会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Sharding method and apparatus using directed graphs
    • 使用有向图的分片方法和装置
    • US07043621B2
    • 2006-05-09
    • US10439977
    • 2003-05-15
    • Arif MerchantMahesh KallahallaRam Swaminathan
    • Arif MerchantMahesh KallahallaRam Swaminathan
    • G06F12/00
    • G06F3/0608G06F3/061G06F3/0629G06F3/0665G06F3/0683Y10S707/99953Y10S707/99956
    • A method and apparatus is used to divide a storage volume into shards. The division is made using a directed graph having a vertex for each block in the storage volume and directed-edges between pairs of vertices representing a shard of blocks, associating a weight with each directed edge that represents the dissimilarity for the shard of blocks between the corresponding pair of vertices, selecting a maximum number of shards (K) for dividing the storage volume, identifying a minimum aggregate weight associated with a current vertex for a combination of no more than K shards, performing the identification of the minimum aggregate weight for vertices in the directed graph, and picking the smallest aggregated weight associated with the last vertex to determine a sharding that spans the storage volume and provides a minimal dissimilarity among no more than K shards of blocks.
    • 使用方法和装置将存储卷分成碎片。 使用具有存储卷中的每个块的顶点的有向图以及表示块的块的顶点对之间的有向边,将权重与代表块之间的块的不同性的每个有向边相关联 相应的顶点对,选择用于划分存储卷的最大碎片数(K),识别与不超过K个碎片的组合的当前顶点相关联的最小聚集权重,执行顶点的最小聚集权重的标识 在有向图中,并选择与最后一个顶点相关联的最小聚合权重,以确定跨越存储卷的分片,并在不超过K个块的块中提供最小的不相似性。
    • 4. 发明授权
    • Secure file access control via directory encryption
    • 通过目录加密保护文件访问控制
    • US07313694B2
    • 2007-12-25
    • US09972385
    • 2001-10-05
    • Erik RiedelMahesh KallahallaRam Swaminathan
    • Erik RiedelMahesh KallahallaRam Swaminathan
    • H04L9/00
    • G06F21/6218G06F2221/2107
    • A technique for secure file access control via directory encryption. Filenames of data files stored by a network server are encrypted so as to protect them in the event the server is untrustworthy, such as in a distributed computing environment. Two encryption keys are employed so as to provide different access capabilities. For example, clients of the server that are authorized to perform read-only operations on the files may be prevented from modifying the files, while client that are authorized to perform write operations, may modify the files or even delete the files. In a preferred embodiment, encrypted filenames replace plaintext files in a directory structure without otherwise changing the directory structure. Because the directory structure is otherwise unchanged, the server may still have adequate information to perform file management and space management functions.
    • 一种通过目录加密进行安全文件访问控制的技术。 网络服务器存储的数据文件的文件名被加密,以便在服务器不可信的情况下(例如在分布式计算环境中)来保护它们。 采用两个加密密钥来提供不同的访问能力。 例如,被授权对文件执行只读操作的服务器的客户端可能被阻止修改文件,而被授权执行写入操作的客户端可以修改文件甚至删除文件。 在优选实施例中,加密的文件名替换目录结构中的明文文件,而不改变目录结构。 由于目录结构不变,服务器可能仍然具有足够的信息来执行文件管理和空间管理功能。
    • 8. 发明申请
    • Method of providing storage to virtual computer cluster within shared computing environment
    • 在共享计算环境中为虚拟计算机集群提供存储的方法
    • US20060075199A1
    • 2006-04-06
    • US10959851
    • 2004-10-06
    • Mahesh KallahallaMustafa UysalRam Swaminathan
    • Mahesh KallahallaMustafa UysalRam Swaminathan
    • G06F12/00
    • G06F3/0608G06F3/0622G06F3/0637G06F3/0665G06F3/067G06F21/57
    • An embodiment of a method of providing storage to a virtual computer cluster within a shared computing environment begins with a first step of combining storage resources within the shared computing environment into a virtual storage pool. The virtual storage pool comprises at least portions of storage devices in which at least one of the storage devices is not directly accessible by all computers which directly access any of the storage devices. The method continues with a second step of partitioning a virtual storage volume from the virtual storage pool. In a third step, the method assigns the virtual storage volume to the virtual computer cluster. The method concludes with a fourth step of making the virtual storage volume accessible to computing platforms of the virtual computer cluster using software. The software allows access to the virtual storage volume by the computing platforms while precluding access to remaining storage within the shared computing environment by the computing platforms.
    • 向共享计算环境中的虚拟计算机集群提供存储的方法的实施例从将共享计算环境内的存储资源组合成虚拟存储池的第一步骤开始。 虚拟存储池至少包括存储设备的至少一部分,其中至少一个存储设备不能直接访问任何存储设备的所有计算机。 该方法继续第二步,从虚拟存储池分区虚拟存储卷。 在第三步中,该方法将虚拟存储卷分配给虚拟计算机集群。 该方法的第四步是使用软件使虚拟计算机集群的计算平台可以访问虚拟存储卷。 该软件允许计算平台访问虚拟存储卷,同时阻止计算平台访问共享计算环境中的剩余存储。