Symantec Patent Applications

SHARED STORAGE ACCESS MANAGEMENT SYSTEMS AND METHODS

Granted: September 19, 2013
Application Number: 20130246666
Shared storage access management systems and methods are presented. A method can comprise: performing an endpoint I/O source authority tracking process in which permission of an endpoint I/O source to perform an I/O with at least a portion of an endpoint storage target is tracked at least in part based on a corresponding endpoint I/O source ID value, and performing an I/O operation based upon results of the endpoint I/O source authority tracking process. In one embodiment, the endpoint…

METHOD AND SYSTEM FOR IMPLEMENTING FAST INCREMENTAL BACKUPS

Granted: September 19, 2013
Application Number: 20130246362
A method for fast incremental replication of a file system. The method includes, at a data storage level, tracking file system status for a plurality of files by using a data structure inside respective inodes for the plurality of files, and at a file system level, tracking file system status for a plurality of files by using a file system mask structure. For all files present in a backup, a catalogue of the file path name and inode number is maintained on a source file system. During…

SYSTEMS AND METHODS FOR USING QUICK RESPONSE CODES TO ACTIVATE SOFTWARE APPLICATIONS

Granted: September 12, 2013
Application Number: 20130239104
A computer-implemented method for facilitating access to shared resources within computer clusters may include (1) identifying a quick response code captured by at least one computing system, (2) identifying information encoded in the quick response code captured by the computing system, (3) determining that the information encoded in the quick response code contains an activation key that facilitates activation of a software application, then (4) applying, in response to this…

Managing Credentials

Granted: September 12, 2013
Application Number: 20130238894
In a centralized credential management system, website credentials are stored in a vault storage at a vault. The website credentials are encrypted based upon a key not available to the vault and are for authenticating a user to a third party website. Through a client, a user authenticates to the vault and retrieves the encrypted website credentials and parameters and code for properly injecting the credentials into a website authentication form. The website credentials are decrypted at…

SYSTEMS AND METHODS FOR MAINTAINING GROUP MEMBERSHIP RECORDS

Granted: August 29, 2013
Application Number: 20130226864
A method for maintaining group membership records includes 1) maintaining a record of group memberships for a membership hierarchy, the membership record identifying a direct relationship between a first object and a second object in the membership hierarchy, 2) receiving a membership update indicating that, as of a first point in time, a direct relationship between the second object and a third object changed, 3) updating the record of group memberships to reflect the change in the…

INTELLIGENT FAILOVER OR SHUTDOWN OF AN APPLICATION USING INPUT/OUTPUT SHIPPING IN RESPONSE TO LOSS OF CONNECTIVITY TO DATA STORAGE IN A CLUSTER

Granted: August 8, 2013
Application Number: 20130205006
When a loss of connectivity between a first node in a cluster of nodes and a data store is detected, an input/output (I/O) request associated with an application that was executing on the first node is shipped to a second node in the cluster that is in communication with the data store. The application can be gracefully shut down on the first node, and the second node can execute the application and satisfy the I/O request.

SUBSEQUENT OPERATION INPUT REDUCTION SYSTEMS AND METHODS FOR VIRTUAL MACHINES

Granted: August 1, 2013
Application Number: 20130198742
Storage systems and methods are presented. A method can include: accessing virtual machine image information; performing an examination process on the virtual machine image information to determine characteristics of the virtual machine image information including temporary attributes of the virtual machine image information; performing an exclusion block identification process based upon results of the examination process to identify exclusion blocks, wherein exclusion blocks are…

METHOD AND SYSTEM FOR CLUSTER WIDE ADAPTIVE I/O SCHEDULING BY A MULTIPATHING DRIVER

Granted: August 1, 2013
Application Number: 20130198562
A method and system for load balancing. The method includes determining that connectivity between a first host and a primary array controller of a storage system has failed. The first host is configured to send input/output messages (I/Os) to a storage system through a storage network fabric. An available host is discovered at a multi-pathing driver of the first host. The available host is capable of delivering I/Os to the primary array controller. An I/O is redirected from said first…

METHOD AND SYSTEM FOR MULTI-LAYER DIFFERENTIAL LOAD BALANCING IN TIGHTLY COUPLED CLUSTERS

Granted: August 1, 2013
Application Number: 20130198424
A method and system for load balancing. The method includes discovering each of a plurality of hosts in a cluster, wherein the plurality of hosts is configured for accessing a LUN of a storage system through a storage network fabric. Global input/output (I/O) load characteristics are collected for each of the plurality of hosts at the device and/or volume level. A selected host is determined for processing an I/O originating at the local host, wherein the host is selected based on a…

VOLUME AND PARTIAL VOLUME MERGE TO SYNCHRONIZE TO NON-HOMOGENEOUS DRIVE LAYOUTS

Granted: July 25, 2013
Application Number: 20130191345
A method and system for merging files of multiple volumes in a data store to a single merged volume. The method includes creating one or more snapshots of one or more volumes of a data store of a first system. Files in the one or more snapshots are merged into a merged volume. The merged volume is mounted and stored in a second system.

SYSTEM AND METHOD FOR SCALABLE REFERENCE MANAGEMENT IN A DEDUPLICATION BASED STORAGE SYSTEM

Granted: July 18, 2013
Application Number: 20130185259
A system and method for managing a resource reclamation reference list at a coarse level. A storage device is configured to store a plurality of storage objects in a plurality of storage containers, each of said storage containers being configured to store a plurality of said storage objects. A storage container reference list is maintained, wherein for each of the storage containers the storage container reference list identifies which files of a plurality of files reference a storage…

RESOURCE THROTTLING AND AUTOMATED POLICY MANAGEMENT IN A VIRTUAL MACHINE ENVIROMNENT

Granted: July 4, 2013
Application Number: 20130173780
A method for providing resource throttling management. The method includes accessing a distributed computer system having a plurality of nodes, initiating a new object policy object backup protection for a new object, and implementing a discovery process to determine computer environment components subject to stress. The method further includes generating a physical resource throttling protocol in accordance with the components subject to stress, and processing the new object in…

AUTOMATED POLICY MANAGEMENT IN A VIRTUAL MACHINE ENVIRONMENT

Granted: July 4, 2013
Application Number: 20130173771
A method for providing object policy management. The method includes accessing a distributed computer system having a plurality of nodes, and initiating a new object policy object backup protection for a new object. The method further includes processing a list of object attributes available for the new object policy, and processing the list to generate an object management policy. The new object is then processed in accordance with the object management policy.

SYSTEMS AND METHODS FOR SAFELY MIGRATING TO VIRTUALIZED PLATFORMS

Granted: June 27, 2013
Application Number: 20130167145
A computer-implemented method for safely migrating to virtualized platforms may include (1) identifying a virtual machine that is a target of a physical-to-virtual conversion from a physical server, (2) determining that the physical-to-virtual conversion includes at least one future step before the physical-to-virtual conversion is complete, (3) based on determining that the physical-to-virtual conversion includes the future step, creating a snapshot of the virtual machine before the…

FORMAT-PRESERVING DEDUPLICATION OF DATA

Granted: June 13, 2013
Application Number: 20130151802
Data blocks are copied from a source (e.g., a source virtual disk) to a target (e.g., a target virtual disk). The source virtual disk format is preserved on the target virtual disk. Offsets for extents stored in the target virtual disk are converted to offsets for corresponding extents in the source virtual disk. A map of the extents for the source virtual disk can therefore be used to create, for deduplication, segments of data that are aligned to boundaries of the extents in the target…

ARCHIVE SYSTEMS AND METHODS

Granted: June 13, 2013
Application Number: 20130151801
Archive systems and methods are presented. In one embodiment, an archival information storage configuration method comprises: performing an information accessing process including determining if the information is associated with an archive process; and performing an archive storage boundary determination process including establishing archive storage boundaries based upon characteristics indicating potential sharing of the information and potential impacts on performance of archival…

SYSTEMS AND METHODS FOR RESTORING APPLICATION DATA

Granted: June 13, 2013
Application Number: 20130151477
A computer-implemented method for restoring application data may include (1) receiving a request to restore resource data for a resource to a selected state, (2) identifying a plurality of backup datasets, each backup dataset within the plurality of backup datasets including at least a portion of backed up data for the resource, (3) determining an order in which to restore the plurality of backup datasets in order to restore the resource data to the selected state, and (4) restoring the…

PROVISIONING MULTIPLE DIGITAL CERTIFICATES

Granted: June 6, 2013
Application Number: 20130145155
A method of provisioning a first digital certificate and a second digital certificate based on an existing digital certificate includes receiving information related to the existing digital certificate. The existing digital certificate includes a first name listed in a Subject field and a second name listed in a SubjectAltName extension. The method also includes receiving an indication from a user to split the existing digital certificate and extracting the first name from the Subject…

COMBINING MULTIPLE DIGITAL CERTIFICATES

Granted: May 30, 2013
Application Number: 20130138953
A method for forming a digital certificate includes receiving contact information associated with the digital certificate. The contact information includes at least a name, a mailing address, and an email address. The method also includes receiving billing information associated with the digital certificate and receiving a Certificate Signing Request (CSR) for the digital certificate. The method further includes receiving a first name for use in forming the digital certificate and…

CLUSTER SYSTEMS AND METHODS

Granted: May 16, 2013
Application Number: 20130124451
Information cluster systems and methods are presented. In one embodiment, a cluster method comprises: performing an engine process including issuing requests to bring a resource online, offline, and monitor the resources, wherein the engine process is performed by an engine; performing a resource interaction process including interacting with a resource and directing a resource to comply with the request from the engine process, wherein the resource interaction process is performed by a…