摘要:
Methods, apparatus and articles of manufacture for adding entropy to key generation on a mobile device are provided herein. A method includes generating a prompt via a computing device interface in connection with an authentication request to access a protected resource associated with the computing device; processing input cryptographic information entered via the computing device interface in response to the prompt against a pre-determined set of cryptographic information, wherein said pre-determined set of cryptographic information comprises one or more input elements and one or more interface manipulation measures associated with the one or more input elements; and resolving the authentication request based on said processing.
摘要:
There is disclosed a method and system for use in authenticating an entity. An entity location history is stored comprising a historical record of locations visited by the entity. An authentication request is received from the entity. A pattern of recent locations visited by the entity indicative of irregular behavior is detected. An analysis is performed between the pattern of recent locations indicative of irregular behavior and the entity location history for establishing the riskiness of the authentication request. An authentication result is generated based on the analysis between the pattern of recent locations indicative of irregular behavior and the entity location history.
摘要:
A computer-implemented method for performing garbage collection in a delta compressed data storage system selects a file recipe to traverse to identify live data chunks and a chunk identifier from the file recipe. The chunk identifier is added to a set of live data chunks. Delta references in the file recipe corresponding to the chunk identifier are added to the set of live data chunks. Data chunks in a data storage system not identified by the set of live data chunks are discarded.
摘要:
A technique transfers soft token authentication capabilities from an old device to a new device. The technique involves receiving a transfer initiation message from the old device while the old device is currently provisioned with the soft token authentication capabilities. The transfer initiation message includes new device binding information obtained by the old device from the new device. The technique further involves providing a reply message to the old device in response to the transfer initiation message. The reply message directs the old device to supply an authentication code to the new device, the authentication code being based on the new device binding information. The technique further involves receiving, from the new device, a provisioning message including the authentication code, and provisioning the new device with the soft token authentication capabilities in response to receipt of the provisioning message from the new device.
摘要:
A technique for managing storage tiering in a data storage apparatus operates at a fine level of granularity in response to write requests as blocks are allocated for writing. As write requests arrive or are otherwise processed by the data storage apparatus, the data storage apparatus identifies a quality of service to be provided for satisfying each write request and allocates a set of blocks from storage devices of storage tiers that provide the identified quality of service. The data storage apparatus may then store the information specified in the write request in the newly allocated blocks.
摘要:
Data is non-disruptively migrated from a source LUN to a target LUN in an active-active cluster with coordination of a host-based copy sweep with duplicating of ongoing writes of all hosts, using iteration and changed block tracking (CBT). During a first iteration, one host performs the copy sweep, and the locations of new application writes at other hosts are recorded in respective CBT records. In each subsequent iteration, the data blocks of the CBT-recorded writes are copied to the target LUN while the locations of new writes are recorded in new CBT records. A final iteration is done with I/O suspended to completely synchronize the target LUN with the source LUN, and the migration then proceeds to a committed state in which the target LUN is used in place of the source LUN. The one host may use write cloning or CBT recording like the other hosts.
摘要:
A technique provides access control. The technique involves prompting a user to enter color-shape pairings, and receiving multiple color-shape pairings from the user. Each color-shape pairing includes (i) a color selection from multiple selectable colors and (ii) a shape selection from multiple selectable shapes. The technique further involves generating an access control result based on the received multiple color-shape pairings, the access control result controlling access to a set of protected resources. For example, color segments can be displayed on a touch screen in the form of a color wheel, and multiple shapes can be rendered within each color segment. Alternatively, (i) a color palette including the multiple selectable colors and (ii) a shape menu including the multiple selectable shapes can be rendered on the touch screen to prompt the user to provide drag and drop gestures over the touch screen. Other configurations are suitable for use as well.
摘要:
A method is used in managing storage space in storage systems. Metadata of a slice of a storage pool in a data storage system is evaluated for returning the slice as free storage to the storage pool. Based on the evaluation, returning of the slice to the storage pool is affected. The metadata of the slice indicates whether the slice includes user data.
摘要:
Described are methods, systems, and apparatus for communicating the status of storage pool job status between storage processors. A storage pool command is received by the secondary storage processor. The storage pool command is provided, by the secondary storage processor, to the primary storage processor. A storage pool job based on the storage pool command is created by the primary storage processor. The storage pool job is submitted, by the primary storage processor, to a job execution engine, for execution. A storage pool job submission notification is provided, by the primary storage processor, to the secondary storage processor. A storage pool job execution acknowledgement is provided, by the primary storage processor, to the secondary storage processor. The storage pool job is executed by the primary storage processor. One or more storage pool job status notifications are provided, by the primary storage processor, to the secondary storage processor.
摘要:
Methods and systems of maintaining a computed relationship between components in a network are disclosed. A relationship represents one or more connections between components. Discovered relationships between components in the network are detected. A discovered relationship represents a direct connection between components. A computed relationship between a class of source component and a class of target component is determined. The computed relationship comprises a number of discovered relationships that, when combined, represent connections between one or more types of the source component and one or more types of the target component. The computed relationship is stored. The discovered relationships that comprise the computed relationship are monitored for a change event. The change event may represent a change in the network, such as the addition or deletion of one or more components.