$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Policy engine to control the servicing of requests received by a storage server 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-007/00
  • G06F-015/173
출원번호 UP-0777418 (2004-02-11)
등록번호 US-7778981 (2010-09-06)
발명자 / 주소
  • Armitano, Robert M.
  • Mihajlovic, Dejan L.
  • Muhlestein, Mark
  • Thompson, Timothy J.
  • Uren, James T.
  • Yoder, Alan G.
출원인 / 주소
  • NetApp, Inc.
대리인 / 주소
    Perkins Coie LLP
인용정보 피인용 횟수 : 9  인용 특허 : 84

초록

Certain tasks are outsourced from a filer to a remote policy engine. The policy engine implements various defined policies to control the filer's servicing of client requests. For example, the policy engine can be used to implement policies to control various storage-related operations relating to d

대표청구항

What is claimed is: 1. A method comprising: receiving at a network storage server, from a network storage client, a client request to perform an operation relating to a data set stored by the network storage server; in response to receiving the client request, determining in the network storage ser

이 특허에 인용된 특허 (84)

  1. Dourish James P. ; Edwards Warren K. ; LaMarca Anthony G. ; Lamping John O. ; Petersen Karin ; Salisbury Michael P. ; Terry Douglas B. ; Thornton James D., Active properties for dynamic document management system configuration.
  2. Corbin John R. (Sunnyvale CA), Apparatus and method for licensing software on a network of computers.
  3. Ralph E. Sipple ; Bruce T. Kunz ; Lee B. Hansen, Apparatus for and method of automatic monitoring of computer performance.
  4. Goodman,Marina; Mesoy,Tor; Taylor,Stanton J.; Reiter,Scott R.; Bowen,Michael T.; Auriemma,Ralph; Alairys,Tamara D.; Degiorgio,Christopher M.; Coleman,Lizbeth Johnson, Architectures for netcentric computing systems.
  5. Korkus, Ohad, Automatic detection of abnormal data access activities.
  6. Ohran Richard, Backup system that takes a snapshot of the locations in a mass storage device that has been identified for updating pri.
  7. Cabrera, Luis Felipe; Pudipeddi, Ravisankar V., Buffering data in a hierarchical data storage environment.
  8. Luis Felipe Cabrera ; Ravisankar V. Pudipeddi, Buffering data in a hierarchical data storage environment.
  9. Major, Robert Drew, Cache object store.
  10. Patel, Amit; Pujare, Sanjay; Ryan, Nicholas; Lin, David, Client installation and execution system for streamed applications.
  11. Midgely Christopher W. (Framingham MA) Holland Charles J. (Northboro MA) Webb John W. (Sutton MA) Gonsalves Manuel (Brookline MA), Continuously-snapshotted protection of computer files.
  12. Orr Francis Martin,GBX, Data processing system diagnostics.
  13. Sang, Jinqlih; Lau, Michael Vengchong, Decision making engine receiving and storing a portion of a data frame in order to perform a frame forwarding decision.
  14. La Joie Leslie T. ; Miller Eugene M. ; Dobbs Carl S. ; Solka Michael B., Diagnostic system for run-time monitoring of computer operations.
  15. Susaki Seiichi,JPX ; Umezawa Katsuyuki,JPX ; Kaji Tadashi,JPX ; Tezuka Satoru,JPX ; Sasaki Ryoichi,JPX ; Tabata Kuniaki,JPX ; Akaosugi Takashi,JPX ; Kito Akira,JPX, Distributed object system and service supply method therein.
  16. Wolff James J. ; Lathrop David, Distributed resource and project management.
  17. Bruck, Jehoshua; Bohossian, Vasken; Fan, Chenggong Charles; LeMahieu, Paul; Love, Philip, Distributed server cluster with graphical user interface.
  18. Chow Kit M. ; Meyer Michael W. ; Muller P. Keith ; Adamson Alan P., Dynamic and consistent naming of fabric attached storage by a file system on a compute node storing information mapping API system I/O calls for data objects with a globally unique identification.
  19. Forecast John ; Duso Wayne W., Dynamic modeling for resource allocation in a file server.
  20. Seiffert Roland ; Wong Stan, Dynamic monitoring architecture.
  21. John R. Douceur ; William J. Bolosky, File server system and method for scheduling data streams according to a distributed scheduling policy.
  22. Xu Yikang ; Vahalia Uresh K. ; Jiang Xiaoye ; Gupta Uday ; Tzelnic Percy, File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems.
  23. Utsunomiya Naoki,JPX ; Nishikado Takashi,JPX ; Sonoda Koji,JPX ; Kumazaki Hiroyuki,JPX, High speed file I/O control method and system with user set file structure to effect parallel access pattern over a network.
  24. Yates,Neville; Miller,Jeffrey; Boussina,Touraj; Harano,Allen, Interfaces for an open systems server providing tape drive emulation.
  25. Underwood, Roy Aaron, Interfacing servers in a Java based e-commerce architecture.
  26. Crawford Christopher M., Internet online backup system provides remote storage for customers using IDs and passwords which were interactively est.
  27. Ranous,Alexander C., Internet usage data recording system and method employing a configurable rule engine for the processing and correlation of network data.
  28. Ranous,Alexander C.; Meyer,Jeffrey D., Internet usage data recording system and method employing distributed data processing and data storage.
  29. Gupta Abhay ; Ferris Chris ; Abdelnur Alejandro, Method and apparatus for authenticating users.
  30. Joseph W. Wells, Method and apparatus for computer virus detection, analysis, and removal in real time.
  31. Sim, Siew Yong, Method and apparatus for large payload distribution in a network.
  32. Garg Atul R. ; Ketcham Dan ; Do Minh Anh, Method and apparatus for monitoring a network environment.
  33. Poisner David I., Method and apparatus for preventing unauthorized usage of a computer system.
  34. Cardoza Wayne M. (Amherst NH) Diewald Jeffrey M. (Billerica MA) Nelson Jeffrey E. (Milford NH) DiPirro Steven D. (Amherst NH) Goddard James R. (Candia NH) Fisher ; Jr. Wendell B. (Nashua NH) McElearn, Method and apparatus for testing software on a computer network.
  35. Grant, Robert; Trevitt, Stephen, Method and circuit for replicating data in a fiber channel network, or the like.
  36. Masden Kenneth E. (Redmond WA) Smirl Jon D. (Kirkland WA) King John W. (Kirkland WA) Rubin Darryl E. (Redmond WA), Method and system for open file caching in a networked computer system.
  37. Ohran Richard S. (Provo UT) Ohran Michael R. (Orem UT), Method and system for providing a static snapshot of data stored on a mass storage system.
  38. Sampath Srivats ; Balasubramaniam Chandrasekar ; Lingarkar Ravi ; Katchapalayam Babu ; Kannan Ravi, Method and system for securing, managing or optimizing a personal computer.
  39. Hitz David ; Malcolm Michael ; Lau James ; Rakitzis Byron, Method for allocating files in a file system integrated with a raid disk sub-system.
  40. Bauer Eric Jonathan ; Schaffer Russel W., Method for controlling resource usage by network identities.
  41. Theimer Marvin M. (Mountain View CA) Nichols David A. (Mountain View CA) Terry Douglas B. (San Carlos CA), Method for delegating access rights through executable access control program without delegating access rights not in a.
  42. Hitz David ; Malcolm Michael ; Lau James ; Rakitzis Byron, Method for maintaining consistent states of a file system and for creating user-accessible read-only copies of a file s.
  43. Hsieh Vincent, Method for security shield implementation in computer system's software.
  44. Schmidt Karl-Heinz (Aying DEX) Menache Georg (Mnchen DEX) Waidelich Wilhelm (Mnchen DEX), Method of protecting programs and data in a computer against unauthorized access and modification by monitoring address.
  45. Mott Jack E. (Idaho Falls ID), Method of system state analysis.
  46. McCown Patricia M. (Cresskill NJ) Conway Timothy J. (Highland Park NJ) Jessen Karl M. (Bayonne NJ), Methods and apparatus for monitoring system performance.
  47. Van Huben Gary A. ; Mueller Joseph L., Methods for shared data management in a pervasive computing environment.
  48. Cox, David E.; Kaminsky, David L.; Lindquist, David B., Methods, systems and computer program products for license use management on a network.
  49. Parker, Thomas Anthony, Migration from in-clear to encrypted working over a communications link.
  50. Nessett Danny M. ; Sherer William Paul, Multilayer firewall system.
  51. Tower Lee W. (Rancho Palos Verdes CA) Wagner Jeffrey A. (Rancho Palos Verdes CA) Benedict Douglas M. (Santa Monica CA), Multiple cluster signal processor architecture.
  52. Pitts William M., NDC consistency reconnect mechanism.
  53. Luk, Shun Hang; Bruce, Rey H.; Bruce, Ricardo H.; Bultman, Dave L., Network storage device having solid-state non-volatile memory.
  54. Baudelot Eric,DEX ; Bruckmann Manfred,DEX ; Mitlehner Heinz,DEX ; Weis Benno,DEX, Nonlinear current limiting precharging circuit for a capacitor connected to an output of a line-commutated power converter.
  55. Knudsen Helge (Oakville CAX), Operating system and data base using table access method with dynamic binding.
  56. Farber David A. ; Greer Richard E. ; Swart Andrew D. ; Balter James A., Optimized network resource location.
  57. Devireddy, Narayan; Chen, Xu, Policy based storage configuration.
  58. Narad, Charles E.; Fall, Kevin; MacAvoy, Neil; Shankar, Pradip; Rand, Leonard M.; Hall, Jerry J., Programmable system for processing a partitioned network infrastructure.
  59. Mikurak, Michael G., Providing collaborative installation management in a network-based supply chain environment.
  60. Raccah,David; Feinberg,George; Manczak,Olaf W.; Nowicki,Kacper; Qureshi,Waheed; Ramos,Luis, Scalable storage system.
  61. Smithson, Robert Hugh; Wolff, Daniel Joseph, Scanning computer files for unwanted properties.
  62. Soltis, Steven R., Shared file system.
  63. Shanumgam,Udayakumar; Iyer,Mahadevan; Jain,Saurabh; Kale,Rahul P., Statistics aggregation for policy-based network.
  64. Togawa Yoshifusa,JPX ; Miyamoto Takayuki,JPX ; Nozawa Kuriko,JPX, Storage device having function for coping with computer virus.
  65. Nowicki,Kacper; Manczak,Olaf W.; Ramos,Luis; Qureshi,Waheed, Storage system having partitioned migratable metadata.
  66. Grosner,George; Wood,Douglas, Switching system method for discovering and accessing SCSI devices in response to query.
  67. Wookey Michael J. ; Chu Kevin L., System and method for evaluating monitored computer systems.
  68. Chess, David Michael; Kephart, Jeffrey Owen; Morar, John Frederick; Pring, Edward John; White, Steve Richard, System and method for managing files in a distributed system using prioritization.
  69. Garrison Greg B., System and method for securely accessing a database from a remote location.
  70. Dawson Colin Scott ; Fruchtman Barry ; Husfelt Harry Clayton ; Kaczmarski Michael Allen ; Warren ; Jr. Don Paul, System and method for server-to-server data storage in a network environment.
  71. Poublan ; Alain ; Bachman ; Charles ; Bouvard ; Jacques, System for protecting shared files in a multiprogrammed computer.
  72. Tso Michael Man-Hak ; Bakshi Bikram Singh, System for virus-checking network data during download to a client device.
  73. John Jeffrey Haswell ; Robert J. Young ; Kevin Schramm, System, method and article of manufacture for a table-driven automated scripting architecture.
  74. Bowman-Amuah Michel K., System, method and article of manufacture for configuration management in a development architecture framework.
  75. Edwards, Jonathan L.; White, Edmund H., System, method and computer program product for selecting virus detection actions based on a process by which files are being accessed.
  76. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server.
  77. Pothier,Peter; Winiewicz,Anne K; Black,Darryl, Throttling distributed statistical data retrieval in a network device.
  78. DeKoning, Rodney A.; Weber, Bret S., Uniform routing of storage access requests through redundant array controllers.
  79. Tzelnic Percy ; Vahalia Uresh K ; Ting Dennis P. J. ; Vaitzblit Lev ; Duso Wayne W ; Alagappan Kannan M ; Forecast John, Video file server using an integrated cached disk array and stream server computers.
  80. Bates, Cary Lee; Crenshaw, Robert James; Day, Paul Reuben; Santosuosso, John Matthew, Virus checking and reporting for computer database search results.
  81. Ji Shuang (Foster City CA) Chen Eva (Cupertino CA), Virus detection and removal apparatus for computer networks.
  82. Bates, Cary Lee; Day, Paul Reuben; Santosuosso, John Matthew, Web server apparatus and method for virus checking.
  83. Bainbridge Andrew John,GBX ; Cocks Stephen James,GBX ; Ferguson Donald Francis ; Freund Thomas,GBX ; Leff Avraham ; Normington Glyn,GBX ; Rayfield James Thomas ; Storey Robert Anthony,GBX, Workload management in a client-server network with distributed objects.
  84. Hitz David ; Malcolm Michael ; Lau James ; Rakitzis Byron, Write anywhere file-system layout.

이 특허를 인용한 특허 (9)

  1. Garcia-Alvarado, Carlos; Raghavan, Venkatesh; Narayanan, Sivaramakrishnan; Waas, Florian, Data movement driven automatic data placement.
  2. Gong, Hao, Method and apparatus for processing operation request in storage system.
  3. Gong, Hao, Method and apparatus for processing operation request in storage system.
  4. Harrison, Reuven; Persky, Yakov, Method of configuring a security gateway and system thereof.
  5. Slik, David, Modular service level objective (SLO) subsystem for a network storage system.
  6. Slik, David, Modular service level objective (SLO) subsystem for a network storage system.
  7. Tabbara, Bassam; Garg, Praerit, Shared community storage network.
  8. Sharma, Chhaya; Khurana, Varun, Techniques for web server management.
  9. Sharma, Chhaya; Khurana, Varun, Techniques for web server management.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로