Using access to special files to control management functions of a networked attached storage device

    公开(公告)号:GB2508214A

    公开(公告)日:2014-05-28

    申请号:GB201221204

    申请日:2012-11-26

    Applicant: IBM

    Abstract: A network attached storage device stores files and directories. In addition to data files, special files exist within the file system. Accesses to the special files cause the device to execute management functions. Some management functions may apply to the device itself. Other functions may apply to objects stored on the device. The special files may be identified by their extension. There may be a special file in the root of a file system or in every directory. The special file may contain a list of available management functions, a list of file properties or a list of active management functions. The list of active functions may give the status, progress or result of the active functions. A write to the file may invoke one of the functions.

    Anti-virus data management
    2.
    发明专利

    公开(公告)号:GB2506622A

    公开(公告)日:2014-04-09

    申请号:GB201217732

    申请日:2012-10-04

    Applicant: IBM

    Abstract: An anti-virus data management method comprises, receiving an instruction to write data to storage 231; examining the data for malicious content (such as malware and viruses) using a malicious content scanner 220; wherein, if no malicious content is found, writing the data and linking/associating a signature representing the version of the malicious content scanner with the data. A further method comprises, receiving an instruction to read data (identified by a data identified) from storage, the first data linked with a malicious content scanner version signature; determining the version signature of the current malicious content scanner; and examining the data for malicious content if the signatures do not match. These methods may be used in a backup system 200/230 that preserves old copies of data, and may be used in conjunction with a backup scheme where certain copies are deleted. If examining of data reveals malicious content, then an older copy may be identified (using the data identifier) and examined unless it has already been scanned using the current malicious content scanner.

Patent Agency Ranking