[go: up one dir, main page]

WO2007015266A3 - System and method of time based hierarchical storage management - Google Patents

System and method of time based hierarchical storage management Download PDF

Info

Publication number
WO2007015266A3
WO2007015266A3 PCT/IN2006/000269 IN2006000269W WO2007015266A3 WO 2007015266 A3 WO2007015266 A3 WO 2007015266A3 IN 2006000269 W IN2006000269 W IN 2006000269W WO 2007015266 A3 WO2007015266 A3 WO 2007015266A3
Authority
WO
WIPO (PCT)
Prior art keywords
data
incubated
drive
time based
hierarchical storage
Prior art date
Application number
PCT/IN2006/000269
Other languages
French (fr)
Other versions
WO2007015266A2 (en
Inventor
Ajay Madhok
Original Assignee
Ajay Madhok
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ajay Madhok filed Critical Ajay Madhok
Publication of WO2007015266A2 publication Critical patent/WO2007015266A2/en
Publication of WO2007015266A3 publication Critical patent/WO2007015266A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/564Static detection by virus signature recognition
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1461Backup scheduling policy

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention is a method to prevent complete data loss in case of malicious software attacks by means of a time based hierarchical storage that allows new or modified data to be incubated on differentiated drive(s), data storage area(s), device(s), etc. for a predefined period of time. The invention is a method to effect or commit changes made in the incubated drive(s) / device(s) etc. after expiration of a pre-definable quiescent period of pre-emptive quarantine of incubated data on being attested as free from the effect of malicious software, accidental defects, etc. Furthermore, accodental data loss is prevented by recovering changed data from the incubated drive(s) etc. and requested data or related information can be seamlessly furnished regardless of the respective drive(s) etc.
PCT/IN2006/000269 2005-08-02 2006-07-31 System and method of time based hierarchical storage management WO2007015266A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN2057DE2005 2005-08-02
IN2057/DEL/2005 2005-08-02

Publications (2)

Publication Number Publication Date
WO2007015266A2 WO2007015266A2 (en) 2007-02-08
WO2007015266A3 true WO2007015266A3 (en) 2007-07-12

Family

ID=37709014

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2006/000269 WO2007015266A2 (en) 2005-08-02 2006-07-31 System and method of time based hierarchical storage management

Country Status (1)

Country Link
WO (1) WO2007015266A2 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12131294B2 (en) 2012-06-21 2024-10-29 Open Text Corporation Activity stream based interaction
US12149623B2 (en) 2018-02-23 2024-11-19 Open Text Inc. Security privilege escalation exploit detection and mitigation
US12164466B2 (en) 2010-03-29 2024-12-10 Open Text Inc. Log file management
US12197383B2 (en) 2015-06-30 2025-01-14 Open Text Corporation Method and system for using dynamic content types
US12235960B2 (en) 2019-03-27 2025-02-25 Open Text Inc. Behavioral threat detection definition and compilation
US12261822B2 (en) 2014-06-22 2025-03-25 Open Text Inc. Network threat prediction and blocking
US12282549B2 (en) 2005-06-30 2025-04-22 Open Text Inc. Methods and apparatus for malware threat research
US12412413B2 (en) 2015-05-08 2025-09-09 Open Text Corporation Image box filtering for optical character recognition
US12437068B2 (en) 2015-05-12 2025-10-07 Open Text Inc. Automatic threat detection of executable files based on static data analysis

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8954688B2 (en) 2010-10-06 2015-02-10 International Business Machines Corporation Handling storage pages in a database system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6611850B1 (en) * 1997-08-26 2003-08-26 Reliatech Ltd. Method and control apparatus for file backup and restoration
US20040010732A1 (en) * 2002-07-10 2004-01-15 Hitachi, Ltd. Backup method and storage control device using the same
US6847984B1 (en) * 1999-12-16 2005-01-25 Livevault Corporation Systems and methods for backing up data files
US20050114411A1 (en) * 2003-11-24 2005-05-26 International Business Machines Corporation Safely restoring previously un-backed up data during system restore of a failing system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6611850B1 (en) * 1997-08-26 2003-08-26 Reliatech Ltd. Method and control apparatus for file backup and restoration
US6847984B1 (en) * 1999-12-16 2005-01-25 Livevault Corporation Systems and methods for backing up data files
US20040010732A1 (en) * 2002-07-10 2004-01-15 Hitachi, Ltd. Backup method and storage control device using the same
US20050114411A1 (en) * 2003-11-24 2005-05-26 International Business Machines Corporation Safely restoring previously un-backed up data during system restore of a failing system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12282549B2 (en) 2005-06-30 2025-04-22 Open Text Inc. Methods and apparatus for malware threat research
US12164466B2 (en) 2010-03-29 2024-12-10 Open Text Inc. Log file management
US12210479B2 (en) 2010-03-29 2025-01-28 Open Text Inc. Log file management
US12131294B2 (en) 2012-06-21 2024-10-29 Open Text Corporation Activity stream based interaction
US12261822B2 (en) 2014-06-22 2025-03-25 Open Text Inc. Network threat prediction and blocking
US12301539B2 (en) 2014-06-22 2025-05-13 Open Text Inc. Network threat prediction and blocking
US12412413B2 (en) 2015-05-08 2025-09-09 Open Text Corporation Image box filtering for optical character recognition
US12437068B2 (en) 2015-05-12 2025-10-07 Open Text Inc. Automatic threat detection of executable files based on static data analysis
US12197383B2 (en) 2015-06-30 2025-01-14 Open Text Corporation Method and system for using dynamic content types
US12149623B2 (en) 2018-02-23 2024-11-19 Open Text Inc. Security privilege escalation exploit detection and mitigation
US12235960B2 (en) 2019-03-27 2025-02-25 Open Text Inc. Behavioral threat detection definition and compilation

Also Published As

Publication number Publication date
WO2007015266A2 (en) 2007-02-08

Similar Documents

Publication Publication Date Title
WO2007015266A3 (en) System and method of time based hierarchical storage management
WO2006115595A3 (en) System, method and computer program product for applying electronic policies
WO2007148314A3 (en) Secure domain information protection apparatus and methods
WO2007114971A3 (en) System and method for a secure process to perform distributed transactions
EP2426618A4 (en) INFORMATION DEVICE, PROGRAM, METHOD PREVENTING UNAUTHORIZED PROGRAM CODE EXECUTION, AND COMPUTER READABLE RECORDING MEDIUM
WO2010065271A3 (en) Systems and methods for providing continuous file protection at block level
EP1883914A4 (en) System and method of tracking the movement of individuals and assets
WO2011040950A3 (en) Power interrupt management
EP1909202A4 (en) System and method for prioritizing the content of web pages offered by merchants
WO2009143322A3 (en) Methods and systems for single sign on with dynamic authentication levels
WO2006118661A3 (en) An efficient mechanism for tracking data changes in a database system
WO2007141610A3 (en) Message push with pull of information to a communications computing device
BRPI0511223A8 (en) "host system"
WO2007115166A3 (en) Session presence information management
WO2008057761A3 (en) One-stop shopping system and method
WO2008093399A1 (en) Information processing system and information processing method
WO2007002282A3 (en) Managing memory pages
WO2006096740A3 (en) An apparatus and method for employing cloning for software development
TW200630786A (en) A method, apparatus, and system for buffering instructions
WO2007146990A3 (en) A media item payment system and associated method of use
WO2007109707A3 (en) Method and system for rendering harmless a locked pestware executable object
WO2007124421A3 (en) Backwards researching existing pestware
WO2006094160A3 (en) System and method for backing up open files of a source control management repository
TW200713207A (en) Data recovery method and system for a data recording
WO2006041471A3 (en) Method and system for caching data

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO R. 112(1) DATED 16.07.08

122 Ep: pct application non-entry in european phase

Ref document number: 06780549

Country of ref document: EP

Kind code of ref document: A2