Movatterモバイル変換


[0]ホーム

URL:


US20030229689A1 - Method and system for managing stored data on a computer network - Google Patents

Method and system for managing stored data on a computer network
Download PDF

Info

Publication number
US20030229689A1
US20030229689A1US10/164,950US16495002AUS2003229689A1US 20030229689 A1US20030229689 A1US 20030229689A1US 16495002 AUS16495002 AUS 16495002AUS 2003229689 A1US2003229689 A1US 2003229689A1
Authority
US
United States
Prior art keywords
logical volume
computer
storage device
name
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/164,950
Inventor
Kartik Raghavan
Thomas Phillips
Bohdan Raciborski
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft CorpfiledCriticalMicrosoft Corp
Priority to US10/164,950priorityCriticalpatent/US20030229689A1/en
Assigned to MICROSOFT CORPORATIONreassignmentMICROSOFT CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: RACIBORSKI, BOHDAN, RAGHAVAN, KARTIK N., PHILLIPS, THOMAS G.
Publication of US20030229689A1publicationCriticalpatent/US20030229689A1/en
Priority to US11/236,256prioritypatent/US7676564B2/en
Priority to US11/236,233prioritypatent/US20060026263A1/en
Priority to US12/652,207prioritypatent/US8224947B2/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLCreassignmentMICROSOFT TECHNOLOGY LICENSING, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MICROSOFT CORPORATION
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method and system for managing stored data on a computer network organizes data into logical volumes, and each logical volume has a friendly name associated with it. A domain controller keeps track of the friendly names of the logical volumes and associates those friendly names with the actual physical paths of the logical volumes. When a client computer on the network wishes to access a logical volume, it sends a look-up request having the friendly name to the domain controller. The domain controller may fulfill the request by sending the path of the logical volume to the client computer.

Description

Claims (25)

What is claimed is:
1. A method for managing stored data on a computer network, the computer network comprising at least a first and a second node, the first node comprising a server, the second node comprising a storage device, the method comprising:
at the server, receiving, from the storage device and over the network, a registration message that identifies a logical volume of computer-readable media managed by the storage device, wherein the registration message comprises a path by which a user of the computer network can access the logical volume;
creating an association between the path of the logical volume and a name; and
storing the association in a data structure on a computer-readable medium accessible by the server.
2. A computer-readable medium having stored thereon computer executable instructions for performing the method ofclaim 1.
3. The method ofclaim 1, wherein the logical volume represents a single disk of the storage device.
4. The method ofclaim 1, wherein the logical volume represents a logical disk that is striped across multiple physical disks.
5. The method ofclaim 1, wherein the storage device is one of a plurality of storage devices, and the logical volume represents data that is striped across the plurality of storage devices.
6. The method ofclaim 1, wherein the registration message further comprises a world-wide name, the method further comprising creating an association between the world-wide name and the name.
7. The method ofclaim 1, wherein the registration message further comprises a logical unit number, and wherein the creating step comprises creating an association between the logical unit number and the name.
8. The method ofclaim 1, further comprising creating an access control list for the logical volume, the access control list specifying which computers are permitted to access the logical volume.
9. The method ofclaim 1, further comprising:
discovering the existence of the storage device; and
discovering the existence of the logical volume.
10. The method ofclaim 1, further comprising:
controlling access by host computers on the network to the storage device.
11. A method for managing stored data on a computer network, the computer network comprising at least a first, a second, and a third node, the first node comprising a server, the second node comprising a storage device, and the third node comprising a client computer, the method comprising:
the server computer receiving, from the client computer, a request for the path of a logical volume stored on the computer network, the request including a name of the logical volume;
the server computer referencing a data structure comprising an association between the name of the logical volume and a path of the logical volume; and
the server computer providing the path to the client computer, thereby permitting the client computer to access the logical volume via the computer network.
12. A computer-readable medium having stored thereon computer-executable instructions for performing the method ofclaim 11.
13. The method ofclaim 11, further comprising:
the server computer determining whether the client computer is permitted to have access to the logical volume; and
the server computer performing the providing step based on the determining step.
14. The method ofclaim 13, wherein the determining step comprises referencing an access control list.
15. The method ofclaim 13, wherein the determining step comprises verifying a certificate received from the client computer.
16. The method ofclaim 13, wherein the determining step comprises referencing permission information in the data structure.
17. The method ofclaim 11, wherein the referencing step comprises:
locating the name of the logical volume in the data structure;
determining the identity of a storage device on the network that is responsible for and maintaining the logical volume; and
determining which logical unit number of the storage device corresponds to the logical volume,
wherein the providing step comprises transmitting, to the client computer, the identity of the storage device and the logical unit number.
18. The method ofclaim 11, wherein the referencing step comprises:
locating the world-wide name of the logical volume in the data structure; and
determining the identity of a storage device on the network that is responsible for maintaining the logical volume,
wherein the providing step comprises transmitting, to the client computer, the identity of the storage device and the world-wide name of the logical volume.
19. A name service for a storage network, the name service comprising:
a storage device linked to the storage network for storing computer-readable data;
a domain controller linked to the network for maintaining an association between the path of a logical volume of data stored on the storage device and a friendly name; and
a client computer linked to the domain controller.
20. The name service ofclaim 19, wherein the domain controller executes software for performing the steps of:
receiving a request from the client computer for the path of the logical volume, the request including the friendly name;
using the association between the friendly name and the path to determine the path of the logical volume; and
transmitting data regarding the path to the client computer.
21. The name service ofclaim 19, wherein the domain controller executes software for performing steps comprising:
receiving a request from the client computer for the path of the logical volume;
determining whether or not the client computer is permitted to have access to the logical volume; and
granting or denying the request based on the determining step.
22. The name service ofclaim 19, wherein the domain controller executes software for performing steps comprising:
reviewing a request from the storage device to register the logical volume;
determining whether or not the storage device is permitted to participate in the storage network; and
granting or denying the request based on the determining step.
23. The name service ofclaim 19, wherein the logical volume corresponds to a single removable computer-readable medium.
24. The name service ofclaim 19, wherein the logical volume corresponds to a single disk of the storage device.
25. The name service ofclaim 19, wherein the logical volume corresponds to a block of data that is striped across multiple disks of the storage device.
US10/164,9502002-06-062002-06-06Method and system for managing stored data on a computer networkAbandonedUS20030229689A1 (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
US10/164,950US20030229689A1 (en)2002-06-062002-06-06Method and system for managing stored data on a computer network
US11/236,256US7676564B2 (en)2002-06-062005-09-27Managing stored data on a computer network
US11/236,233US20060026263A1 (en)2002-06-062005-09-27Managing stored data on a computer network
US12/652,207US8224947B2 (en)2002-06-062010-01-05Managing stored data on a computer network

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US10/164,950US20030229689A1 (en)2002-06-062002-06-06Method and system for managing stored data on a computer network

Related Child Applications (2)

Application NumberTitlePriority DateFiling Date
US11/236,256DivisionUS7676564B2 (en)2002-06-062005-09-27Managing stored data on a computer network
US11/236,233DivisionUS20060026263A1 (en)2002-06-062005-09-27Managing stored data on a computer network

Publications (1)

Publication NumberPublication Date
US20030229689A1true US20030229689A1 (en)2003-12-11

Family

ID=29710318

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US10/164,950AbandonedUS20030229689A1 (en)2002-06-062002-06-06Method and system for managing stored data on a computer network
US11/236,233AbandonedUS20060026263A1 (en)2002-06-062005-09-27Managing stored data on a computer network
US11/236,256Expired - Fee RelatedUS7676564B2 (en)2002-06-062005-09-27Managing stored data on a computer network
US12/652,207Expired - Fee RelatedUS8224947B2 (en)2002-06-062010-01-05Managing stored data on a computer network

Family Applications After (3)

Application NumberTitlePriority DateFiling Date
US11/236,233AbandonedUS20060026263A1 (en)2002-06-062005-09-27Managing stored data on a computer network
US11/236,256Expired - Fee RelatedUS7676564B2 (en)2002-06-062005-09-27Managing stored data on a computer network
US12/652,207Expired - Fee RelatedUS8224947B2 (en)2002-06-062010-01-05Managing stored data on a computer network

Country Status (1)

CountryLink
US (4)US20030229689A1 (en)

Cited By (34)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040083284A1 (en)*2002-10-252004-04-29Yuval OfekSystem and method for providing data awareness across multiple domains
US20040117546A1 (en)*2002-12-112004-06-17Makio MizunoiSCSI storage management method and management system
US20040210791A1 (en)*2003-04-212004-10-21Etsutaro AkagawaMedium for recording network management program, management computer and managing method
US6839746B1 (en)*2003-06-032005-01-04Veritas Operating CorporationStorage area network (SAN) device logical relationships manager
US20050138466A1 (en)*2003-12-192005-06-23Spry Andrew J.Method and apparatus for supporting legacy mode fail-over driver with ISCSI network entity including multiple redundant controllers
US20050138418A1 (en)*2003-12-192005-06-23Spry Andrew J.Methods for defining and naming iSCSI targets using volume access and security policy
US20050149748A1 (en)*2003-12-192005-07-07Spry Andrew J.Method and apparatus for identifying IPsec security policy in iSCSI
US20050198224A1 (en)*2004-03-022005-09-08Emiko KobayashiStorage network system and control method thereof
US20050234941A1 (en)*2004-04-202005-10-20Naoki WatanabeManaging method for storage subsystem
EP1598737A2 (en)2004-05-202005-11-23Hitachi Ltd.A management method and a management system for a storage volume
US20060036786A1 (en)*2004-08-132006-02-16Barrett KreinerLogical remapping of storage devices
US20060059307A1 (en)*2004-09-132006-03-16Akira FujibayashiStorage system and information system using the storage system
US20060075470A1 (en)*2004-10-062006-04-06Toru TanakaStorage network system and access control method
US20060080465A1 (en)*2004-10-122006-04-13Conzola Vincent CApparatus, system, and method for presenting a mapping between a namespace and a set of computing resources
US20060109850A1 (en)*2004-11-242006-05-25Hitachi, Ltd.IP-SAN network access control list generating method and access control list setup method
US20060190522A1 (en)*2005-02-182006-08-24Mitsuhiro NagataMethod for controlling a computer
US20060239452A1 (en)*2005-04-252006-10-26Samsung Electronics Co., Ltd.Apparatus and method for providing security service
US20060271579A1 (en)*2005-05-102006-11-30Arun BatishStorage usage analysis
US7197489B1 (en)*2002-12-312007-03-27Emc CorporationMethods and apparatus for maintaining object data for components in a network
US20070150939A1 (en)*2005-12-222007-06-28Jeffrey AaronMethods, communication networks, and computer program products for selecting an endpoint and/or a midpoint path resource for traffic associated with a network element based on whether the network element can be trusted
US20070147262A1 (en)*2005-12-222007-06-28Jeffrey AaronMethods, communication networks, and computer program products for storing and/or logging traffic associated with a network element based on whether the network element can be trusted
US20070195447A1 (en)*2006-02-212007-08-23Spectra Logic CorporationOptional data encryption by partition for a partitionable data storage library
US20080307065A1 (en)*2007-06-062008-12-11Hitachi, Ltd.Method for starting up file sharing system and file sharing device
US20090049117A1 (en)*2007-08-172009-02-19At&T Bls Intellectual Property, IncSystems and Methods for Localizing a Network Storage Device
US20090083484A1 (en)*2007-09-242009-03-26Robert Beverley BashamSystem and Method for Zoning of Devices in a Storage Area Network
US20090083423A1 (en)*2007-09-262009-03-26Robert Beverley BashamSystem and Computer Program Product for Zoning of Devices in a Storage Area Network
US7562162B2 (en)2007-04-252009-07-14At&T Intellectual Property I, L.P.Systems and methods for distributed computing utilizing a smart memory apparatus
US20120179776A1 (en)*2011-01-122012-07-12Fujitsu LimitedCommunication control apparatus, communication system, information processing apparatus, and communication control method
US20130054907A1 (en)*2011-08-222013-02-28Fujitsu LimitedStorage system, storage control apparatus, and storage control method
US20140337847A1 (en)*2011-10-252014-11-13Fujitsu Technology Solutions Intellectual Property GmbhCluster system and method for executing a plurality of virtual machines
US9134921B1 (en)*2007-04-232015-09-15Netapp, Inc.Uniquely naming storage devices in a global storage environment
US9891845B2 (en)2015-06-242018-02-13International Business Machines CorporationReusing a duplexed storage resource
US10318194B2 (en)*2014-10-022019-06-11Hitachi Vantara CorporationMethod and an apparatus, and related computer-program products, for managing access request in multi-tenancy environments
EP2297921B1 (en)*2008-07-102021-02-24Juniper Networks, Inc.Network storage

Families Citing this family (67)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8352400B2 (en)1991-12-232013-01-08Hoffberg Steven MAdaptive pattern recognition based controller apparatus and method and human-factored interface therefore
US7904187B2 (en)1999-02-012011-03-08Hoffberg Steven MInternet appliance system and method
US7817583B2 (en)*2003-04-282010-10-19Hewlett-Packard Development Company, L.P.Method for verifying a storage area network configuration
DE602004010098T3 (en)2003-05-062014-09-04Apple Inc. METHOD FOR MODIFYING A MESSAGE STORAGE AND TRANSMISSION NETWORK SYSTEM AND DATA ANSWERING SYSTEM
US8144618B2 (en)*2005-01-312012-03-27Hewlett-Packard Development Company, L.P.Method and apparatus for automatic verification of a zone configuration and network access control construct for a plurality of network switches
US7693887B2 (en)*2005-02-012010-04-06Strands, Inc.Dynamic identification of a new set of media items responsive to an input mediaset
EP1849099B1 (en)2005-02-032014-05-07Apple Inc.Recommender system for identifying a new set of media items responsive to an input set of media items and knowledge base metrics
EP1844386A4 (en)2005-02-042009-11-25Strands IncSystem for browsing through a music catalog using correlation metrics of a knowledge base of mediasets
WO2006114451A1 (en)*2005-04-222006-11-02Musicstrands, S.A.U.System and method for acquiring and aggregating data relating to the reproduction of multimedia files or elements
US7877387B2 (en)2005-09-302011-01-25Strands, Inc.Systems and methods for promotional media item selection and promotional program unit generation
WO2007044389A2 (en)*2005-10-042007-04-19Strands, Inc.Methods and apparatus for visualizing a music library
US20070088917A1 (en)*2005-10-142007-04-19Ranaweera Samantha LSystem and method for creating and maintaining a logical serial attached SCSI communication channel among a plurality of storage systems
EP2437158A1 (en)2005-12-192012-04-04Apple Inc.User-to-user recommender
US20070244880A1 (en)*2006-02-032007-10-18Francisco MartinMediaset generation system
BRPI0621315A2 (en)2006-02-102011-12-06Strands Inc dynamic interactive entertainment
US7743009B2 (en)*2006-02-102010-06-22Strands, Inc.System and methods for prioritizing mobile media player files
US8521611B2 (en)*2006-03-062013-08-27Apple Inc.Article trading among members of a community
EP2410446A1 (en)*2006-10-202012-01-25Colwood Technology, LLCPersonal music recommendation mapping
US8019938B2 (en)2006-12-062011-09-13Fusion-I0, Inc.Apparatus, system, and method for solid-state storage as cache for high-capacity, non-volatile storage
US8782047B2 (en)*2009-10-302014-07-15Hitachi Data Systems CorporationFixed content storage within a partitioned content platform using namespaces
US8533155B2 (en)*2009-10-302013-09-10Hitachi Data Systems CorporationFixed content storage within a partitioned content platform, with replication
US8671000B2 (en)*2007-04-242014-03-11Apple Inc.Method and arrangement for providing content to multimedia devices
US7836226B2 (en)2007-12-062010-11-16Fusion-Io, Inc.Apparatus, system, and method for coordinating storage requests in a multi-processor/multi-thread environment
US20090276351A1 (en)*2008-04-302009-11-05Strands, Inc.Scaleable system and method for distributed prediction markets
JP2010049522A (en)*2008-08-222010-03-04Hitachi LtdComputer system and method for managing logical volumes
US8914384B2 (en)2008-09-082014-12-16Apple Inc.System and method for playlist generation based on similarity data
EP2374066A4 (en)2008-10-022013-12-04Apple IncReal-time visualization of user consumption of media items
US8156300B2 (en)*2008-11-182012-04-10Microsoft CorporationDelete notifications for an entire storage volume
US8255641B2 (en)*2008-11-182012-08-28Microsoft CorporationModifying delete notifications in a storage stack
US8261030B2 (en)*2008-11-182012-09-04Microsoft CorporationUsing delete notifications to free related storage resources
US9733962B2 (en)2009-07-232017-08-15Brocade Communications Systems, Inc.Method and apparatus for determining the identity of a virtual machine
US20110029928A1 (en)*2009-07-312011-02-03Apple Inc.System and method for displaying interactive cluster-based media playlists
US20110060738A1 (en)2009-09-082011-03-10Apple Inc.Media item clustering based on similarity data
US8533161B2 (en)*2009-10-302013-09-10Hitachi Data Systems CorporationFixed content storage within a partitioned content platform, with disposition service
JP2012058912A (en)*2010-09-072012-03-22Nec CorpLogical unit number management device, logical unit number management method and program therefor
US9246764B2 (en)*2010-12-142016-01-26Verizon Patent And Licensing Inc.Network service admission control using dynamic network topology and capacity updates
US8880793B2 (en)*2011-04-082014-11-04Symantec CorporationStorage management systems and methods
US8555388B1 (en)2011-05-242013-10-08Palo Alto Networks, Inc.Heuristic botnet detection
US8966625B1 (en)*2011-05-242015-02-24Palo Alto Networks, Inc.Identification of malware sites using unknown URL sites and newly registered DNS addresses
US8983905B2 (en)2011-10-032015-03-17Apple Inc.Merging playlists from multiple sources
US20130219481A1 (en)*2012-02-162013-08-22Robert Matthew VoltzCyberspace Trusted Identity (CTI) Module
US9253176B2 (en)2012-04-272016-02-02Intralinks, Inc.Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment
US9251360B2 (en)*2012-04-272016-02-02Intralinks, Inc.Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment
US9553860B2 (en)2012-04-272017-01-24Intralinks, Inc.Email effectivity facility in a networked secure collaborative exchange environment
CA2871600A1 (en)2012-04-272013-10-31Intralinks, Inc.Computerized method and system for managing networked secure collaborative exchange
US9240985B1 (en)*2012-08-162016-01-19Netapp, Inc.Method and system for managing access to storage space in storage systems
US9215239B1 (en)2012-09-282015-12-15Palo Alto Networks, Inc.Malware detection based on traffic analysis
US9104870B1 (en)2012-09-282015-08-11Palo Alto Networks, Inc.Detecting malware
US9613210B1 (en)2013-07-302017-04-04Palo Alto Networks, Inc.Evaluating malware in a virtual machine using dynamic patching
US10019575B1 (en)2013-07-302018-07-10Palo Alto Networks, Inc.Evaluating malware in a virtual machine using copy-on-write
US9811665B1 (en)2013-07-302017-11-07Palo Alto Networks, Inc.Static and dynamic security analysis of apps for mobile devices
EP3069462A4 (en)2013-11-142017-05-03Intralinks, Inc.Litigation support in cloud-hosted file sharing and collaboration
GB2530685A (en)2014-04-232016-03-30Intralinks IncSystems and methods of secure data exchange
US9489516B1 (en)2014-07-142016-11-08Palo Alto Networks, Inc.Detection of malware using an instrumented virtual machine environment
US9805193B1 (en)2014-12-182017-10-31Palo Alto Networks, Inc.Collecting algorithmically generated domains
US9542554B1 (en)2014-12-182017-01-10Palo Alto Networks, Inc.Deduplicating malware
US10437770B2 (en)2015-01-282019-10-08Avago Technologies International Sales Pte. LimitedMethod and apparatus for providing virtual machine information to a network interface
US9582310B2 (en)*2015-01-282017-02-28Brocade Communications Systems, Inc.Method and apparatus for determining the identity of a virtual machine
US10503442B2 (en)2015-01-282019-12-10Avago Technologies International Sales Pte. LimitedMethod and apparatus for registering and storing virtual machine unique information capabilities
US10033702B2 (en)2015-08-052018-07-24Intralinks, Inc.Systems and methods of secure data exchange
US10944823B2 (en)2016-06-282021-03-09At&T Intellectual Property I, L.P.Highly redundant and scalable storage area network architecture
CN106411962B (en)*2016-12-152019-08-27中国科学技术大学 A data storage method combining user-side access control and cloud access control
US10936653B2 (en)2017-06-022021-03-02Apple Inc.Automatically predicting relevant contexts for media items
US20200004495A1 (en)2018-06-272020-01-02Apple Inc.Generating a Customized Social-Driven Playlist
US11010474B2 (en)2018-06-292021-05-18Palo Alto Networks, Inc.Dynamic analysis techniques for applications
US10956573B2 (en)2018-06-292021-03-23Palo Alto Networks, Inc.Dynamic analysis techniques for applications
US11196765B2 (en)2019-09-132021-12-07Palo Alto Networks, Inc.Simulating user interactions for malware analysis

Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5897661A (en)*1997-02-251999-04-27International Business Machines CorporationLogical volume manager and method having enhanced update capability with dynamic allocation of storage and minimal storage of metadata information
US6343324B1 (en)*1999-09-132002-01-29International Business Machines CorporationMethod and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices
US6606695B2 (en)*2000-05-242003-08-12Hitachi, Ltd.Method and apparatus for controlling access to storage device
US6671776B1 (en)*1999-10-282003-12-30Lsi Logic CorporationMethod and system for determining and displaying the topology of a storage array network having multiple hosts and computer readable medium for generating the topology
US6684209B1 (en)*2000-01-142004-01-27Hitachi, Ltd.Security method and system for storage subsystem
US6779083B2 (en)*2001-07-132004-08-17Hitachi, Ltd.Security for logical unit in storage subsystem
US6842784B1 (en)*2000-06-272005-01-11Emc CorporationUse of global logical volume identifiers to access logical volumes stored among a plurality of storage elements in a computer storage system
US6922688B1 (en)*1998-01-232005-07-26Adaptec, Inc.Computer system storage
US6944654B1 (en)*1999-11-012005-09-13Emc CorporationMultiple storage array control

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5701462A (en)*1993-12-291997-12-23Microsoft CorporationDistributed file system providing a unified name space with efficient name resolution
US5889952A (en)*1996-08-141999-03-30Microsoft CorporationAccess check system utilizing cached access permissions
US6449652B1 (en)*1999-01-042002-09-10Emc CorporationMethod and apparatus for providing secure access to a computer system resource
US6389432B1 (en)*1999-04-052002-05-14Auspex Systems, Inc.Intelligent virtual volume access
US6748448B1 (en)*1999-12-132004-06-08International Business Machines CorporationHigh performance internet storage access scheme
US6718372B1 (en)*2000-01-072004-04-06Emc CorporationMethods and apparatus for providing access by a first computing system to data stored in a shared storage device managed by a second computing system
US7222176B1 (en)*2000-08-282007-05-22Datacore Software CorporationApparatus and method for using storage domains for controlling data in storage area networks
US7177953B1 (en)*2000-12-222007-02-13Nortel Networks LimitedDevice and method for data storage
JP4162184B2 (en)*2001-11-142008-10-08株式会社日立製作所 Storage device having means for acquiring execution information of database management system
US7024427B2 (en)*2001-12-192006-04-04Emc CorporationVirtual file system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5897661A (en)*1997-02-251999-04-27International Business Machines CorporationLogical volume manager and method having enhanced update capability with dynamic allocation of storage and minimal storage of metadata information
US6922688B1 (en)*1998-01-232005-07-26Adaptec, Inc.Computer system storage
US6343324B1 (en)*1999-09-132002-01-29International Business Machines CorporationMethod and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices
US6671776B1 (en)*1999-10-282003-12-30Lsi Logic CorporationMethod and system for determining and displaying the topology of a storage array network having multiple hosts and computer readable medium for generating the topology
US6944654B1 (en)*1999-11-012005-09-13Emc CorporationMultiple storage array control
US6684209B1 (en)*2000-01-142004-01-27Hitachi, Ltd.Security method and system for storage subsystem
US6606695B2 (en)*2000-05-242003-08-12Hitachi, Ltd.Method and apparatus for controlling access to storage device
US6842784B1 (en)*2000-06-272005-01-11Emc CorporationUse of global logical volume identifiers to access logical volumes stored among a plurality of storage elements in a computer storage system
US6779083B2 (en)*2001-07-132004-08-17Hitachi, Ltd.Security for logical unit in storage subsystem

Cited By (64)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040083284A1 (en)*2002-10-252004-04-29Yuval OfekSystem and method for providing data awareness across multiple domains
US20040117546A1 (en)*2002-12-112004-06-17Makio MizunoiSCSI storage management method and management system
US7103712B2 (en)2002-12-112006-09-05Hitachi, Ltd.iSCSI storage management method and management system
US7197489B1 (en)*2002-12-312007-03-27Emc CorporationMethods and apparatus for maintaining object data for components in a network
US20040210791A1 (en)*2003-04-212004-10-21Etsutaro AkagawaMedium for recording network management program, management computer and managing method
US7234020B2 (en)2003-04-212007-06-19Hitachi, Ltd.Fault notification based on volume access control information
US20070214253A1 (en)*2003-04-212007-09-13Hitachi, Ltd.Fault notification based on volume access control information
US6839746B1 (en)*2003-06-032005-01-04Veritas Operating CorporationStorage area network (SAN) device logical relationships manager
US7107328B1 (en)2003-06-032006-09-12Veritas Operating CorporationStorage area network (SAN) device logical relationships manager
US7461140B2 (en)2003-12-192008-12-02Lsi CorporationMethod and apparatus for identifying IPsec security policy in iSCSI
US7568216B2 (en)*2003-12-192009-07-28Lsi Logic CorporationMethods for defining and naming iSCSI targets using volume access and security policy
US7257730B2 (en)2003-12-192007-08-14Lsi CorporationMethod and apparatus for supporting legacy mode fail-over driver with iSCSI network entity including multiple redundant controllers
US20050149748A1 (en)*2003-12-192005-07-07Spry Andrew J.Method and apparatus for identifying IPsec security policy in iSCSI
US20050138418A1 (en)*2003-12-192005-06-23Spry Andrew J.Methods for defining and naming iSCSI targets using volume access and security policy
US20050138466A1 (en)*2003-12-192005-06-23Spry Andrew J.Method and apparatus for supporting legacy mode fail-over driver with ISCSI network entity including multiple redundant controllers
US20050198224A1 (en)*2004-03-022005-09-08Emiko KobayashiStorage network system and control method thereof
US7548924B2 (en)*2004-04-202009-06-16Hitachi, Ltd.Managing method for storage subsystem
US20050234941A1 (en)*2004-04-202005-10-20Naoki WatanabeManaging method for storage subsystem
EP1589411A3 (en)*2004-04-202008-11-05Hitachi, Ltd.Managing method for storing subsystem
US8190847B2 (en)2004-05-202012-05-29Hitachi, Ltd.Management method and a management system for volume
US20120210063A1 (en)*2004-05-202012-08-16Yasuyuki MimatsuManagement method and a management system for volume
EP1598737A2 (en)2004-05-202005-11-23Hitachi Ltd.A management method and a management system for a storage volume
US8006063B2 (en)2004-05-202011-08-23Hitachi, Ltd.Management method and a management system for volume
US8850157B2 (en)*2004-05-202014-09-30Hitachi, Ltd.Management method and a management system for volume
US7610467B2 (en)2004-05-202009-10-27Hitachi, Ltd.Management method and a management system for volume
US20100011184A1 (en)*2004-05-202010-01-14Yasuyuki MimatsuManagement method and a management system for volume
EP1598737A3 (en)*2004-05-202008-06-04Hitachi Ltd.A management method and a management system for a storage volume
US20080091816A1 (en)*2004-05-202008-04-17Hitachi, Ltd.Management method and a management system for volume
US20060036786A1 (en)*2004-08-132006-02-16Barrett KreinerLogical remapping of storage devices
US20060059307A1 (en)*2004-09-132006-03-16Akira FujibayashiStorage system and information system using the storage system
US20100122028A1 (en)*2004-09-132010-05-13Akira FujibayashiMethod and system for controlling information of logical division in a storage controller
US7861054B2 (en)*2004-09-132010-12-28Hitachi, Ltd.Method and system for controlling information of logical division in a storage controller
US7865688B2 (en)2004-09-132011-01-04Hitachi, Ltd.Method and system for controlling information of logical division in a storage controller
US20060075470A1 (en)*2004-10-062006-04-06Toru TanakaStorage network system and access control method
US7725601B2 (en)*2004-10-122010-05-25International Business Machines CorporationApparatus, system, and method for presenting a mapping between a namespace and a set of computing resources
US20060080465A1 (en)*2004-10-122006-04-13Conzola Vincent CApparatus, system, and method for presenting a mapping between a namespace and a set of computing resources
US20060109850A1 (en)*2004-11-242006-05-25Hitachi, Ltd.IP-SAN network access control list generating method and access control list setup method
US20060190522A1 (en)*2005-02-182006-08-24Mitsuhiro NagataMethod for controlling a computer
US9325678B2 (en)*2005-04-252016-04-26Samsung Electronics Co., Ltd.Apparatus and method for providing security service for guest network device in a network
US20060239452A1 (en)*2005-04-252006-10-26Samsung Electronics Co., Ltd.Apparatus and method for providing security service
US20060271579A1 (en)*2005-05-102006-11-30Arun BatishStorage usage analysis
US20070147262A1 (en)*2005-12-222007-06-28Jeffrey AaronMethods, communication networks, and computer program products for storing and/or logging traffic associated with a network element based on whether the network element can be trusted
US20070150939A1 (en)*2005-12-222007-06-28Jeffrey AaronMethods, communication networks, and computer program products for selecting an endpoint and/or a midpoint path resource for traffic associated with a network element based on whether the network element can be trusted
US9570103B2 (en)2006-02-212017-02-14Spectra LogicOptional data encryption by partition for a partitionable data storage library
US20070195447A1 (en)*2006-02-212007-08-23Spectra Logic CorporationOptional data encryption by partition for a partitionable data storage library
US9158467B2 (en)*2006-02-212015-10-13Spectra Logic CorporationOptional data encryption by partition for a partitionable data storage library
US10282137B2 (en)2007-04-232019-05-07Netapp, Inc.Uniquely naming storage devices in a global storage environment
US9134921B1 (en)*2007-04-232015-09-15Netapp, Inc.Uniquely naming storage devices in a global storage environment
US7562162B2 (en)2007-04-252009-07-14At&T Intellectual Property I, L.P.Systems and methods for distributed computing utilizing a smart memory apparatus
US7822824B2 (en)*2007-06-062010-10-26Hitachi, Ltd.Method for starting up file sharing system and file sharing device
US20080307065A1 (en)*2007-06-062008-12-11Hitachi, Ltd.Method for starting up file sharing system and file sharing device
US20090049117A1 (en)*2007-08-172009-02-19At&T Bls Intellectual Property, IncSystems and Methods for Localizing a Network Storage Device
US7925794B2 (en)2007-08-172011-04-12At&T Intellectual Property I, L.P.Systems and methods for localizing a network storage device
US20090083484A1 (en)*2007-09-242009-03-26Robert Beverley BashamSystem and Method for Zoning of Devices in a Storage Area Network
US7996509B2 (en)2007-09-262011-08-09International Business Machines CorporationZoning of devices in a storage area network
US20090083423A1 (en)*2007-09-262009-03-26Robert Beverley BashamSystem and Computer Program Product for Zoning of Devices in a Storage Area Network
EP2297921B1 (en)*2008-07-102021-02-24Juniper Networks, Inc.Network storage
US8984088B2 (en)*2011-01-122015-03-17Fujitsu LimitedCommunication control apparatus, communication system, information processing apparatus, and communication control method
US20120179776A1 (en)*2011-01-122012-07-12Fujitsu LimitedCommunication control apparatus, communication system, information processing apparatus, and communication control method
US9003140B2 (en)*2011-08-222015-04-07Fujitsu LimitedStorage system, storage control apparatus, and storage control method
US20130054907A1 (en)*2011-08-222013-02-28Fujitsu LimitedStorage system, storage control apparatus, and storage control method
US20140337847A1 (en)*2011-10-252014-11-13Fujitsu Technology Solutions Intellectual Property GmbhCluster system and method for executing a plurality of virtual machines
US10318194B2 (en)*2014-10-022019-06-11Hitachi Vantara CorporationMethod and an apparatus, and related computer-program products, for managing access request in multi-tenancy environments
US9891845B2 (en)2015-06-242018-02-13International Business Machines CorporationReusing a duplexed storage resource

Also Published As

Publication numberPublication date
US20060026230A1 (en)2006-02-02
US20060026263A1 (en)2006-02-02
US20100115586A1 (en)2010-05-06
US7676564B2 (en)2010-03-09
US8224947B2 (en)2012-07-17

Similar Documents

PublicationPublication DateTitle
US7676564B2 (en)Managing stored data on a computer network
US11418480B2 (en)Translating a network configuration request for a network control apparatus
US8312522B2 (en)Monitoring network traffic by using a monitor device
JP4311637B2 (en) Storage controller
US11245576B2 (en)Blockchain-based configuration profile provisioning system
US8346952B2 (en)De-centralization of group administration authority within a network storage architecture
US8024779B2 (en)Verifying user authentication
US10187275B2 (en)Monitoring network traffic by using event log information
US7185047B1 (en)Caching and accessing rights in a distributed computing system
US8627410B2 (en)Dynamic radius
JP4698180B2 (en) Secure hierarchical namespace in peer-to-peer networks
US20080022120A1 (en)System, Method and Computer Program Product for Secure Access Control to a Storage Device
JPH1074158A (en)Dynamic certifying method and device for client of file system of network
US20050192923A1 (en)Computer system for allocating storage area to computer based on security level
KR20090030256A (en) Name Challenge Enforcement Areas
US20110202667A1 (en)Database Virtualization
JP4329412B2 (en) File server system
CN114363165A (en)Configuration method of electronic equipment, electronic equipment and server
US20040181600A1 (en)Method, apparatus and services for leasing volumes
CN114884728A (en)Security access method based on role access control token
US9560039B2 (en)Controlled discovery of SAN-attached SCSI devices and access control via login authentication
US20060075470A1 (en)Storage network system and access control method
CN115150170B (en)Security policy configuration method, device, electronic equipment and storage medium
WO2025060984A1 (en)Cloud desktop login method, cloud desktop login device, and readable medium

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:MICROSOFT CORPORATION, WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RAGHAVAN, KARTIK N.;PHILLIPS, THOMAS G.;RACIBORSKI, BOHDAN;REEL/FRAME:012999/0083;SIGNING DATES FROM 20020603 TO 20020605

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034766/0001

Effective date:20141014


[8]ページ先頭

©2009-2025 Movatter.jp