APPLICATION RESOURCE SWITCHOVER SYSTEMS AND METHODS
Granted: July 5, 2012
Application Number:
20120174112
Registry information systems and methods are presented. In one embodiment, an application resource switchover method comprises receiving a switchover indication wherein the switchover indication includes an indication to switchover execution of at least one service of an application running on a primary system resource to running on a secondary system resource; performing a switchover preparation process, wherein the switchover preparation process includes automatically generating a…
METHOD, SYSTEM AND PROCESSOR FOR LOADING LOGICAL DEVICES ONLINE
Granted: July 5, 2012
Application Number:
20120173941
A method, a system, and a processor for loading a logical device online are disclosed. The method for loading a logical device online includes receiving an online loading command; disabling a Joint Test Action Group (JTAG) link of a board on which the logical device is located through a bus between a processor and the logical device according to the online loading command, and enabling a link between an input/output (I/O) interface and a JTAG interface of the logical device through the…
HOST BASED SOFTWARE BLOCK LEVEL REPLICATION USING METADATA INDICATING CHANGED DATA OBJECTS AT SOURCE AND SECONDARY NODES
Granted: June 21, 2012
Application Number:
20120158659
A host-based replication snapshot method. The method includes synchronizing a set of data objects stored at both a replication source node and a secondary node. The method further includes identifying changed data objects out of the set of data objects from the replication source node that have been modified during a time period between a first time and a subsequent second time. Metadata indicating the changed data objects from the replication source node is transmitted to the secondary…
DEDUPLICATION-AWARE PAGE CACHE
Granted: June 21, 2012
Application Number:
20120159081
An access request that includes a combination of a file identifier and an offset value is received. If the page cache does not contain the page indexed by the combination, then the file system is accessed and the offset value is mapped to a disk location. The file system can access a block map to identify the location. A table (e.g., a shared location table) that includes entries (e.g., locations) for pages that are shared by multiple files is accessed. If the aforementioned disk…
System and Method for Website Authentication Using a Shared Secret
Granted: June 21, 2012
Application Number:
20120159177
A web site can be authenticated by a third party authentication service. A user designates an authentication device that is a shared secret between the user and the authentication service. A web site page includes a URL that points to the authentication service. The URL includes a digital signature by the web site. When the user receives the page, the user's browser issues a request to the authentication service, which attempts to authenticate the digital signature. If the authentication…
TECHNIQUES FOR PROVIDING IMPROVED PERPETRATOR IMAGING
Granted: June 14, 2012
Application Number:
20120147203
Techniques for providing improved perpetrator imaging are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for providing improved perpetrator imaging comprising identifying a client device as at least one of lost and stolen, detecting, on the client device, a difference in first pixel data associated with a first frame of a visual image and second pixel data associated with a second frame of the visual image, and capturing, on the client…
METHOD AND SYSTEM FOR IMPLEMENTING NETWORK PROXY
Granted: June 14, 2012
Application Number:
20120151070
A method and system for implementing network proxy are provided. The method includes: establishing a first connection between a client and a server through a proxy adapter, so as to enable the client to acquire status information of the server through the first connection; and if the status information of the server shows that the server is in a turn-on state, establishing a second connection between the client and the server, so as to enable the client and the server to transmit a data…
SYSTEM AND METHOD FOR OPTIMIZING REPLICATION
Granted: June 14, 2012
Application Number:
20120151164
Embodiments of the present invention are directed to a method and system for optimizing replication within a storage system utilizing multiple tiers by using tier-specific replication modes. The method includes receiving, within an electronic system having a plurality of tiers, an access request for a portion of storage associated with a first tier of the plurality of tiers and accessing a replication attribute corresponding to the first tier and also corresponding to a replication mode.…
SYSTEMS AND METHODS FOR DISPLAYING A DYNAMIC LIST OF VIRTUAL OBJECTS WHEN A DRAG AND DROP ACTION IS DETECTED
Granted: June 14, 2012
Application Number:
20120151363
A computer-implemented method to display a dynamic list of virtual objects is described. An activity relating to a management object is detected. A dynamic list of virtual objects is displayed on a screen. The virtual objects are possible recipients of the management object. A determination is made as to whether the activity relating to the management object is terminated. The display of the dynamic list of virtual objects on the screen is terminated when the activity relating to the…
CONFIGURATION REGISTRY SYSTEMS AND METHODS
Granted: June 14, 2012
Application Number:
20120151501
Registry information systems and methods are presented. In one embodiment, an application dedicated registry hive method comprises: performing application dedicated registry hive agent operations, including: an online initiation phase in which a system independent application dedicated registry hive from a shared resource is loaded into the system namespace; a monitoring phase in which status of the system independent application dedicated registry hive is monitored; and an offline…
METHOD, DEVICE, AND SYSTEM FOR MANAGING PERMISSION INFORMATION
Granted: June 7, 2012
Application Number:
20120144192
A method, a device, and a system for managing permission information are provided. The method includes: receiving a permission modification instruction, where the permission modification instruction is used to instruct modification of permission information of a file; modifying the permission information according to the permission modification instruction of the file; and sending an Identifier (ID) of the file and the modified permission information to a server. The device includes: a…
COMPUTER VIRUS DETECTION SYSTEMS AND METHODS
Granted: June 7, 2012
Application Number:
20120144488
Systems and methods for computer virus detection are presented. In one embodiment; an computer virus detection method includes: receiving an indication of a change to a file; performing a virus analysis process, including executing the changes to the file in a virtual machine and examining results of the executing the changes; and handling the file based upon the virus analysis. The virus analysis can be performed in a system in which the change to the file occurs. Handling the file can…
METHOD AND SYSTEM FOR TAKING OVER DEVICES
Granted: May 31, 2012
Application Number:
20120137042
A method and system for taking over devices are provided. In a solution, a first control board first performs topology discovery on a Peripheral Component Interconnect Express (PCIE) bus, and reserves resources for a Switch (SW) where a NON-Transparent (NT) bridge is located and devices connected to down ports of the SW according to a set resource reservation policy when the topology discovery proceeds to the NT bridge, where the SW and the devices are currently controlled by a second…
VIRTUAL PRIVATE NETWORK NODE INFORMATION PROCESSING METHOD, RELEVANT DEVICE AND SYSTEM
Granted: May 17, 2012
Application Number:
20120124660
A Virtual Private Network (VPN) node information processing method and a VPN node information processing device are provided, in which the method comprises: receiving an access request message sent by a node, in which the access request message at least carries authentication information, a current real Internet Protocol (IP) address, a node name and information indicating whether to accept extranet connection of the node; allocating a virtual IP address for the node when the…
FILE SYSTEM CONSISTENCY CHECK ON PART OF A FILE SYSTEM
Granted: May 10, 2012
Application Number:
20120117035
A file system that includes multiple logical devices can be subdivided into multiple containers. The containers each include respective non-overlapping sets of the logical devices. An amount of memory allocated to a container is dynamic. A set of the containers can be selected for a file system consistency check. The file system consistency check is performed on only the set of the containers instead of on the entire file system.
IP-BASED BLOCKING OF MALWARE
Granted: May 10, 2012
Application Number:
20120117650
A security module on a client monitors file download activities at the client and reports hosting website data to a security server. A download analysis module at the security server receives a hosting website data report from the client, where the hosting website data report describes a domain name and an IP address of a website hosting a file the client is attempting to download. The download analysis module analyzes the domain name and IP address of the website to generate file…
SYSTEM AND METHOD FOR OPTIMIZING MIRROR CREATION
Granted: May 3, 2012
Application Number:
20120109897
Embodiments of the present invention are directed to a method and system for optimizing mirror creation. The method includes receiving, within an electronic system, a request for creating a mirror of a portion of a volume and accessing a data structure comprising information about a plurality of regions of the volume. The method further includes determining a plurality of regions comprising non-zeros of the volume based on the data structure and copying only the plurality of regions…
INODE SYSTEMS AND METHODS
Granted: May 3, 2012
Application Number:
20120109921
Systems and methods for inode use are presented. In one embodiment; an inode reuse method includes: receiving an indication of an operation that involves access to file related information; assigning an inode to the access; identifying one of a plurality of inode reuse scenarios for the inode; and making the inode available for reuse in accordance with the one of the plurality of inode reuse scenarios. In one embodiment, the one of the plurality of inode reuse scenarios is a relatively…
IDENTIFYING UNREFERENCED FILE SYSTEM COMPONENTS
Granted: April 19, 2012
Application Number:
20120095970
A list of data structures (e.g., inodes) can be accessed, and the data structures in the list can be examined. If a data structure is examined, a counter value associated with the data structure is changed to a generation number that is associated with the examination. Subsequently, the counter values can be used to identify unreferenced data structures. More specifically, the counter value for an unreferenced data structure will be different from the generation number for the most…
ONLINE FILE SYSTEM CONSISTENCY CHECK
Granted: April 19, 2012
Application Number:
20120095971
A lock is acquired on a data structure. Content in the data structure is read and verified while the lock is held. The lock is then released, and then the file system components that are referred to by the data structure are verified. In essence, a file system consistency check of the file system components is performed offline in the background while the data structure remains accessible.