Symantec Patent Applications

MANAGING COPY-ON-WRITES TO SNAPSHOTS

Granted: August 4, 2011
Application Number: 20110191555
An attempt to write to a block of data in a main volume of data is detected. An indicator associated with the block of data is accessed before a copy-on-write operation to a snapshot volume is performed for the block of data. The indicator is used to determine whether the copy-on-write operation is to be performed for the block of data.

Systems and Methods for Sharing the Results of Computing Operations Among Related Computing Systems

Granted: August 4, 2011
Application Number: 20110191341
A computer-implemented for sharing the results of computing operations among related computing systems may include: 1) identifying a need to perform a computing operation on a file, 2) identifying a unique identifier associated with the file, 3) determining, by using the unique identifier to query a shared store that is shared by a group of related computing systems, that at least one computing system within the group of related computing systems has previously performed the computing…

METHOD, SYSTEM AND SERVER FOR IMPLEMENTING SECURITY ACCESS CONTROL

Granted: July 21, 2011
Application Number: 20110179267
A method for implementing network security access control is provided, including: receiving and decrypting terminal identity information that is encrypted in a bi-directional encryption mode and forwarded by a switch, and authenticating the decrypted terminal identity information; returning an authentication result to the switch so that the switch controls access of a terminal to a network according to the authentication result; encrypting the decrypted terminal identity information in a…

Systems and Methods for Removing Unreferenced Data Segments from Deduplicated Data Systems

Granted: July 7, 2011
Application Number: 20110167096
A computer-implemented method for removing unreferenced data segments from deduplicated data systems may include: 1) identifying a deduplicated data system that contains a plurality of data objects, 2) dividing the data objects within the deduplicated data system into a plurality of data object groups, 3) identifying, within the data object groups, at least one data object group that has changed subsequent to a prior garbage-collection operation that removed data segments that were not…

LOCATING THE LATEST VERSION OF REPLICATED DATA FILES

Granted: June 30, 2011
Application Number: 20110161335
A list of servers known to a client is compared with lists of servers stored on the servers. An instance of content (e.g., a data file) can be accessed from a server on the list if at least a simple majority of the servers have the same version of the list.

STORAGE SYSTEMS AND METHODS

Granted: June 23, 2011
Application Number: 20110153977
Systems and methods for information storage replication are presented. In one embodiment a storage flow control method includes receiving a memory operation indication; performing a pre-reserve allocation process before proceeding with the memory operation, wherein the pre-reserve allocation process includes converting available unallocated memory space to allocated memory space if there is sufficient available unallocated memory space to perform the memory operation; executing the…

MULTISTAGE SYSTEM RECOVERY FRAMEWORK

Granted: June 23, 2011
Application Number: 20110154092
A method and system for multi-staged recovery of a distributed computer system. The method includes receiving a failure event notification from at least one node of the distributed computer system and executing a plurality of recovery stages upon receiving the failure event notification by using a recovery manager, wherein each of the plurality of recovery stages performs a defined recovery task. The progress of recovery is tracked by using at least one state machine executed by the…

DYNAMIC INSERTION AND REMOVAL OF VIRTUAL SOFTWARE SUB-LAYERS

Granted: June 16, 2011
Application Number: 20110145806
The disclosure is directed to dynamic insertion and removal of virtual software sub-layers. In one example, a virtual layer associated with a software application is virtually installed and activated in a computing device. A virtual sub-layer associated with a component of the software application is dynamically inserted in the virtual layer. The virtual layer remains active during the dynamic insertion of the virtual sub-layer. In certain embodiments, a process is executed from the…

STORAGE VISIBILITY IN VIRTUAL ENVIRONMENTS

Granted: June 16, 2011
Application Number: 20110145818
Embodiments of the present invention are directed to a method and system for making storage information available to virtual machines in virtual environments. A method includes sending a request, via an electronic system, for a plurality of storage attributes to a virtual storage access module. The virtual storage access module may facilitate access to storage for a virtual machine via a virtual access path. The method further includes receiving the plurality of storage attributes from…

ENHANCED CLUSTER MANAGEMENT

Granted: June 16, 2011
Application Number: 20110145631
An embodiment of the present invention is directed to a method and system for making intelligent failover decisions within a server cluster. The method includes receiving temperature information and location information using RFID technology and detecting an error condition. The method further includes responsive to the error condition, selecting a failover target based on said temperature information and location information and transferring operations from a portion of a storage…

STORAGE REPLICATION SYSTEMS AND METHODS

Granted: June 16, 2011
Application Number: 20110145357
Systems and methods for information storage replication are presented. In one embodiment a storage flow control method includes estimating in a primary data server what an outstanding request backlog trend is for a remote secondary data server; determining a relationship of an outstanding request backlog trend to a threshold; and notifying a client that the primary data server can not service additional requests if the trend exceeds the threshold. In one embodiment the estimating…

SCALABLE DE-DUPLICATION FOR STORAGE SYSTEMS

Granted: June 16, 2011
Application Number: 20110145207
A method for performing storage system de-duplication. The method includes accessing a plurality of initial partitions of files of a storage system and performing a de-duplication on each of the initial partitions. For each duplicate found, an indicator comprising the metadata that is similar across said each duplicate is determined. For each indicator, indicators are determined that infer a likelihood that data objects with said indicators contain duplicate data is high. Optimized…

DISTRIBUTED STORAGE THROUGH A VOLUME DEVICE ARCHITECTURE

Granted: May 26, 2011
Application Number: 20110125951
A volume manager I/O method and system. The method includes determining a storage extent mapping of storage functionality of a plurality of storage devices and generating a logical disk extent based on the storage extent mapping. The logical disk extent is exported to a volume device component that is communicatively coupled to implement I/O for an application. An I/O request from the application is received via the volume device component. The I/O request is executed in accordance with…

SYSTEM AND METHOD FOR AUTHORIZATION AND MANAGEMENT OF CONNECTIONS AND ATTACHMENT OF RESOURCES

Granted: May 26, 2011
Application Number: 20110126268
Embodiments of the present invention are directed to a method and system for authorization management and resource attachment. The method includes receiving, within an electronic system, a notification of an emulated device operable to be provisioned and updating an authorization record of an authorization record datastore. The updating of the authorization record comprises updating routing information related to communication of the emulated device and a virtual device. The method…

SYSTEM AND METHOD FOR VIRTUAL DEVICE COMMUNICATION FILTERING

Granted: May 26, 2011
Application Number: 20110126269
Embodiments of the present invention are directed to a method and system for virtual device communication filtering. The method includes receiving, within an electronic system, an instantiation request for a first virtual device and determining whether the first virtual device and a second virtual device are allowed to communicate based on an authorization record datastore. The method further includes modifying an authorization record of the authorization record datastore. The modifying…

SELECTIVE FILE SYSTEM CACHING BASED UPON A CONFIGURABLE CACHE MAP

Granted: May 19, 2011
Application Number: 20110119228
A method for implementing selective file system caching. The method includes receiving I/O requests from an application and comparing each of the I/O requests with a configurable cache map, wherein the configurable cache map controls a selective caching based on an I/O type and a file type. Each of the I/O requests are processed to render caching decisions based on the configurable cache map. Selective caching is then implemented on each of the I/O requests in accordance with the caching…

RESTRICTING ACCESS TO OBJECT BASED STORAGE

Granted: May 19, 2011
Application Number: 20110119460
A method, in one embodiment, can include a server receiving a message to deactivate a partition key of an object based storage system. A token of the object based storage system is signed by the partition key. The object based storage system includes the server. Additionally, after receiving the message, the server can deactivate the partition key to block access to a partition of the object based storage system by a client. The server includes the partition.

FILE SYSTEM QUOTA AND RESERVATION

Granted: May 19, 2011
Application Number: 20110119461
A method, in one embodiment, can include allowing storage allocation of data of a file system within an object based storage system. Furthermore, the method can include determining if storage allocation usage for the file system is below a threshold. If the storage allocation usage for the file system is not below the threshold, a client is requested to flush its dirty data associated with the file system. After requesting a client flush, the method can include determining the storage…

Systems and Methods for Processing and Managing Object-Related Data for use by a Plurality of Applications

Granted: May 12, 2011
Application Number: 20110113466
A computer-implemented method for indexing data for use by a plurality of applications may include receiving a data object at a first application of a plurality of applications. The method may include tokenizing the common-form data object to extract tokens from the data object and creating an index of the tokens extracted from the data object, the index being formatted to be utilized by each of the plurality of applications. The method may further include storing the index in a database…

FLOW SYSTEMS AND METHODS

Granted: May 5, 2011
Application Number: 20110103239
Systems and methods for process flow tracking are presented. In one embodiment, a flow method comprises collecting records associated with flow for post analysis; performing a flow connection process associated with the flow, wherein the flow connection process examines information in a hash table and connects flow segments based upon connect ID; and performing a presentation process in which the flow is visualized, searched and traversed. In one exemplary implementation, a flow…