first storage area migrates. A third storage system includes a virtual storage area corresponding to the second storage area. An access request to the virtual storage area is converted into an access request to the second storage area to be issued. A management computer transmits, to the third storage system, an instruction to migrate the data of the second storage area to a third storage area of the third storage system based on a determination result between a value of the data migrated to the second storage area and a predetermined threshold value.
    • 第一存储系统包括用于存储由计算机写入的数据的第一存储区域。 第二存储系统包括存储在第一存储区域中的数据迁移到的第二存储区域。 第三存储系统包括对应于第二存储区域的虚拟存储区域。 对虚拟存储区域的访问请求被转换为要发布的第二存储区域的访问请求。 管理计算机根据迁移到第二存储区域的数据的值与第二存储区域的数据之间的确定结果向第三存储系统发送将第二存储区域的数据迁移到第三存储系统的第三存储区域的指令,以及 预定的阈值。