Software Signing Certificate Reputation Model
Granted: April 19, 2012
Application Number:
20120096516
A request from a software developer is received to digitally sign software included in the request. A security policy associated with the software developer is accessed where the security policy describes criteria for valid request by the software developer. A determination is made whether the request is valid based at least in part on the security policy. The software is digitally signed responsive to the determination indicating that the request is valid. The digitally signed software…
One Time Password
Granted: April 19, 2012
Application Number:
20120096535
A token calculates a one time password by generating a HMAC-SHA-1 value based upon a key K and a counter value C, truncating the generated HMAC-SHA-1 value modulo 10?Digit, where Digit is the number of digits in the one time password. The one time password can be validated by a validation server that calculates its own version of the password using K and its own counter value C?. If there is an initial mismatch, the validation server compensate for a lack of synchronization between…
DATA BACKUP PROCESSING METHOD, DATA STORAGE NODE APPARATUS AND DATA STORAGE DEVICE
Granted: April 12, 2012
Application Number:
20120089799
A data backup processing method is provided, which includes: numbering at least one data storage node in a data storage device, in which the data storage node includes a primary storage area and a backup storage area, and the primary storage area of the data storage node and a backup storage area of a next adjacently numbered data storage node are logically connected, so that a number of data storage nodes form a ring structure with sequential logical connection; and respectively backing…
SELECTIVE VIRTUAL MACHINE IMAGE REPLICATION SYSTEMS AND METHODS
Granted: March 22, 2012
Application Number:
20120072393
Systems and methods for fault handling are presented. In one embodiment, a fault handling method includes: performing an information collection process, wherein the information collection process includes collecting information regarding guest operating system files of a virtual machine; performing a selective replication region identification process, wherein the selective replication region identification process includes identifying regions associated with a selective amount of the…
FAULT HANDLING SYSTEMS AND METHODS
Granted: March 22, 2012
Application Number:
20120072766
Systems and methods for fault handling are presented. In one embodiment, a fault handling method includes: performing an error type detection process including determining if an error is a media error or a connectivity error; performing a detachment determination process to establish an appropriate detachment scenario, wherein the appropriate detachment scenario includes not detaching any mirrors if the connectivity error involves all mirrors; and returning an application write with a…
Safely Updating Latent Applications to Reduce Attack Surface
Granted: March 1, 2012
Application Number:
20120054729
Executable content on an endpoint is selectively patched based on the usage of the content. The usage of executable content on an endpoint is monitored. Based on the usage of the executable content, a usage score is calculated. The usage score indicates how often the executable content is used at the endpoint. Responsive to the usage score, a determination of whether to perform a patching action is made. If it is determined that a patching action is to be performed, a patching action is…
EXTENT REFERENCE COUNT UPDATE SYSTEM AND METHOD
Granted: February 23, 2012
Application Number:
20120047115
Systems and methods for extent reference count updates are presented. In one embodiment; a reference count update method includes: receiving an indication of new reference association with an extent of a shared storage component; generating reference count update log information for a reference count update log to indicate the new reference association with an extent of a shared storage component, wherein the altering occurs inline; forwarding a successful data update indicator to…
METHOD AND SYSTEM FOR EFFICIENTLY READING A PARTITIONED DIRECTORY INCIDENT TO A SERIALIZED PROCESS
Granted: February 16, 2012
Application Number:
20120041923
A method of reading data from a partitioned directory incident to a serialized process. A first read and an offset value are received. A first data block in a modeled fully partitioned directory is identified based on the offset value and a predetermined number of entries associated with a buffer. It is determined whether the first data block in the fully partitioned directory is present in the actual partitioned directory. Zeros are written in the buffer if the first data block in the…
METHOD AND SYSTEM FOR PARTITIONING DIRECTORIES
Granted: February 16, 2012
Application Number:
20120042062
A method of partitioning directory. Accesses, e.g., shared/exclusive, and/or waiting requests, e.g., shared/exclusive, to access one or more files with a directory are monitored, e.g., incrementing/decrementing respective counters. The waiting requests are queued to be granted at a later time. The directory is determined to be primed for partitioning if a number of waiting requests to access the directory is greater than a threshold value of a plurality of heuristics and optionally…
METHOD AND SYSTEM FOR LINK COUNT UPDATE AND SYNCHRONIZATION IN A PARTITIONED DIRECTORY
Granted: February 16, 2012
Application Number:
20120042063
A method of updating a link count in a partitioned directory shared by a plurality of computers within a cluster. The partitioned directory is traversed once by a first computer to obtain a link count. The link count is stored in the first computer and broadcast to a cluster of computers. A total number of allocated links is less than a maximum limit on link count minus the link count. A respective number of links is allocated to each computer within the cluster. Delta values of each…
METHOD AND SYSTEM FOR ANOMALY DETECTION AND PRESENTATION
Granted: February 16, 2012
Application Number:
20120042255
A system and method for anomaly detection and presentation. The method of anomaly detection and presentation comprises receiving information for a plurality of traits from a plurality of servers. A first server has fewer of the plurality of traits than a second server. A first trait is on fewer of the plurality of servers than a second trait. The plurality of servers is rendered in a graphical display wherein the first server is positioned to one side of the second server based on…
DATA RECOVERY METHOD, DATA NODE, AND DISTRIBUTED FILE SYSTEM
Granted: February 9, 2012
Application Number:
20120036394
A data recovery method includes: by a first data node, obtaining a notification that a second data node fails; and storing specified data to a third data node, recording information of the specified data stored in the third data node in backup information stored in the first data node, and providing a metadata node and other data nodes storing the specified data with the information of the specified data stored in the third data node, where the specified data is data stored in the first…
Data Replication Techniques Using Incremental Checkpoints
Granted: February 9, 2012
Application Number:
20120036106
Incremental checkpoint, for use in data replication, track the changes made to a file system after a point in time at which the incremental checkpoint is created. Data replication techniques using the incremental checkpoints may include taking a regular checkpoint of the file system and creating the first time full copy on remote node using the regular checkpoint. Changes made to the file system are then tracked in an incremental checkpoint that are stored on the remote node. The…
Method and Apparatus for Peak Shifting Adjustment
Granted: February 9, 2012
Application Number:
20120032508
An apparatus and a method for peak shifting adjustment are disclosed. The apparatus includes a controlling unit that is configured to sequentially control different outputting units to output the Pulse-Width Modulation (PWM) signals according to a preset time sequence. The interval between two adjacent outputted PWM signals is T1, which is the time when the current required by an electric device is higher than the normal current in case of an increase of the duty cycle of the PWM…
Streamlined CSR Generation, Certificate Enrollment, and Certificate Delivery
Granted: February 2, 2012
Application Number:
20120030469
The process of acquiring SSL certificates for enterprise SSL customers is improved by reducing the number of steps used to acquire the SSL certificate and streamlining the process. An on-line CSR generator on the certificate enrollment form is used to submit the customer information (i.e. Common Name, Organizational Unit, Organization, City/Locality, State/Province, and Country Code) and generate the CSR. By making the CSR generation part of the enrollment process, the administrator can…
VIRTUAL MACHINE AWARE REPLICATION METHOD AND SYSTEM
Granted: January 19, 2012
Application Number:
20120016840
A method for replicating a virtual file system of a virtual machine. The method includes accessing a host file system usage map of a host machine that indicates active blocks out of a plurality of blocks of the host file system, and accessing a virtual file system usage map of a virtual machine that indicates active blocks out of a plurality of blocks of the virtual file system. A merged usage map is generated from information of the host file system usage map and the virtual file system…
TECHNIQUES FOR INTERACTION WITH A GUEST VIRTUAL MACHINE
Granted: January 12, 2012
Application Number:
20120011499
Techniques for inter-virtual machine communication are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for interaction with a guest virtual machine comprising monitoring image loads into electronic memory of a guest virtual machine using a secure virtual machine, identifying a memory structure having a specified format, and performing, using the secure virtual machine, at least one of reading one or more portions of the identified memory…
PERMISSION TRACKING SYSTEMS AND METHODS
Granted: January 12, 2012
Application Number:
20120011161
Systems and methods for permission maintenance are presented. In one embodiment, a permission maintenance method includes: gathering permission indication information including permission indications associated with various stored information; analyzing the permission indication information including analyzing potential permission indication origination; and creating interface presentation information based upon results of the analyzing the permission indications, wherein the interface…
Systems and Methods for Alternating Malware Classifiers in an Attempt to Frustrate Brute-Force Malware Testing
Granted: January 5, 2012
Application Number:
20120005750
A computer-implemented method for alternating malware classifiers in an attempt to frustrate brute-force malware testing may include (1) providing a group of heuristic-based classifiers for detecting malware, wherein each classifier within the group differs from all other classifiers within the group but has an accuracy rate that is substantially similar to all other classifiers within the group, (2) including the group of classifiers within a security-software product, and (3)…
CLUSTER CONFIGURATION SYSTEMS AND METHODS
Granted: January 5, 2012
Application Number:
20120005164
Systems and methods for cluster maintenance are presented. In one embodiment a cluster configuration method includes: maintaining configuration information associated with a first node and a second node, including cluster configuration version information; evaluating the first node as a potential configuration update node for the second node, including evaluating an indication of potential partial snapshot update availability based upon the configuration information associated with the…