-
1.
公开(公告)号:GB2508214A
公开(公告)日:2014-05-28
申请号:GB201221204
申请日:2012-11-26
Applicant: IBM
Inventor: WOLAFKA RAINER , DIETZ MATHIAS , ROHWEDDER MARKUS
IPC: G06F3/06
Abstract: A network attached storage device stores files and directories. In addition to data files, special files exist within the file system. Accesses to the special files cause the device to execute management functions. Some management functions may apply to the device itself. Other functions may apply to objects stored on the device. The special files may be identified by their extension. There may be a special file in the root of a file system or in every directory. The special file may contain a list of available management functions, a list of file properties or a list of active management functions. The list of active functions may give the status, progress or result of the active functions. A write to the file may invoke one of the functions.
-
公开(公告)号:GB2506622A
公开(公告)日:2014-04-09
申请号:GB201217732
申请日:2012-10-04
Applicant: IBM
Inventor: SCHAEFER ROLF , STRAUS RUBEN , DIETZ MATHIAS , AKELBEIN JENS-PETER , HAUSTEIN NILS
IPC: G06F21/56
Abstract: An anti-virus data management method comprises, receiving an instruction to write data to storage 231; examining the data for malicious content (such as malware and viruses) using a malicious content scanner 220; wherein, if no malicious content is found, writing the data and linking/associating a signature representing the version of the malicious content scanner with the data. A further method comprises, receiving an instruction to read data (identified by a data identified) from storage, the first data linked with a malicious content scanner version signature; determining the version signature of the current malicious content scanner; and examining the data for malicious content if the signatures do not match. These methods may be used in a backup system 200/230 that preserves old copies of data, and may be used in conjunction with a backup scheme where certain copies are deleted. If examining of data reveals malicious content, then an older copy may be identified (using the data identifier) and examined unless it has already been scanned using the current malicious content scanner.
-