摘要:
The preferred embodiment of the invention distributes, and effectively caches, information by inserting it into file handles that the proxy sends to clients. This information can be used to improve performance by eliminating the need for the proxy to generate additional requests to the server to establish file identity. The distributed information can also be intended to improve security, for example, by allowing the proxy to encode into the file handle a session key that expires after some amount of time.
摘要:
A system and method comprises receiving a write request from a client to store data at first and second non-sequential locations of a storage medium. The data of the write request is recognized as not being a predefined data pattern, and a first encryption method is applied to the data of the write request before it is stored at the first and second non-sequential locations of the storage medium. Further, a second different encryption method is applied to content of an area between the first and second non-sequential locations, where the content of the area is recognized as being the predefined pattern.
摘要:
The present invention displays a graphical representation of a multi-layer network having a front end layer and a back end layer. A plurality of front end units of the front end layer and a plurality of back end units of the back end layer are represented as a plurality of front end graphical objects and a plurality of back end graphical objects. A user selects a front end graphical object representing a selected front end unit and a back end graphical object representing a selected back end unit to form a logical connection between the front end unit and the back end unit. The logical connection grants the selected front end unit access to the selected back end unit.
摘要:
A transmitter pen location system is provided, in which a pen is adapted to send a repeated output signal to external receivers at two or more receiver locations, wherein the location of the pointing tip of the pen is determined in relation to the writing surface of a whiteboard. In one embodiment an output element, preferably an ultrasonic transducer, transmits a time dependent output signal from a single signal transmitter pen to two or more external receivers at two or more receiver locations. The direction of arrival of the output signal to each of the receiver locations is determined, and the pointing tip of the single transmitter pen is then determined, as the intersection of direction vectors from the pen to the external receivers. In another embodiment, the transducer transmits a time dependent output signal from the transmitter pen to three or more external receivers, wherein the received signal is processed to determine the time of arrival to each of the receivers, and the location of the pointing tip of the pen is determined as the calculated distance between the receivers. In another alternate embodiment having a dual signal transmitter pen, a third receiver located at a receiver location is used to determine the time of arrival of a secondary output signal, to determine the distance between the dual signal transmitter pen and the receiver location, while two or more receivers at the receiver location are used to determine the direction of arrival of the primary time dependent output signal. Alternative embodiments allow the transmission of supplementary information from the transmitter pen to the receivers, using waveshaping of the output signal.
摘要:
Embodiments of methods and/or systems to authorize access to stored data are disclosed herein. When a data access request is detected by an agent executing on a first device, the agent determines whether the data access request is authorized based on at least one rule associated with a security policy on the first device. If the agent determines that the data access request is authorized, then the data access request is transmitted to a second device. Subsequently, an application executing on the second device, then determines whether the presence of an agent on the first device is required to forward the data access request to a data storage system. This determination is based on statistical information associated with data access of the data storage system. If it is determined that the presence of the agent is required, the second device then determines whether the agent is present and forwards the data to the agent if the agent is present.
摘要:
A method, system and article for encrypting data by applying an encryption process, wherein the encryption process includes storing progress data relating to the progress of the encryption process so that the encryption process may be resumed after an interruption. Even more specifically, after the interruption, progress data relating to the progress of the encryption process is accessed. Portions of the progress data are compared to determine the last encrypted data segment. After the last encrypted data segment, the encryption process at the data segment is resumed.
摘要:
An apparatus and method for connecting a plurality of computing devices, e.g. web servers, database servers, etc., to a plurality of storage devices, such as disks, disk arrays, tapes, etc., by using a stream-oriented (circuit oriented) switch that has high throughput, but that requires non-negligible time for reconfiguration is disclosed. An example of such stream-oriented switch is an optical switch. The preferred embodiment comprises a plurality of communication ports for connection to servers, and a plurality of ports for connection to storage devices. The system decodes the requests from the computing devices and uses this information to create circuits, e.g. optical paths in embodiments where the stream-oriented switch is an optical switch, through the stream-oriented switch. The system uses these circuits to route traffic between the computing devices and the storage devices. Buffering of data and control in the device memory is used to improve overall throughput and reduce the time spent on reconfigurations. An alternative embodiment of the system uses two interconnects, in which all devices are connected to one or both interconnects. One of the interconnects is the stream-oriented switch described above. The second interconnect is a conventional packet switch which can switch traffic on a packet-by-packet basis, e.g. electronic packet switch. In contrast to the stream-oriented switch, the packet switch has much smaller overall throughput, but requires much less time for reconfiguration. The stream-oriented switch is used for switching relatively large data streams, e.g. reading a large file, while the packet switch is used for control and the rest of the data traffic.