Patent application number | Description | Published |
20080232593 | SYSTEM AND METHOD FOR LOGICAL SHREDDING OF DATA STORED ON WORM MEDIA - Files are encrypted and stored on a WORM media device along with their encryption keys, the binary values of which are stored as a combination of written and unwritten sectors in a key storage portion of the media. To shred a file, the associated key is destroyed simply by writing into the unwritten sectors that are associated with the key. | 09-25-2008 |
20080270372 | System And Method For Verifying The Integrity And Completeness Of Records - A correctness verification system receives a query, executes the query using a query logic, and produces a query result. The query result comprises data records that satisfy the query, data verification objects associated with the data records, index segments accessed during the execution of the query, index verification objects associated with the index segments, and the query. The system transfers the query result to a verification system. The verification system verifies correctness of the query result by executing the query using the query logic. The verification system uses the data verification objects to verify integrity of the data objects, uses the index verification objects to verify the integrity of the index segments, and uses the index verification objects and the data verification objects to verify the completeness of the query result. | 10-30-2008 |
20080294852 | System and method for achieving reliable WORM storage using WMRM storage - The invention provides a method for ensuring that data stored on rewritable storage is immutable. The method includes initializing selected user-addressable blocks of storage to a writable state. In addition, the method includes accepting data to be stored in specified user-addressable blocks. Also, the method includes determining if the specified block(s) is writable. Also, the method includes storing the accepted data to the rewritable storage. Moreover, the method includes setting the state of the specified block(s) to non-writable. In one embodiment, the writable/non-writable state associated with each block is encoded and stored in the contents of the corresponding block. In another embodiment, the steps of determining whether the specified block(s) is writable, storing the accepted data to the rewritable storage, and setting the state of the specified block(s) to non-writable, are integrated and indivisible. | 11-27-2008 |
20090041253 | SYSTEM AND METHOD FOR PRIVACY PRESERVING QUERY VERIFICATION - The present invention relates to a method for proving the correctness of a query result produced by a data publisher while preserving the privacy of the query result. The method comprises delivering a public key of a public key/private key pair from a data owner to a client and delivering data and cryptographic metadata to at least one data publisher, wherein the metadata is associated both with the data and the public key of the public key/private key pair. The method further comprises receiving a query from the client, returning a query result and a verification object from the data publisher to the client in response to the query, and verifying the correctness of the query result, wherein the correctness of the query result is verified utilizing the verification object and the public key. | 02-12-2009 |
20090049086 | SYSTEM AND METHOD FOR PROVIDING AN OBJECT TO SUPPORT DATA STRUCTURES IN WORM STORAGE - An object storage system provides a storage object to support index structures, logs, and audit trails in WORM storage. The storage object includes a mutable object, an immutable object, or an appendable object. For each storage object, the system maintains an indication of type, such as mutable, immutable, or appendable object type. A mutable object can be arbitrarily modified, an immutable object cannot be modified, and the contents of the appendable object cannot be modified but can be appended with new data. Appended data becomes immutable. The system enables a protection level represented by the object type to be upgraded but not downgraded. Consequently, data committed to be immutable cannot be changed by changing the type of the storage object. | 02-19-2009 |
20090049515 | SYSTEM AND METHOD FOR EFFECTING INFORMATION GOVERNANCE - A method to manage data located on networked devices is provided. The method includes replicating objects residing on the devices and collecting information about at least one of the objects or the devices. The method further includes receiving input on desired information governance policies and outcomes and analyzing the replicated objects, collected information and received input to determine an information governance action. | 02-19-2009 |
20090141619 | SYSTEM AND METHOD FOR ENABLING EFFICIENT SMALL WRITES TO WORM STORAGE - According to the present invention, there is provided a method of providing a WORM storage system, the method including a sector-append capability. The method includes receiving data to be written to a WORM storage system. In addition, the method includes identifying a target sector at which the data is to be written. Also, the method includes determining if the received data can be added to the target sector. Moreover, the method includes adding the received data to the target sector if it is determined that the received data can be added to the target sector. | 06-04-2009 |
20090187544 | MANAGING A HIERARCHY OF DATABASES - Monitoring an activity profile for a given row of a database and determining a target database for a given row based on the activity profile of the given row. Identifying any row related to the given row and moving the given row and any row related to the given row into the target database while preserving referential integrity. | 07-23-2009 |
20090193289 | Reducing data loss and unavailability by integrating multiple levels of a storage hierarchy - A method for reducing data loss and unavailability by integrating multiple levels of a storage hierarchy is provided. The method includes receiving a read request. In addition, the method includes recognizing a data failure in response to the read request. The method further includes locating an alternate source of the data to be read in response to recognizing the data failure. The alternate source includes data cached at devices in the storage hierarchy, data in a backup system, and cumulative changes to the data since the last backup. Moreover, the method includes responding to the read request with data from the alternate source. | 07-30-2009 |
20090210374 | METHODOLOGY AND COMPUTER PROGRAM PRODUCT FOR EFFECTING RULE EVALUATION IN POLICY BASED DATA MANAGEMENT - The invention relates to a system and method for providing efficient policy rule updates in policy-based data management. More particularly, the invention relates to a system and method for restraining the size of the set of data objects to be examined after a policy rule evaluation. | 08-20-2009 |
20090210375 | METHODOLOGY AND COMPUTER PROGRAM PRODUCT FOR EFFECTING RULE EVALUATION IN POLICY BASED DATA MANAGEMENT - The invention relates to a system and method for providing efficient policy rule updates in policy-based data management. More particularly, the invention relates to a system and method for restraining the size of the set of data objects to be examined after a policy rule evaluation. | 08-20-2009 |
20090313296 | METHOD AND APPARATUS FOR MANAGING STORAGE - The invention provides a method and apparatus for managing stored objects. The method includes providing an object management policy for stored objects, analyzing the object management policy to identify information required to execute the object management policy, acquiring the identified information from a protection repository for the stored objects, and executing the object management policy based on the acquired information to manage the stored objects. | 12-17-2009 |
20090313297 | METHOD AND APPARATUS FOR USING SELECTIVE ATTRIBUTE ACQUISITION AND CLAUSE EVALUATION FOR POLICY BASED STORAGE MANAGEMENT - The invention provides a method and apparatus for managing stored data objects. The method includes detecting involved attributes of stored data objects based on object management rules, determining expected data storage management costs for each possible order of attribute acquisition for the detected attributes, detecting an order of attribute acquisition that has a data storage management cost which is minimal or below a predetermined threshold, acquiring the attributes of the stored data objects based on the detected order of attribute acquisition, and executing an object management policy based on the acquired attributes to manage the stored objects at the low cost for object storage, attribute acquisition and policy evaluation. | 12-17-2009 |
20090320146 | SYSTEM AND METHOD FOR SECURING DATA WITHIN A STORAGE SYSTEM - According to the present invention, there is provided a system for securing data with a storage system. The system includes at least one storage device. In addition, the system includes a security mechanism for recognizing an attempt to insert or remove the storage device. Moreover, the system includes a management unit to control the insertion and removal of the storage device. | 12-24-2009 |
20100030729 | METHOD AND SYSTEM FOR MITIGATING IMPACT OF USER ERRORS IN DATA STORES - The invention provides a method and system for managing data access. The method includes receiving a request for accessing a file, determining a type of the received request that corresponds to an access pattern based on history of many files, marking the request based on the type of request to identify the request as a candidate to be part of a sequential scan for accessing files in a sequential order, and processing the request based on the marking to throttle access of the file in the case of a potential ongoing erroneously requested sequential scan. | 02-04-2010 |
20100223665 | SYSTEM AND METHOD FOR PROVIDING A VIRTUAL BINDING FOR A WORM STORAGE SYSTEM ON REWRITABLE MEDIA - A virtual binding system ensures that the WORM logic for protecting data immutability cannot be circumvented, effectively guaranteeing WORM property of a WORM storage system composed of rewritable magnetic hard disks. To close the security hole between the rewritable media and the WORM logic, virtual binding securely authenticates the legitimacy of a WORM logic controller before granting data access on a WORM storage media. Furthermore, the system verifies the legitimacy of the WORM logic controller during data access. This approach virtually binds together the WORM logic controller and the WORM storage media even though the WORM logic controller and the WORM storage media may be physically separate. | 09-02-2010 |