APPLICATION PROTECTION THROUGH A COMBINED FUNCTIONALITY FAILURE MANAGER
Granted: May 9, 2013
Application Number:
20130117231
A method for providing application functionality protection. The method includes accessing a distributed computer system having a cluster including a plurality of nodes, and receiving an indication of an application failure. The method further includes attempting to restore the application through a number of application restart attempts, and receiving an indication that the restart attempts have not restored the application. An image history is then accessed to obtain a last known good…
DIGITAL WHITEBOARD IMPLEMENTATION
Granted: May 2, 2013
Application Number:
20130111380
A computing system includes a touch screen display that can display a graphical user interface (GUI). The GUI includes a display region and a first plurality of GUI elements including a first GUI element associated with a tool. The tool is invoked when selection of the first GUI element is sensed by the touch screen display. The GUI also includes a second plurality of GUI elements including a second GUI element associated with a graphical object. The graphical object is displayed in the…
MANAGING BACKUPS OF DATA OBJECTS IN CONTAINERS
Granted: May 2, 2013
Application Number:
20130110784
Containers that store data objects that were written to those containers during a particular backup are accessed. Then, a subset of the containers is identified; the containers in the subset have less than a threshold number of data objects associated with the particular backup. Data objects that are in containers in that subset and that are associated with the backup are copied to one or more other containers. Those other containers are subsequently used to restore data objects…
SHORT-RANGE MOBILE HONEYPOT FOR SAMPLING AND TRACKING THREATS
Granted: April 11, 2013
Application Number:
20130091570
Files received by a mobile device are sampled for malware tracking. The method includes configuring file transfer mechanisms that use short-range communication technology on the mobile device to appear, to other devices, to be open for accepting all attempts to transfer files. The method further comprises intercepting files transferred via the short-range communication technology to the mobile device from another device. The method also comprises quarantining the files transferred to the…
METHOD AND SYSTEM FOR AUTOMATIC APPLICATION RECOMMENDATION
Granted: April 4, 2013
Application Number:
20130085886
A system and method of automatic suggested application identification includes accessing a profile of a device, wherein the profile represents information specific to the device. From said profile, a determined pattern of use determined by the device is accessed, wherein the determined pattern is unique to the device. The profile including the determined pattern and a geo-specific data of the device and configuration information of the device and applications resident on the device is…
CLOUD INFORMATION MIGRATION SYSTEMS AND METHODS
Granted: April 4, 2013
Application Number:
20130085989
Information migration systems and methods are presented. In one embodiment, a cloud information migration method comprises: performing a migration interpretation process, including interpreting migration initiation information; performing a migration information retrieval process to automatically retrieve information in a first configuration from a first cloud vendor in accordance with the migration initiation information; performing a migration information configuration process,…
SYSTEM AND METHOD FOR FILESYSTEM DEDUPLICATION USING VARIABLE LENGTH SHARING
Granted: April 4, 2013
Application Number:
20130086007
Embodiments of the present invention are directed to a method and system for filesystem deduplication that uses both small fingerprint granularity and variable length sharing techniques. The method includes accessing, within an electronic system, a plurality of files in a primary storage filesystem and determining a plurality of fingerprints for the plurality of files. Each respective fingerprint may correspond to a respective portion of a respective file of the plurality of files. The…
FAST I/O FAILURE DETECTION AND CLUSTER WIDE FAILOVER
Granted: April 4, 2013
Application Number:
20130086413
A method for fast I/O path failure detection and cluster wide failover. The method includes accessing a distributed computer system having a cluster including a plurality of nodes, and experiencing an I/O path failure for a storage device. An I/O failure message is generated in response to the I/O path failure. A cluster wide I/O failure message broadcast to the plurality of nodes that designates a faulted controller. Upon receiving I/O failure responses from the plurality nodes, an I/O…
Hygiene-Based Computer Security
Granted: April 4, 2013
Application Number:
20130086690
A reputation server is coupled to multiple clients via a network. Each client has a security module that detect malware at the client. The security module computes a hygiene score based on detected malware and provides it to the reputation server. The security module monitors client encounters with entities such as files, programs, and websites. When a client encounters an entity, the security module obtains a reputation score for the entity from the reputation server. The security…
CONVERSION OF PHYSICAL COMPUTERS TO VIRTUALIZED ENVIRONMENTS METHOD AND SYSTEM
Granted: March 28, 2013
Application Number:
20130080387
A method for converting a physical file system to a virtual file system of a virtual machine. The method includes initiating a new incremental physical to virtual conversion process, and analyzing a history of a plurality of prior incremental conversions to determine whether there exists at least one prior incremental conversion that failed. Upon determination that a prior failed incremental conversion occurred, the method further includes determining a correct chronological order of the…
DATABASE RESTORE USING INCREMENTAL BACKUPS IN REVERSE ORDER
Granted: March 28, 2013
Application Number:
20130080397
A full backup of a database is created at a first point in time. To restore the database to its state at a second point in time (after the full backup was created), a set of incremental backups, including the incremental backup that corresponds to the second point in time and incremental backups created between the first and second points in time, is used in reverse chronological order. For example, blocks in the full backup can be selectively overwritten with corresponding blocks from…
METHOD AND SYSTEM FOR TACTILE SIGNALED AUTHENTICATION
Granted: March 21, 2013
Application Number:
20130069772
A system and method of transmitting an authentication code includes automatically calculating a security code on a device executing a security program. The security program may periodically calculate a respective unique security code. In response to a user requesting the security code, the device automatically vibrates according to a pattern representing the security code. The pattern tactilely communicates the security code to the user.
DATA STORAGE DEDEUPLICATION SYSTEMS AND METHODS
Granted: March 21, 2013
Application Number:
20130073527
Storage systems and methods are presented. In one embodiment, a variable length segment storage method comprises: receiving a data stream; performing a tailored segment process on the data stream, wherein at least one of a plurality of tailored segments include corresponding data of at least one of a plurality of variable length segments and alignment padding to align with boundaries of a fixed length de-duplication scheme; performing a de-duplication process on the plurality of tailored…
STORAGE MANAGEMENT SYSTEMS AND METHODS
Granted: March 21, 2013
Application Number:
20130073914
Storage management systems and methods are presented. In one embodiment, a method comprises: performing a hierarchical configuration information process, including accessing information regarding hierarchical relationships of components associated with a storage environment; performing a storage resource consumption detection process, including detecting consumption of storage resources included in the storage environment; and performing a coordinated consumption analysis process in…
Using Aggregated DNS Information Originating from Multiple Sources to Detect Anomalous DNS Name Resolutions
Granted: March 7, 2013
Application Number:
20130061321
A DNS security system collects and uses aggregated DNS information originating from a plurality of client computers to detect anomalous DNS name resolutions. A server DNS security component receives multiple transmissions of DNS information from a plurality of client computers, each transmission of DNS information concerning a specific instance of a resolution of a specific DNS name. The server component aggregates the DNS information from the multiple client computers. The server…
METHOD AND SYSTEM FOR AUTOMATIC AUTHENTICATION
Granted: February 14, 2013
Application Number:
20130042310
A system and method for automatic authentication includes automatically calculating a security code on a computer running a security program. The security program resides on the same computer as a web browser. In response to a user signing into a web based account on a web site accessed by the web browser, automatically verifying that the security program is registered with the web based account. In response to a second factor security code entry request on the web based account,…
SYSTEMS AND METHODS FOR FAULT RECOVERY IN MULTI-TIER APPLICATIONS
Granted: February 14, 2013
Application Number:
20130042139
A computer-implemented method for fault recovery in multi-tier applications may include: 1) identifying a plurality of clusters, 2) identifying a multi-tier application that includes a plurality of components, each cluster within the plurality of clusters hosting a component, 3) identifying a fault of a first component within the plurality of components on a first cluster within the plurality of clusters, the fault requiring a first recovery action, 4) identifying at least one dependency…
LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) PROXY
Granted: January 24, 2013
Application Number:
20130024925
Two factor LDAP authentication systems and methods are presented. In one embodiment, implementation of a method for authenticating a user through a two factor process includes: at an LDAP proxy server, receiving a BIND request from a client, wherein the BIND request is for authenticating a user associated with a username to an LDAP server, and wherein the BIND request comprises a password comprising a first factor security code and a second factor security code; stripping the second…
METHOD AND SYSTEM FOR IMPLEMENTING HIGH AVAILABILITY STORAGE ON THINLY PROVISIONED ARRAYS
Granted: January 24, 2013
Application Number:
20130024486
A method for storage allocation and reclamation in a storage device. The method includes executing a distributed computer system having a plurality of file systems accessing storage on a shared storage device, creating a physical storage allocation state map that indicates whether a plurality of data blocks comprising a range of data is allocated or unallocated, and consulting a free extent state map to identify free data blocks of the shared storage device. An allocation operation is…
METHOD AND SYSTEM FOR A FAST FULL STYLE SYSTEM CHECK USING MULTITHREADED READ AHEAD
Granted: January 24, 2013
Application Number:
20130024428
A method for file system checking in a storage device. The method includes executing a computer system having a plurality microprocessor cores, initiating a file system check operation by using a file system check agent that execute on the computer system and accesses a storage device, and validating a plurality of meta-data structures of the file system. The method further includes dividing and allocating the metadata structures among a plurality of worker threads. For each worker…