WO2007015266A3 - System and method of time based hierarchical storage management - Google Patents
System and method of time based hierarchical storage management Download PDFInfo
- Publication number
- WO2007015266A3 WO2007015266A3 PCT/IN2006/000269 IN2006000269W WO2007015266A3 WO 2007015266 A3 WO2007015266 A3 WO 2007015266A3 IN 2006000269 W IN2006000269 W IN 2006000269W WO 2007015266 A3 WO2007015266 A3 WO 2007015266A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- incubated
- drive
- time based
- hierarchical storage
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/564—Static detection by virus signature recognition
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1461—Backup scheduling policy
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention is a method to prevent complete data loss in case of malicious software attacks by means of a time based hierarchical storage that allows new or modified data to be incubated on differentiated drive(s), data storage area(s), device(s), etc. for a predefined period of time. The invention is a method to effect or commit changes made in the incubated drive(s) / device(s) etc. after expiration of a pre-definable quiescent period of pre-emptive quarantine of incubated data on being attested as free from the effect of malicious software, accidental defects, etc. Furthermore, accodental data loss is prevented by recovering changed data from the incubated drive(s) etc. and requested data or related information can be seamlessly furnished regardless of the respective drive(s) etc.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN2057DE2005 | 2005-08-02 | ||
| IN2057/DEL/2005 | 2005-08-02 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2007015266A2 WO2007015266A2 (en) | 2007-02-08 |
| WO2007015266A3 true WO2007015266A3 (en) | 2007-07-12 |
Family
ID=37709014
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IN2006/000269 WO2007015266A2 (en) | 2005-08-02 | 2006-07-31 | System and method of time based hierarchical storage management |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2007015266A2 (en) |
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12131294B2 (en) | 2012-06-21 | 2024-10-29 | Open Text Corporation | Activity stream based interaction |
| US12149623B2 (en) | 2018-02-23 | 2024-11-19 | Open Text Inc. | Security privilege escalation exploit detection and mitigation |
| US12164466B2 (en) | 2010-03-29 | 2024-12-10 | Open Text Inc. | Log file management |
| US12197383B2 (en) | 2015-06-30 | 2025-01-14 | Open Text Corporation | Method and system for using dynamic content types |
| US12235960B2 (en) | 2019-03-27 | 2025-02-25 | Open Text Inc. | Behavioral threat detection definition and compilation |
| US12261822B2 (en) | 2014-06-22 | 2025-03-25 | Open Text Inc. | Network threat prediction and blocking |
| US12282549B2 (en) | 2005-06-30 | 2025-04-22 | Open Text Inc. | Methods and apparatus for malware threat research |
| US12412413B2 (en) | 2015-05-08 | 2025-09-09 | Open Text Corporation | Image box filtering for optical character recognition |
| US12437068B2 (en) | 2015-05-12 | 2025-10-07 | Open Text Inc. | Automatic threat detection of executable files based on static data analysis |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8954688B2 (en) | 2010-10-06 | 2015-02-10 | International Business Machines Corporation | Handling storage pages in a database system |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6611850B1 (en) * | 1997-08-26 | 2003-08-26 | Reliatech Ltd. | Method and control apparatus for file backup and restoration |
| US20040010732A1 (en) * | 2002-07-10 | 2004-01-15 | Hitachi, Ltd. | Backup method and storage control device using the same |
| US6847984B1 (en) * | 1999-12-16 | 2005-01-25 | Livevault Corporation | Systems and methods for backing up data files |
| US20050114411A1 (en) * | 2003-11-24 | 2005-05-26 | International Business Machines Corporation | Safely restoring previously un-backed up data during system restore of a failing system |
-
2006
- 2006-07-31 WO PCT/IN2006/000269 patent/WO2007015266A2/en active Application Filing
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6611850B1 (en) * | 1997-08-26 | 2003-08-26 | Reliatech Ltd. | Method and control apparatus for file backup and restoration |
| US6847984B1 (en) * | 1999-12-16 | 2005-01-25 | Livevault Corporation | Systems and methods for backing up data files |
| US20040010732A1 (en) * | 2002-07-10 | 2004-01-15 | Hitachi, Ltd. | Backup method and storage control device using the same |
| US20050114411A1 (en) * | 2003-11-24 | 2005-05-26 | International Business Machines Corporation | Safely restoring previously un-backed up data during system restore of a failing system |
Cited By (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12282549B2 (en) | 2005-06-30 | 2025-04-22 | Open Text Inc. | Methods and apparatus for malware threat research |
| US12164466B2 (en) | 2010-03-29 | 2024-12-10 | Open Text Inc. | Log file management |
| US12210479B2 (en) | 2010-03-29 | 2025-01-28 | Open Text Inc. | Log file management |
| US12131294B2 (en) | 2012-06-21 | 2024-10-29 | Open Text Corporation | Activity stream based interaction |
| US12261822B2 (en) | 2014-06-22 | 2025-03-25 | Open Text Inc. | Network threat prediction and blocking |
| US12301539B2 (en) | 2014-06-22 | 2025-05-13 | Open Text Inc. | Network threat prediction and blocking |
| US12412413B2 (en) | 2015-05-08 | 2025-09-09 | Open Text Corporation | Image box filtering for optical character recognition |
| US12437068B2 (en) | 2015-05-12 | 2025-10-07 | Open Text Inc. | Automatic threat detection of executable files based on static data analysis |
| US12197383B2 (en) | 2015-06-30 | 2025-01-14 | Open Text Corporation | Method and system for using dynamic content types |
| US12149623B2 (en) | 2018-02-23 | 2024-11-19 | Open Text Inc. | Security privilege escalation exploit detection and mitigation |
| US12235960B2 (en) | 2019-03-27 | 2025-02-25 | Open Text Inc. | Behavioral threat detection definition and compilation |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2007015266A2 (en) | 2007-02-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2007015266A3 (en) | System and method of time based hierarchical storage management | |
| WO2006115595A3 (en) | System, method and computer program product for applying electronic policies | |
| WO2007148314A3 (en) | Secure domain information protection apparatus and methods | |
| WO2007114971A3 (en) | System and method for a secure process to perform distributed transactions | |
| EP2426618A4 (en) | INFORMATION DEVICE, PROGRAM, METHOD PREVENTING UNAUTHORIZED PROGRAM CODE EXECUTION, AND COMPUTER READABLE RECORDING MEDIUM | |
| WO2010065271A3 (en) | Systems and methods for providing continuous file protection at block level | |
| EP1883914A4 (en) | System and method of tracking the movement of individuals and assets | |
| WO2011040950A3 (en) | Power interrupt management | |
| EP1909202A4 (en) | System and method for prioritizing the content of web pages offered by merchants | |
| WO2009143322A3 (en) | Methods and systems for single sign on with dynamic authentication levels | |
| WO2006118661A3 (en) | An efficient mechanism for tracking data changes in a database system | |
| WO2007141610A3 (en) | Message push with pull of information to a communications computing device | |
| BRPI0511223A8 (en) | "host system" | |
| WO2007115166A3 (en) | Session presence information management | |
| WO2008057761A3 (en) | One-stop shopping system and method | |
| WO2008093399A1 (en) | Information processing system and information processing method | |
| WO2007002282A3 (en) | Managing memory pages | |
| WO2006096740A3 (en) | An apparatus and method for employing cloning for software development | |
| TW200630786A (en) | A method, apparatus, and system for buffering instructions | |
| WO2007146990A3 (en) | A media item payment system and associated method of use | |
| WO2007109707A3 (en) | Method and system for rendering harmless a locked pestware executable object | |
| WO2007124421A3 (en) | Backwards researching existing pestware | |
| WO2006094160A3 (en) | System and method for backing up open files of a source control management repository | |
| TW200713207A (en) | Data recovery method and system for a data recording | |
| WO2006041471A3 (en) | Method and system for caching data |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO R. 112(1) DATED 16.07.08 |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 06780549 Country of ref document: EP Kind code of ref document: A2 |