会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Controller-based transaction logging system for data recovery in a storage area network
    • 基于控制器的事务记录系统,用于存储区域网络中的数据恢复
    • US06658590B1
    • 2003-12-02
    • US09539011
    • 2000-03-30
    • Stephen J. SicolaSusan G. ElkingtonMichael D. WalkerJames E. PhersonPaul Guttormson
    • Stephen J. SicolaSusan G. ElkingtonMichael D. WalkerJames E. PhersonPaul Guttormson
    • G06F1100
    • G06F11/2082G06F11/1471G06F11/2005G06F11/2038G06F11/2048G06F11/2089
    • A system which provides a completely redundant configuration including dual Fibre Channel fabric links interconnecting each of the components of two data storage sites, wherein each site comprises a host computer and associated data storage array, with redundant array controllers and adapters. The array controllers perform a command and data logging function which stores all host write commands and data ‘missed’ by the backup storage array during a situation wherein the links between the sites are down, the remote site is down, or where a site failover to the remote site has occurred. Log units are used to store, in order, all commands and data for every transaction which was ‘missed’ by the backup storage array when one of the above system error conditions has occurred. The system provides rapid and accurate recovery of backup data at the remote site by sending all logged commands and data from the logging site over the link to the backup site in order, while avoiding the overhead of a full copy operation.
    • 提供完全冗余配置的系统,包括互连两个数据存储站点的每个组件的双光纤通道结构链路,其中每个站点包括具有冗余阵列控制器和适配器的主计算机和相关联的数据存储阵列。 阵列控制器执行命令和数据记录功能,该功能在站点之间的链路关闭,远程站点关闭或站点故障切换到的位置的情况下,存储备份存储阵列的所有主机写入命令和数据“丢失” 远程站点已发生。 日志单元用于按顺序存储当发生上述系统错误条件之一时由备份存储阵列“错过”的每个事务的所有命令和数据。 该系统通过将所有记录的命令和数据从记录站点通过链路发送到备份站点,从而在远程站点快速准确地恢复备份数据,同时避免了完整复制操作的开销。
    • 2. 发明申请
    • File security management
    • 文件安全管理
    • US20050223183A1
    • 2005-10-06
    • US11144108
    • 2005-06-03
    • James PhersonDiana ShenPaul GuttormsonMichael Walker
    • James PhersonDiana ShenPaul GuttormsonMichael Walker
    • H04L29/06H04L29/08G06F12/14
    • H04L63/101H04L63/20H04L67/1097
    • A method for implementing security management in a storage area network by controlling access to network resources. Initially, a resource provider communicates with potential resource users, such as host computers, servers, and workstations, to allow the users to discover the resources available on the storage area network. Resource users that have not previously logged in to a particular resource supply identification information to the resource provider, which places the information in a ‘not yet approved entity’ table. The ‘not yet approved entity’ table is made available to a management station. An administrator, using the management station, then determines whether to authorize use of resources. If access to the requested resource is allowed, the resource user identification information is stored in an ‘approved entity’ table. A login is then allowed by the resource user to the selected resource. Once a resource user has initially logged in, connection information is maintained in the ‘approved entity’ table facilitating subsequent log-in attempts by the resource user.
    • 一种通过控制对网络资源的访问来实现存储区域网络中的安全管理的方法。 最初,资源提供者与潜在的资源用户(如主机,服务器和工作站)进行通信,以允许用户发现存储区域网络上可用的资源。 以前没有登录到特定资源的资源用户将资源提供给资源提供者,将信息放置在“尚未批准的实体”表中。 “尚未批准的实体”表可以提供给管理站。 管理员使用管理站确定是否授权使用资源。 如果允许访问所请求的资源,则资源用户标识信息被存储在“已批准的实体”表中。 资源用户然后允许登录到所选资源。 一旦资源用户最初登录,则在“已批准的实体”表中维护连接信息,便于资源用户的后续登录尝试。