会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 51. 发明授权
    • Configuration management apparatus and method
    • 配置管理装置和方法
    • US07600092B2
    • 2009-10-06
    • US11476876
    • 2006-06-29
    • Masayuki YamamotoYasunori KanedaYasuyuki Mimatsu
    • Masayuki YamamotoYasunori KanedaYasuyuki Mimatsu
    • G06F12/08
    • G06F3/0647G06F3/0605G06F3/067G06F12/0866
    • To migrate a configuration that an old storage device has to a new storage device. A new storage device obtains a configuration of an old storage device, by using a migration manager, and prepares a logical volume definition of the new storage device based on a logical volume definition in the configuration. Also, based a cache allocation definition in the configuration and cache capacity of the new storage device, a cache allocation definition of the new storage device is prepared. Further, based on a port bandwidth allocation definition in the configuration and bandwidth capacity of a port of the new storage device, a port bandwidth allocation definition of the new storage device is prepared. The prepared logical volume definition, cache allocation definition and port bandwidth allocation definition are set up in a configuration of the new storage device.
    • 将旧存储设备的配置迁移到新的存储设备。 新的存储设备通过使用迁移管理器获得旧存储设备的配置,并且基于配置中的逻辑卷定义来准备新存储设备的逻辑卷定义。 此外,基于新存储设备的配置和高速缓存容量中的高速缓存分配定义,准备新存储设备的高速缓存分配定义。 此外,根据新存储装置的端口的配置和带宽容量中的端口带宽分配定义,准备新存储装置的端口带宽分配定义。 准备的逻辑卷定义,缓存分配定义和端口带宽分配定义是在新存储设备的配置中设置的。
    • 52. 发明申请
    • Storage system
    • 存储系统
    • US20090204618A1
    • 2009-08-13
    • US12078615
    • 2008-04-02
    • Toru TanakaYuichi TaguchiHiroshi NasuMasayuki Yamamoto
    • Toru TanakaYuichi TaguchiHiroshi NasuMasayuki Yamamoto
    • G06F17/30
    • G06F11/3476
    • A storage system capable of identifying all volumes to be audited is provided.Operation logs 3005 concerning the operations of volumes are associated with a time and stored in storage apparatuses 1400 and 1500, and a management computer 1100 collects information about these operation logs 3005, restores the status history of the operation logs 3005, sets, as an audit range, the operation logs 3005 including volumes with an audit period and audit target data stored therein, extracts the operation logs 3005 belonging to the audit range from the restored status history of the operation logs 3005, and transmits the extracted operation logs 3005 to a computer (requesting computer) 1000. As a result, all the audit target volumes can be identified.
    • 提供了一种能够识别要审核的所有卷的存储系统。 关于卷的操作的操作日志3005与时间相关联并存储在存储设备1400和1500中,并且管理计算机1100收集关于这些操作日志3005的信息,恢复操作日志3005的状态历史,设置为审计 范围内,包含审核期间的卷和审核对象数据的操作日志3005从恢复的操作日志3005的状态历史中提取属于审核范围的操作日志3005,并将提取的操作日志3005发送到计算机 (请求计算机)1000.因此,可以识别所有审核目标卷。
    • 58. 发明授权
    • Data recovery method for computer system
    • 计算机系统的数据恢复方法
    • US07506117B2
    • 2009-03-17
    • US11340280
    • 2006-01-25
    • Masayuki YamamotoMasayasu AsanoTakashi OedaTomohiko Suzuki
    • Masayuki YamamotoMasayasu AsanoTakashi OedaTomohiko Suzuki
    • G06F12/16
    • G06F11/1456G06F11/1469G06F11/1471
    • To reduce a burden imposed on a system administrator in restore operation, there is provided a computer system including at least one storage system, at least one host computer, and a management computer, in which: the storage system includes: a first processor; a first memory; and a disk drive; the host computer includes: a second processor; and a second memory; the management computer includes: a third processor; and a third memory; the second processor executes plurality of applications; the first processor and the second processor create check points to be used to maintain consistency of data at predetermined timing for the respective applications; and a third processor obtains recovery conditions, which are conditions for a check point to be used for a recovery, and identifies a check point, which satisfies the obtained conditions, from the created check points for the respective applications.
    • 为了减少在还原操作中对系统管理员的负担,提供了一种包括至少一个存储系统,至少一个主计算机和管理计算机的计算机系统,其中:所述存储系统包括:第一处理器; 第一个记忆; 和磁盘驱动器; 所述主计算机包括:第二处理器; 和第二存储器; 管理计算机包括:第三处理器; 和第三存储器; 第二处理器执行多个应用; 第一处理器和第二处理器创建检查点以用于在各个应用的预定定时保持数据的一致性; 并且第三处理器获得作为用于恢复的检查点的条件的恢复条件,并且从针对各个应用的创建的检查点识别满足获得的条件的检查点。
    • 60. 发明申请
    • MANAGEMENT METHOD FOR ARCHIVE SYSTEM SECURITY
    • 存档系统安全管理方法
    • US20090063872A1
    • 2009-03-05
    • US12017361
    • 2008-01-22
    • Toru TANAKAYuichi TaguchiMasayuki YamamotoJun Mizuno
    • Toru TANAKAYuichi TaguchiMasayuki YamamotoJun Mizuno
    • G06F12/14G06F12/00
    • G06F21/6227
    • Creating a plaintext index from a text that is extracted from a file presents the risk of a leak of confidential information from the created index. To address this problem, provided is a computer system which has a computer, a storage subsystem coupled to the computer, and a network coupling the computer and the storage subsystem. The computer has an interface coupled to the network, a first processor coupled to the interface, and a memory coupled to the first processor. The storage subsystem has a disk device which stores data. A storage area of the disk device is divided into a plurality of storage areas including, at least, a first storage area and a second storage area. The first processor reads a part of data stored in the first storage area, encrypts the part of data read from the first storage area when the data stored in the first storage area is judged as encrypted data, and writes the encrypted part of data in the second storage area.
    • 从文件中提取的文本中创建明文索引会导致从创建的索引中泄露机密信息的风险。 为了解决这个问题,提供了一种具有计算机,耦合到计算机的存储子系统和耦合计算机和存储子系统的网络的计算机系统。 计算机具有耦合到网络的接口,耦合到接口的第一处理器和耦合到第一处理器的存储器。 存储子系统具有存储数据的磁盘设备。 磁盘装置的存储区域被划分为至少包括第一存储区域和第二存储区域的多个存储区域。 第一处理器读取存储在第一存储区域中的数据的一部分,当存储在第一存储区域中的数据被判定为加密数据时,对从第一存储区域读取的部分数据进行加密,并将加密的数据部分写入 第二存储区域。