HITACHI SOFTWARE ENGINEERING CO., LTD Patent applications |
Patent application number | Title | Published |
20120102080 | COMPUTER SYSTEM AND STORAGE CAPACITY EXTENSION METHOD - Provided is a computer system configured so that security compliance problems can be avoided and an access control model which can be uniquely customized can be implemented by extending the storage capacity to an external storage service by means of integrated management of an existing NAS(s) and the external storage service, and controlling the optimum data placement according to the confidentiality and importance level of data. | 04-26-2012 |
20110167098 | STORAGE MANAGEMENT MEDIA SERVER AND METHOD OF CONTROLLING THE SAME - In order to enable backup and restoration of data even in a hetero file format environment by using preexisting backup tools, the present invention provides with the following configuration. The configuration is characterized by: a BK tool cooperative module 11 for mediating the instruction of such as backup received from a master server 2; a data handling module 12 capable of such as backup and restoration in response to the instruction; a file format analyzing module 13 capable of recognizing file format of a file stored in a sub-volume 32; and FS drivers of plural types necessary to each type of file system; wherein the data handling module 12, in response to a received instruction, is capable of mounting a sub-volume 32 via a FS driver (1˜N) 14 conformable to file format of a designated file, thereby allowing backup, restore and so on. | 07-07-2011 |
20110055904 | LICENSE AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD - A license authentication system and method enabling authentication of an application to be installed in a client PC which is being incapable of communicating with the server which authenticates the application. A portable terminal performs license authentication of an application to be installed in a client PC in place of the server and gives the client PC a temporary right of use (step | 03-03-2011 |
20110022811 | INFORMATION BACKUP/RESTORATION PROCESSING APPARATUS AND INFORMATION BACKUP/RESTORATION PROCESSING SYSTEM - To reduce the size of backup data, increase the backup speed, and solve a problem that the amount of unnecessary writing could undesirably increase in a restoration process, which would otherwise require physical disks with a capacity greater than the size of a virtual volume. On a backup server having mounted thereon a virtual volume that is the target to be backed up and restored, read/write access to only the blocks of data areas is performed by a device driver that filters I/O access to a device from a file system on the basis of the data mapping information of the virtual volume, whereby read/write access to unnecessary portions is avoided. Thus, it is possible to reduce the size of backup data, increase the backup speed, and prevent an increase in the amount of unnecessary writing to the virtual volume in a restoration process. | 01-27-2011 |
20100251341 | LOGIN PROCESS APPARATUS, LOGIN PROCESS METHOD, AND PROGRAM - An authority group definition ( | 09-30-2010 |
20100250852 | USER TERMINAL APPARATUS AND CONTROL METHOD THEREOF, AS WELL AS PROGRAM - A user terminal apparatus and a control method therefor, which constitutes part of a thin client system which transfers data to a file server and stores the data therein. The system aggregates user data in a file server by controlling writing into a secondary storage device of the user terminal and controlling writing out to an external storage medium, to prevent loss and leakage of confidential information. | 09-30-2010 |
20100246975 | METHOD AND APPARATUS FOR DETERMINING IF IMAGING OBJECT IS STILL - For an image of an object for use in biometrics and the like, if the imaging object is still is detected with a simple configuration. From two pieces of image data that have been captured in time series, the absolute value of the difference in brightness of pixels in the identical position is calculated, and the number of pixels whose absolute values exceed the threshold value indicative of the limit of the brightness change is counted. The counted result is compared with the movement determination threshold value to determine if the imaging object is still. | 09-30-2010 |
20100235383 | STORAGE SYSTEM AND DATA MIGRATION-COMPATIBLE SEARCH SYSTEM - To reduce consumption of the data capacity of a data migration-source storage by information necessary for accessing entity data that has been migrated to the other storage, compared to that of the conventional system. Provided is a storage system including a first storage that is a migration-destination storage having stored therein entity data and first index information associated with the entity data, and a second storage that is a migration-source storage having stored therein link information for accessing the entity data and second index information associated with the link information, wherein the second index information includes the same hash value as a hash value included in the first index information. | 09-16-2010 |
20100185852 | ENCRYPTION AND DECRYPTION METHOD FOR SHARED ENCRYPTED FILE - Encryption and decryption is achieved without the requirement for updating of the encryption key or re-encryption of an encrypted file when a shared encrypted file is generated, renamed or deleted. | 07-22-2010 |
20100121824 | DISASTER RECOVERY PROCESSING METHOD AND APPARATUS AND STORAGE UNIT FOR THE SAME - A technique capable of constructing a disaster recovery system reduced in performance degradation of a primary system is provided. The technique includes a step of conducting synchronous writing of log information into a secondary storage subsystem in a secondary system when a write request received from a host computer is a write request of log information, a step of temporarily storing a write request and conducting asynchronous writing into the secondary storage subsystem when the received write request is a write request of database data or status information, a step of modifying log information, data in a database area, and status information in the secondary storage subsystem according to contents of a write request received from a primary storage subsystem, and a step of recovering the database area according to contents of log information in a location indicated by the status information. | 05-13-2010 |
20100106712 | SEARCH SYSTEM - Documents, which have typically been searched for using multiple search engines based on the access rights of multiple accounts on multiple authentication servers, are searched for using a single federated search engine via a single log in. A host system having an account correspondence database is provided with a function of re-indexing indexes that have been individually created with multiple search engines, so that indexes of all of the search engines are created in advance. When a search is requested, correspondence information is read from the account correspondence database, so that a document search involving the use of only the host system is executed based on all of the relevant account rights. | 04-29-2010 |
20100106709 | FILE SEARCH SYSTEM AND FILE SEARCH SERVER DEVICE - Provided is a mechanism that, when presenting a search result to a user while reducing the load on a file server, sets a file to be accessible to the user only when the user is authorized to access the file and folders of all hierarchical levels. In the case of adapting a search method that includes, under the condition of using a file system having a folder hierarchical structure where the right of access to each folder and file is set, creating an index file for files to be searched for in advance, and searching for a file specified as a search target with reference to the index file, an appropriate right of access to each file and folder is set in creation of the index file, whereby it becomes possible to display as search results only the files that the relevant user is authorized to read. | 04-29-2010 |
20100106698 | USER TERMINAL DEVICE AND METHOD FOR CONTROLLING THE SAME - A method is provided that automatically saves data on a user terminal of a thin client system to a file server or to the user terminal by appropriately and efficiently sorting the data. System update data such as a patch for the user terminal and confidential data that should be saved to the server are distinguished when written to a secondary storage device, and separately cached into memory. Then, the confidential data that should be saved to the server is automatically uploaded to the file server at any given timing, for example, at shut-down of the terminal, whereby a minimum amount of data can be efficiently saved to the file server. | 04-29-2010 |
20100082530 | LOG MANAGEMENT SERVER - A log management server enables an administrator to manage a log with a lighter load without compelling a client to bear any load in a log management processing. The log management server receives a log from a client | 04-01-2010 |
20100070764 | TRANSFER DATA MANAGEMENT SYSTEM FOR INTERNET BACKUP - Erroneous deletion of data due to a collision of digest information during data de-duplication using digest information is prevented. When backup data is stored on a backup server | 03-18-2010 |
20100064342 | SECURITY MEASURE STATUS SELF-CHECKING SYSTEM - The present invention provides a security measure status self-checking system which can determine the measure status in a more simplified and effective manner by focusing on the information leakage measure in the security measures, managing the PC's security measure status and the user's take-out operation status in an integrated and unitary manner, and providing security policy samples. According to the present invention, the client computer collects security inventory information and operation log information and transmits the information to the server computer. Further, the server computer stores the security inventory information and the operation log information transmitted from the client computer and determines whether or not the information conforms to the security policy which has been set in advance. The check result is displayed on the server computer and when a policy violation is detected, the manager and the client are notified of that effect. | 03-11-2010 |
20100039663 | PRINTING MANAGEMENT SYSTEM, PRINTING MANAGEMENT METHOD, AND PROGRAM - Insertion of a watermark corresponding to the content of a file at the time of the printing of the file is made possible. Importance and/or confidentiality is defined per keyword in advance, and the watermark to be inserted is defined based thereon. At the time of the printing of the file, a keyword search within the file is performed, and the watermark to be inserted is automatically selected based on the search result (see FIG. | 02-18-2010 |
20090241114 | INFORMATION PROCESSING APPARATUS AND METHOD, COMPUTER-READABLE RECORDING MEDIUM, AND EXTERNAL STORAGE MEDIUM - There is realized such a method for safely using and storing secret data that electronic copies of the secret data do not flow out of a particular external storage medium. In the present invention, a special format area which cannot be recognized from an ordinary PC is created in an external storage medium, and secret data is stored therein. By making a configuration in which a function of mounting the special format area is provided, and secret data in the special format area is edited and used on a work OS on which network access is inhibited and writing to a secondary storage device is inhibited, the destination of storing the secret data after it is used is limited to the special format area on the external storage medium so that outflow of the secret data from the external storage medium is prevented. | 09-24-2009 |