摘要:
Scanning a storage device for viruses includes determining physical portions of the storage device that have been modified since a previous virus scan and scanning at least parts of the physical portions for viruses. The physical portions may correspond to tracks of the storage device, sectors of the storage device, and/or to subportions of the storage device. Determining the physical portions of the storage device that have been modified may include creating a table that is indexed according to each of the portions and has entries indicating whether a corresponding one of the portions has been modified, the entries being cleared after a virus scan to indicate that no portions have been modified and setting a specific one of the entries in response to a corresponding one of the portions of the storage device being subject to a write operation. Creating the table may include copying an other table provided by the storage device and/or using an other table provided by the storage device.
摘要:
This invention is a system and for managing data in a secure manner in a data storage environment that is in communication with a network including an internet-based network. The system includes computer-executable logic or software for securely managing internet client's access to data volumes stored on a data storage system, and may also include logic operating with a file server for providing dynamic access of data available to such client's in a secure fashion.
摘要:
A registration application that allows a service provider customer that is using data storage resources (storage and/or storage-related services) provided by the service provider to register with a Service Provider Management System (SPMS) that is maintained by the service provider. The registration application executes on each of the customer's servers (that is, those which are connected to resources being used) to produce registration information and provides that registration information to the SPMS. The resources have a scratch pad storage area that is used by the servers and the SPMS to communicate with each other. The registration information is passed to the SPMS by the servers indirectly via the scratch pad area. The SPMS uses the registration information to associate customer information with the resources used by that customer's servers. The association of the customer information and resources can then be used by the SPMS to track customer usage of the resources for billing and other applications.
摘要:
Methods and apparatus for migrating a logical object. In one embodiment, a migration is performed by automatically determining the source location(s) of the logical object, moving the data stored therein to a target location while maintaining the availability of the data at the source location to an application program, and automatically servicing access requests from the application program at the target location after moving the data. In another embodiment, a migration is performed by automatically provisioning target location(s) to store a logical object, moving the data in the logical object to the target location(s) while maintaining its availability to an application program, and automatically servicing access requests from the application program at the target location after moving the data. In a further embodiment, a migration is performed by moving the data within a logical object from a source logical volume to a target logical volume, automatically servicing access requests from an application program at the target logical volume after moving the data, and retiring the source logical volume.
摘要:
A method and apparatus for a networked computer system including a plurality of devices and a shared resource. In response to one of the devices attempting to access the shared resource and representing itself to the shared resource as a first device, determining whether the device is attempting to access the shared resource through a physical connection through the network that is different than a physical connection used by the first device to access the shared resource, and when it is, denying the attempted access.
摘要:
An object is authenticated by transmitting a random number to the object. The object has an integrated circuit chip including a memory and encryption circuitry. The memory stores information defining an encryption scheme preassigned to the object. The encryption circuitry reads the memory, and encrypts the random number according to the encryption scheme defined by the information read from the memory to produce encrypted data. The memory cannot be read from any output of the integrated chip, and the chip is constructed so that it is virtually impossible to recover the information contained in the memory by visual inspection, probing, or disassembly of the chip. The object is authenticated by checking whether the encrypted data is a correct result of encrypting the data using the encryption scheme pressigned to the object.
摘要:
Method and apparatus for managing access to one of a plurality of raw storage devices in a computer system including a host computer and a storage system. The computer system includes a plurality of logical volumes of data that are visible to the host computer and the storage system and are perceived by the host computer as comprising a plurality of raw storage devices. The host computer includes a file system/LVM mapping layer. In accordance with one aspect of the invention, a request, from a requester having less than system administrator access privileges, to perform an action directly on the one of the plurality of raw storage devices is granted, so that a logical channel is provided to directly access the one of the plurality of raw storage devices without the logical channel being mapped by the file system/LVM mapping layer. Another aspect is directed to a computer system including a host computer comprising an application layer including at least one application program. A plurality of volumes of storage are visible to the application layer, and access privileges less than the root access privileges are assigned to the at least one application program to access the plurality of volumes of storage.
摘要:
One embodiment is directed to a method and apparatus for modifying a configuration of a computer system including a host computer and at least one computer system resource accessible to at least one application program executing on the host computer. The computer system is dynamically reconfigured, without reinitializing the host computer or the application program, to alter a manner in which the at least one application program accesses the at least one computer system resource. Another embodiment is directed to a method and apparatus for responding to changes in a configuration of the computer system impacting a manner in which the at least one computer system resource is accessed by the host computer. Information relating to a first configuration of the computer system at a first point in time is stored, the first configuration relating to a first manner of accessing the at least one computer system resource by the host computer. A second configuration of the computer system at a second point in time is determined, the second configuration relating to a second manner of accessing the at least one computer system resource by the host computer. The second configuration of the computer system is compared with the first configuration to determine whether the second configuration differs from the first configuration. When it is determined that the second configuration differs from the first configuration, the second manner of accessing the at least one computer system resource by the host computer is determined.
摘要:
Method and apparatus directed to a computer system including a host computer and an intelligent storage system that stores data accessed by the host computer, the computer system including a plurality of logical volumes of data that are visible to the host computer and the storage system and that are perceived by the host computer as comprising a plurality of raw storage devices, the storage system including a plurality of physical storage devices and at least one mapping layer that maps the plurality of logical volumes to the plurality of physical storage devices so that the data in each of the plurality of logical volumes is stored on at least one of the plurality of physical storage devices. One aspect of the invention is directed to providing the host computer with information identifying, for at least one of the plurality of logical volumes, which ones of the plurality of physical storage devices store data included in the at least one of the plurality of logical volumes. The host computer can use this information in configuring data blocks among the plurality of logical volumes.
摘要:
A data network links a number of host processors to alternative shared resources. In order to allocate a respective subset of the alternative shared resources to each host, a directory service of the network is programmed to present a respective view of the network to each host. For example, hosts on the same network loop may see a different picture of the network. When a host logs into the network, the directory service reports to the host information about the alternative shared resources that the host should use. The host then commences a sequence of data processing operations during which the host accesses only the shared resources that were reported to it by the directory service. The shared resources, for example, are ports of a storage subsystem, and a respective subset of the ports is assigned to each host to balance loading of the hosts on the ports.