Abstract:
PROBLEM TO BE SOLVED: To provide a technique for scanning viruses and other malicious or unwanted content. SOLUTION: This method includes steps of: receiving a request for an object stored at a server; determining whether to cause a cluster device to perform operations to data relevant to the object according to the request; causing the cluster device to execute operations including permitting the cluster device to access to the object in order to make the cluster device execute the operations by the server when the object is locked by other user; receiving operation results from the cluster device; and permitting the user to access to the object based on the operation results. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method and a system for virus scanning of specialized computing devices. SOLUTION: A filer (130) is connected to one or more supplementary computing devices (140) that scan requested files to ensure whether they are virus free prior to delivery to end users. When an end user (111) requests a file, the following steps occur: the server judges whether the file requested must be scanned before delivery to the end user; the filer opens a channel to one (141) of external computing devices and sends a filename (203); the external computing device opens the file (205) and scans it (207); the external computing device notifies the filer of a status of the file scan operation (209); and the filer sends the file to the end user (211) provided the status indicates it may do so. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
The invention provides a method and system for enforcing file access control among client devices using multiple diverse access control models and multiple diverse file server protocols. A multi-protocol file server identifies each file with one particular access control model out of a plurality of possible models, and enforces that one particular model for all accesses to that file. When the file server receives a file server request for that file using a different access control model, the file server translates the access control limits for that file into no-less-restrictive limits in the different model. The file server restricts access by the client device using the translated access control limits. Each file is assigned the access control model of the user who created the file or who last set access control limits for the file. When a user having a different access control model sets access control limits, the access control model for the file is changed to the new model. Files are organized in a tree hierarchy, in which each tree is limited to one or more access control models (which can limit the ability of users to set access control limits for files in that tree). Each tree can be limited to NT-model-only format, Unix-model-only format, or mixed NT-or-Unix-models format.
Abstract:
The invention provides a method and system for enforcing file access control among client devices using multiple diverse access control models and multiple diverse file server protocols. A multi-protocol file server identifies each file with one particular access control model out of a plurality of possible models, and enforces that one particular model for all accesses to that file. When the file server receives a file server request for that file using a different access control model, the file server translates the access control limits for that file into no-less-restrictive limits in the different model. The file server restricts access by the client device using the translated access control limits. Each file is assigned the access control model of the user who created the file or who last set access control limits for the file. When a user having a different access control model sets access control limits, the access control model for the file is changed to the new model. Files are organized in a tree hierarchy, in which each tree is limited to one or more access control models (which can limit the ability of users to set access control limits for files in that tree). Each tree can be limited to NT-model-only format, Unix-model-only format, or mixed NT-or-Unix-models format.
Abstract:
The invention provides a method and system for enforcing file access control among client devices using multiple diverse access control models and multiple diverse file server protocols. A multi-protocol file server identifies each file with one particular access control model out of a plurality of possible models, and enforces that one particular model for all accesses to that file. When the file server receives a file server request for that file using a different access control model, the file server translates the access control limits for that file into no-less-restrictive limits in the different model. The file server restricts access by the client device using the translated access control limits. Each file is assigned the access control model of the user who created the file or who last set access control limits for the file. When a user having a different access control model sets access control limits, the access control model for the file is changed to the new model. Files are organized in a tree hierarchy, in which each tree is limited to one or more access control models (which can limit the ability of users to set access control limits for files in that tree). Each tree can be limited to NTmodel-only format, Unix-model-only format, or mixed NT-or-Unix-models format.
Abstract:
The invention provides a method and system for scanning specialized computing devices for viruses. In a preferred embodiment, a filer 130 is connected to one or more supplementary computing devices 140 that scan requested files to ensure they are virus free prior to delivery to end users. When an end user 111 requests a file the following steps occur: First, the filer determines whether the file requested must be scanned before delivery to the end user. Second, the filer opens a channel to one 141 of the external computing devices and sends 203 the filename. Third, the external computing device opens 205 the file and scans 207 it. Fourth, the external computing device notifies the filer the results of the file scan operation. Fifth, the filer sends 211 the file to the end user provided the status indicates it may do so.
Abstract:
The invention provides a file server that provides for backup and restore of files in a heterogeneous file server environment. Metadata associated with each file by each model or protocol is preserved across backup and restore operations. The file server performs at least three tasks as part of the backup and restore operations. The file server notes all file attributes associated with each file in either model. These file attributes can include Unix perms, ownership and timestamp information, and link information. On backup, the file server records those file attributes in an analogous record using a different model. The file server records each element of Unix metadata as an NT Extended Attribute for use by an NT backup element. On restore, the file server restores those file attributes from the analogous record. The NT Extended Attributes provided by an NT restore element are translated into Unix metadata. The file server provides an element for translating between Unix metadata and NT Extended Attributes transparently tothe NT backup and restore elements, so that NT backup and restore elements that were created without reference to the heterogeneous file server environment can be used.
Abstract:
The invention provides a method and system for performing specialized services for files (133) at a server (130), such as scanning files for viruses. A filer (130) or other server (130) is connected to one or more supplementary computing devices (141) that scan requested files (133) to ensure they are virus free prior to delivery to end users. When an end user requests a file (133) the following steps occur: The server (130) determines whether the file (133) requested must be scanned before delivery to the end user (111). The server (130) opens a channel (135) to one of the external computing devices (141) and sends the filename. The external computing device (141) opens the file and scans it. The external computing device (141) notifies the filer (130) the results of the file scan operation. The server (130) sends the file to the end user (111) provided the status indicates it may do so.