US20040010732A1 - Backup method and storage control device using the same - Google Patents

Backup method and storage control device using the same Download PDF

Info

Publication number
US20040010732A1
US20040010732A1 US10356162 US35616203A US20040010732A1 US 20040010732 A1 US20040010732 A1 US 20040010732A1 US 10356162 US10356162 US 10356162 US 35616203 A US35616203 A US 35616203A US 20040010732 A1 US20040010732 A1 US 20040010732A1
Authority
US
Grant status
Application
Patent type
Prior art keywords
volume
backup
device
storage
copy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10356162
Inventor
Nobuyuki Oka
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Ltd
Original Assignee
Hitachi Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1456Hardware arrangements for backup
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2053Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
    • G06F11/2056Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring

Abstract

The present invention provides a backup method for a storage control device that instructs a storage device to split a primary volume and a copy volume in the storage device, and to execute a backup operation from the copy volume to a backup volume. The storage device includes the backup volume for the copy volume. The backup method includes: the storage control device allocating a specified number of generations of the backup volume in the storage device for the copy volume; instructing the storage device to split the pair; executing a virus check on the copy volume; copying contents of the copy volume to the backup volume as a most recent generation backup if no virus is detected; updating generations in the backup volume for generations prior to the most recent generation; and instructing the storage device to re-link the split pair.

Description

    BACKGROUND OF THE INVENTION
  • [0001]
    The present invention relates to a backup method and a storage control device using the same. In recent years, with extended service hours provided by ATMs and the growth of various on-line services such as Internet banking, there has been a demand for corporate information systems to operate 24 hours a day, 365 days a year. As a result, backups and virus checks of data stored in storage devices, e.g., hard disks, are important in these information systems due to the possibility of unexpected system interruptions such as hardware malfunctions or virus infections.
  • [0002]
    An example of a technology relating to backups and virus checking is described in Japanese laid-open patent publication number Hei 11-134234. Therein, a backup device determines the consistency of the source file for the backup copy by using a means such as virus checking. If the files are found to be consistent, a backup copy is generated from the original file. The technology disclosed in this publication prevents situations where a restored backup copy of an original file cannot be used because the original file was damaged or infected with a virus. As a result, unexpected system interruptions are avoided.
  • BRIEF SUMMARY OF THE INVENTION
  • [0003]
    However, in the backup device described above, backups are not performed while a higher-level device such as a host computer accesses a storage device, such as a hard disk, containing the source file. This is because higher-level devices cannot access a storage device while the storage control device is executing a backup routine. This makes it impossible to provide 24-hour/365-day non-stop services of the type described above.
  • [0004]
    Moreover, since new strains and sub-strains of computer viruses emerge daily, continuously monitoring for computer viruses using up-to-date virus checkers is essential. However, with the backup device described above, virus checking is performed only during a backup operation. The virus checking does not reflect up-to-date virus information, and the data that was backed up may be infected with these new strains or sub-strains of computer viruses.
  • [0005]
    In recent years, RAID (Redundant Array of Independent Discs) disk devices equipped with MRCF (Multiple RAID Coupling Feature) control functions have been proposed. MRCF is a feature that generates copy volumes that can be used independently without intervention from host software. When using RAID disk devices with MRCF control functions, a storage control device generates a copy volume that is paired with a specific logical volume (primary volume). The primary volume and the copy volume can be used independently so that normal online tasks can be continued with the primary volume while a parallel task, e.g., a backup operation, is carried out on the copy volume.
  • [0006]
    However, the proposed backup methods that use MRCF control features do not check for viruses during the backup operation. Thus, a virus check must be performed after a backup operation to prevent the backed up data from being rendered useless due to virus infection, as described above. This leads to an increased processing load on the storage control device since both backups and virus checks require I/O operations between the storage control device and the storage device. Although conventional backup methods that use MRCF control features allow files to be restored to their state from the previous backup, they do not allow restoration of files to the state they had at an arbitrary point in time in the past. This created inconvenient operations.
  • [0007]
    This invention provides a superior backup method that reduces the processing load, as well as a storage control device that uses an embodiment of the method of the invention. The present invention overcomes the problems described above by providing a backup method for a storage control device that instructs the storage device to split a pair of volumes consisting of a primary volume and a copy volume, then executes a backup operation from the copy volume of the split pair to a backup volume. The storage device includes the pair consisting of the primary volume and the copy volume and the backup volume for the copy volume.
  • [0008]
    A preferred method for performing the backup includes: having the storage control device allocate a specified number of generations of the backup volume in the storage device for the copy volume; instructing the storage device to split the pair of volumes; executing a virus check on the copy volume of the pair; copying the contents of the checked copy volume to the backup volume as a most recent generation backup for the copy volume if no virus is detected by the virus check; updating the generations in the backup volume for generations prior to the most recent generation; and instructing the storage device to re-link the split pair.
  • [0009]
    Other characteristics of the present invention will be more clear using the attached figures and the descriptions in this specification.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • [0010]
    [0010]FIG. 1 is a block diagram of the architecture of a storage system including a storage control device.
  • [0011]
    [0011]FIG. 2 illustrates a backup operation performed by a RAID disk device with an MRCF control function.
  • [0012]
    [0012]FIG. 3 illustrates the software architecture of a storage control device.
  • [0013]
    [0013]FIG. 4 illustrates the management of volume generation in a storage control device.
  • [0014]
    [0014]FIG. 5 is a flowchart illustrating a process in a backup method.
  • [0015]
    [0015]FIG. 6 is a flowchart illustrating another process in a backup method.
  • [0016]
    [0016]FIG. 7 is a flowchart illustrating a further process in a backup method.
  • [0017]
    [0017]FIG. 8 is a flowchart illustrating a still further process in a backup method.
  • DETAILED DESCRIPTION OF THE INVENTION
  • [0018]
    In one embodiment, the present invention provides a backup method for a storage control device that instructs a storage device to split a pair of volumes consisting of a primary volume and a copy volume and to execute a backup operation from the copy volume of the split pair to a backup volume. The storage device includes the pair consisting of the primary volume and the copy volume and the backup volume for the copy volume. The backup method of the storage control device includes: a step in which the storage control device allocates a specified number of generations of the backup volume in the storage device for the copy volume; instructing the storage device to split the volume pair and to execute a virus check on the copy volume of the pair; copying the contents of the checked copy volume to the backup volume as the most recent generation backup of the copy volume if no virus is detected by the virus check; updating the generations in the backup volume for generations subsequent to the most recent generation; and instructing the storage device to re-link the split pair.
  • [0019]
    In a further embodiment, the present invention provides a backup method wherein the backup method is activated in response to a previously set schedule or an instruction from a user. The invention also provides a backup method wherein a copy volume in which virus checking detection of a virus has been restored because a backup volume is storing a copy volume backup from one generation earlier.
  • [0020]
    According to another aspect, the present invention provides a backup method wherein: an up-to-date virus check is performed on each of the backup volumes containing backup generations for a copy volume on which a virus was detected by the virus check; a search is made, starting from one generation earlier and working backwards, for a backup volume for the copy volume in which the virus is detected in which a virus was not detected by an up-to-date virus check; and the backup volume retrieved by the search is used to restore the copy volume in which the virus was detected.
  • [0021]
    The present invention provides a backup method wherein a determination is made, based on previously set conditions or a user instruction, as to whether a predetermined restore operation is to be executed for a copy volume in which the virus check detected a virus; and the pair for the copy volume in which the virus was detected is eliminated if the determination indicates that the predetermined restore operation is not to be executed.
  • [0022]
    [0022]FIG. 1 is a simplified drawing of the architecture of a storage system including a storage control device according to the present invention. As shown in the figure, this storage system includes: a storage control device 101 characteristic of the present invention; a storage device 102; an open system 106 primarily serving as a client to storage control device 101 and including different types of hardware and operating systems; and a mainframe 107 serving primarily as a server to storage control device 101. Open system 106 and mainframe 107 are connected to storage control device 101 through a communication network 108 as well as through interface devices such as SCSI devices and fiber channels (not shown). An administration terminal 110 of an administrative operator 109, who monitors/administers storage control device 101, is connected to communication network 108 or to storage control device 101 itself.
  • [0023]
    Storage control device 101 can be, for example, an NAS (Network Attached Storage) server or a disk array controller in a SAN (Storage Area Network) environment, and controls the input and output of data between storage device 102 and external devices. Storage control device 101 includes elements (not shown in the figure) that are standard in conventional hardware for storage control devices 101: a CPU; input/output interfaces for storage device 102 and external devices; main memory; and control circuitry. Storage control device 101 can be part of the same device as storage device 102 or can be a separate device.
  • [0024]
    Storage device 102 can include a RAID disk device 103, a cartridge-type or open-reel magnetic tape storage device 105, or the like. RAID disk device 103 includes a RAID engine with a MRCF control function 104 as described above. A RAID disk device with no MRCF control function 104 or a disk array device with no RAID engine can also be included. Communication network 108 can be a LAN, WAN, intranet, the Internet, or the like.
  • [0025]
    Conventional Backup Method Using MRCF Control Function
  • [0026]
    [0026]FIG. 2 is a drawing for the purpose of describing a conventional backup process in RAID disk device 103 equipped with MRCF control function 104. In the following description, a storage system includes: RAID disk device 103, with MRCF control function 104; an open system 106 or a mainframe 107 providing processing for online tasks (hereinafter referred to as the online task device); and an open system 106 or a mainframe 107 providing processing for batch tasks such as backups (hereinafter referred to as the batch task device). The online task device and the batch task device operate in parallel.
  • [0027]
    First, a summary of MRCF control function 104 is explained. MRCF control function 104 generates a copy volume 112 of a primary volume 111 for online tasks in RAID disk device 103. Copy volume 112 is generated in RAID disk device 103 without going through server software and can be used independently. If primary volume 111 and copy volume 112, which form a pair, are kept in a state that allows them to be used independently (split state), the contents of the primary volume and the copy volume can become different. Therefore, when batch tasks for copy volume 112 are completed, a differential copy is performed between the volumes and primary volume 111 and copy volume 112, which form a pair, are put in a linked state (duplex state) (this operation is referred to as a pair linking operation). In the duplex state, an I/O operation from the online task device to primary volume 111 leads to the same I/O operation being performed on copy volume 112 in the RAID disk device 103. To move from the duplex state to the split state, differential copying is performed on copy volume 112 based on the updated contents of primary volume 111, and the primary volume and the copy volume, which form a pair, are split (this operation is referred to as a pair splitting operation).
  • [0028]
    Next, a backup operation that uses MRCF control function 104 in a RAID disk device 103 equipped with the MRCF control function is described. First, a device (not shown in the figure) controlling RAID disk device 103 sends a request to MRCF control function 104, and a batch task copy volume 112 is newly allocated to form a pair with online task primary volume 111 ((1) in the figure). Copy volume 112 contains copies of the contents of the primary volume 111 ((2) in the figure). The online task device begins accessing the primary volume 111 and continuously performs online tasks ((3) in the figure).
  • [0029]
    At this point, when the batch task device sends a request to make a backup of copy volume 112, RAID disk device 103 performs pair splitting through MRCF control function 104 so that a split state is enabled ((4) in the figure). Then, in this split state, a backup of the copy volume is started ((5) in the figure). After the backup operation is completed, RAID disk device 103 uses MRCF control function 104 to perform pair linking, enabling the duplex state. After this pair-linking operation, an operation is performed to make the contents of the primary volume 111 and the copy volume 112 consistent.
  • [0030]
    Software Architecture
  • [0031]
    [0031]FIG. 3 shows a simplified drawing of the software architecture in storage control device 101 of the present invention. The software of storage control device 101 consists essentially of a management utility 113 and a storage control operating system 114 for managing hardware and software resources of storage control device 101, including management utility 113.
  • [0032]
    This figure shows one or a plurality of disk caches 132 used as temporary data storage regions when the data from the backup source volume is being copied to the backup destination volume. The disk cache 132 can be set up in the address space of the main memory of control device 101 or in separate memory. Alternatively, a workspace disk or magnetic tape storage device 105 of the storage device 103 can be used.
  • [0033]
    The management utility 113 essentially consists of a backup/restore processing module 115; a virus checking processing module 121; a volume management processing module 127; and management set-up modules 120, 126, 131 storing management information for processing modules 115, 121, and 127. Management information for processing modules 115, 121, 127 can also be stored in a single management information set-up module.
  • [0034]
    Next, the features of processing modules 115, 121, 127 of management utility 113 are described. Backup/restore processing module 115 includes an execution schedule management module 116, a generation/backup/restore target management module 117, an execution results log management/message output module 118, and a processing query/automatic response management module 119.
  • [0035]
    Execution schedule management module 116 manages scheduling information such as dates and times for backup operations and volumes/filenames to be backed up. Backup operations are started based on this scheduling information. The scheduling information can be retrieved from open system 106, mainframe 107, administration terminal 109 (hereinafter these will be collectively referred to as external devices), or the like. The retrieved scheduling information is stored in management information settings module 120. Other than starting backups based on scheduling information as described above, backup operations can be started by execution schedule management module 116 when a request is received to start a backup operation from an external device.
  • [0036]
    Generation/backup/restore target management module 117 manages generational information for backup volumes and generation management information, including backup source/destination volume information. This generation management information is stored in management information set-up module 120. In addition, settings are made regarding whether or not to restore volumes or files that have remained unchanged through specific generations.
  • [0037]
    The execution results log management/message output module 118 generates execution results logs containing information such as dates and times at which backup/restore operations took place. This results log is stored in management information set-up module 120. Execution results log management/message output module 118 also outputs messages indicating the status of backup/restore operations.
  • [0038]
    If an error takes place during a backup/restore operation, processing query/automatic response management module 119 outputs a message describing the error to an external device and issues a query about how to handle the error. Alternatively, methods and information regarding how to handle expected errors can be stored ahead of time, and when an error occurs the processing query/automatic response management module 119 can lookup the corresponding information and automatically respond to the error.
  • [0039]
    Next, the virus checking processing module 121 is described. Virus checking processing module 121 includes a virus definition management module, an infected files/volume management module 123, an execution results log management/message output module 124, and a processing query/automatic response management module 125.
  • [0040]
    Virus definition management module 122 manages virus definition information, including virus definition files used during virus checking and version information thereof, the date of the most recent update, and the like. The virus definition information is retrieved from an external device and stored in management information set-up module 126.
  • [0041]
    Virus definition management module 122 keeps track of whether the virus definition files are the most recent ones and updates virus definition files. This type of updating is performed based on scheduling information for virus definition files (herein virus definition update scheduling information) stored in management information set-up module 126. When virus definition files are updated to the most recent versions, virus definition management module 122 performs virus checks on existing backup volumes based on the virus definition update scheduling information regardless of whether there is scheduling information for backups. Virus definition update scheduling information can be included in backup scheduling information stored in management information set-up module 120.
  • [0042]
    If a virus is detected as a result of a virus check based on virus definition update scheduling information, information looked up or updated from the generation/backup/restore target management module 117 is used to perform a restore while the system is in a degraded operating state in which an attribute indicating unavailability is applied to primary volume 111 and copy volume 112. Alternatively, the system can be stopped.
  • [0043]
    Infected files/volume management module 123 manages infection management information, including presence of files and volumes infected by a virus, the type of infecting virus, the date and time at which virus infection was confirmed, and the like. This infection management information can be retrieved by extracting the corresponding information from the execution results logs generated during virus checks. Retrieved infection management information is stored in the management information set-up module 126.
  • [0044]
    Execution results log management/output module 124 and processing query/automatic response management module 125 perform operations analogous to execution results log management/output module 118 and processing query/automatic response management module 119 of backup/restore processing module 115, with the target for these operations being virus checking operations.
  • [0045]
    Next, volume management processing module 127 is described. Volume management processing module 127 includes: a volume creation/removal/modification processing module 128, a volume usage/malfunction status management module 129, and a log management module 130.
  • [0046]
    When a backup volume on which generation management is being performed needs to be copied or modified, volume creation/removal/modification processing module 128 uses volume usage status information and the like stored in management information set-up module 131 to create/remove/modify a volume in the backup volumes. The log information generated when volume creation/removal/modification processing module 128 performs various operations is managed by log management module 130. The volume usage/malfunction status management module 129 manages current usage status information for backup source/destination volumes and past malfunction status information.
  • [0047]
    Backup Method
  • [0048]
    A backup method using storage control device 101 according to the present invention is now described using the flowcharts in FIG. 5 and FIG. 6, which illustrate the operations of storage control device 101. First, FIG. 5 shows a flowchart illustrating backup/schedule management operations performed by storage control device 101 according to the present invention. As shown in the figure, storage control device 101 receives a backup request, including the volume/filename to be backed up, the time at which to begin the backup, and the like, from an external device acting as a backup request source (S500). Execution schedule management module 116 stores scheduling information associated with the received content in management information set-up module 120 (S501). Generation/backup/restore target management module 117 and infected file/volume management module 123 are used to update various management information other than scheduling information (generation management information, infection management information, and the like) (S502).
  • [0049]
    In this manner, storage control device 101 can be used to execute backups manually based on requests from external devices as well as to perform automatic backups based on scheduling information set up ahead of time. This improves the ease of performing backup operations for the user of storage control device 101.
  • [0050]
    Next, FIG. 6 shows a flowchart illustrating the backup operations performed by storage control device 101 according to the present invention. First, storage control device 101 uses MRCF control function 104 of RAID disk device 103 to generate a pair from primary volume 111 and copy volume 112 in a state that can be used independently (split state). The contents of primary volume 111 are copied to copy volume 112. Differential copies between the primary volume 111 and the copy volume 112 are made periodically while duplex operation is enabled.
  • [0051]
    When a backup operation is to be started based on a request from an external device or scheduling information set up ahead of time, storage control device 101 uses MRCF control function 104 of RAID disk device 103 to split the copy volume and the primary volume pair to be backed up, enabling the split state (S601). Then, in this split state, the backup of the copy volume is begun (S602). At this point, the contents of disk cache 132 used as temporary backup data storage can be cleared, but in the description below the contents of the disk cache are overwritten.
  • [0052]
    Storage control device 101 uses backup/restore processing module 115 to copy the files stored in copy volume 112 to be backed up to disk cache 132 (S603). Then, virus checking processing module 121 performs a virus check on the files copied to disk cache 132 according to a predetermined file sequence (S604). If no virus is detected, the checked files stored in disk cache 132 are copied to backup volume 133 serving as the storage destination for the most recent generation (n+1-th generation) content of copy volume 111 (S605-S606). These operations are performed on all the files copied to disk cache 132 (S607).
  • [0053]
    When periodic backups are performed over time, the storage region for backup volume 133 will grow daily compared to the volume used for tasks. This can lead to reduced availability of space used by the storage system as a whole to store data, resulting in the inability to create new volumes to be used for tasks. Therefore, an upper limit can be set on the generation of backup volumes 133, and backup/restore operations can be performed for the specified number of generations of backup volumes.
  • [0054]
    Due to factors such as the storage capacity of disk cache 132 being exceeded, it may not be possible for all the files stored in copy volume 112 to be copied all at once to disk cache 132. In such cases, the files can be split up and copied to one or more disk caches 132. Alternatively, steps S602-S607 can be repeated until all the files in copy volume 112 have been copied to disk cache 132.
  • [0055]
    Next, storage control device 101 uses generation/backup/restore target management module 117 to update backup volume 133 so that the contents of copy volume 112 from the oldest generation (first generation) to the most recent generation (nth generation) are updated to indicate one prior generation (S608). Processing modules 115, 121, 127 update management information (generation management information, infection management information, volume information, and the like) and generate log information (S609). A message indicating that the backup operation has been completed is output to an external device (S610). MRCF control function 104 of RAID disk device 103 then re-links the split primary volume and the copy volume pair to enable duplex status.
  • [0056]
    In this manner, storage control device 101 can use the MRCF control function of the RAID disk device to make backups and perform virus checks on a copy volume in a split state. Since the backup operation and the virus check is performed over a single machine cycle (I/O operation) between storage control device 101 and RAID disk device 103, the processing load on storage control device 101 can be reduced. Further, since virus checking will always take place during backups, the inability to use restored backup data due to virus infection can be avoided.
  • [0057]
    If, during the virus checking performed on the files copied to disk cache 132, a virus is detected in a file (S605), storage control device 101 halts the backup operation and processing modules 115, 121, 127 generate log information. A warning message is output to the external device to indicate that a virus has been detected. Then, if, based on a pre-set algorithm or an instruction from a user of the external device, the storage system is to continue operating (S613), an unavailability attribute is applied to the copy volume 112 on which the virus was detected as well as to the paired primary volume 111, and these volumes are separated from the storage system. The storage system then continues operating in degraded mode using the other volumes 111, 112 (S614).
  • [0058]
    If the storage system is not to continue operating, storage control device 101 generates a system log or outputs a message to the external device indicating that the system is being halted, and the system is stopped (S615). In this manner, when a virus is detected, storage control device 101 can simply stop the system or the system can continue operating in degraded mode to allow safe, continued operation.
  • [0059]
    Restore Method
  • [0060]
    If the storage system is to continue operations in degraded mode (S614), anti-virus operations, e.g., file restoration, are performed on primary volume 111 and copy volume 112 disconnected from the storage system. FIG. 7 is a flowchart illustrating restore operations performed by storage control device 101 according to the present invention. In the description below, an infected file in copy volume 112 is restored based on the corresponding file in the backup volume holding the contents of the previous generation (nth generation).
  • [0061]
    First, based on a preset algorithm or an instruction from a user at an external device who saw the virus detection message, storage control device 101 determines whether or not to restore the infected file (S701). If the infected file is to be restored, the infected file in copy volume 112 where the infected file was detected is restored based on the corresponding file from the nth generation backup volume 133 in which the content from the previous generation is stored (S702).
  • [0062]
    Virus checking is performed sequentially on all the unchecked files in copy volume 112 where the infected file was detected (S703-S704). If another infected file is detected during this virus check (S705), the infected file is restored using the corresponding file in the nth generation backup volume described above. These operations are repeated until all the files have been checked in copy volume 112 where the infected file was detected. When this is completed, a message is output to the indicated external device that the restore operation has been completed (S706). After completion of the restore operation, the unavailability attribute is removed from primary volume 111 and copy volume 112, which have been disconnected from the storage system, and the storage system can be restored to the status it had before a virus was detected.
  • [0063]
    In this manner, storage control device 101 can guarantee that files stored in the backup volumes 133, on which generational management is performed, have been checked for viruses. Thus, infected files in copy volume 112 can be restored using a simple method involving the corresponding file in backup volume 133 associated with the earliest generation (nth generation).
  • [0064]
    In this restoring process, it is possible that a virus checking operation that was performed in conjunction with a past backup did not reflect the latest virus definition information. Thus, a restore operation performed by storage control device 101 according to the present invention that reflects the latest virus definition information is described using FIG. 4, which illustrates the correspondence between copy volume 112, based on primary volume 111 and backup volume 133, as well as the flowchart shown in FIG. 8.
  • [0065]
    As shown in FIG. 4, MRCF control function 104 of RAID disk device 103 generates a pair consisting of primary volume 111 and copy volume 112. While this pair is in a split state, a backup to copy volume 112 is made at the same time the primary volume 111 is performing online processing. Generational management is performed on backup volumes 133 holding the contents of the first generation backup to the nth generation backup of the copy volume. The backup volume for the first generation is backup volume 133 containing the earliest generation of copy volume 112, and the nth generation backup volume 133 contains the most recent generation of copy volume 112. The n+1-th generation backup volume 133 is the storage destination for the newest generation backup in the next backup operation. During this backup operation, an infected file is detected in copy volume 112. This copy volume and the paired primary volume are disconnected from the storage system, and the storage system continues to operate in a degraded state (S614).
  • [0066]
    Next, storage control device 101 uses the most recent virus definition information in the virus-checking operation described above (S604) and performs an up-to-date virus check on the files stored in backup volumes 133 for all the generations. Then, going in sequence from the nth generation to the first generation, a search is made for an uninfected file with the contents of the infected file before infection (S802). If such a file (kth generation) is found (S804), a message indicating that an uninfected file has been found is output to the external device and the user is queried as to whether a restore operation is to be executed (S805). Then, if the query result indicates that a restore operation is to be performed, the retrieved file (kth generation) is used to restore the infected file in copy volume 112 (S806-S807). If a large number of infected files is found, the chances are high that the entire volume on which these files are stored is infected, so restoration can be performed by volume rather than file.
  • [0067]
    If the operation described above is not able to find an uninfected file or if a restore operation is not to be performed, system logs are generated and a message is output to the external device indicating that the system is being halted. The storage system is then stopped (S615). The execution of the restore operation can be done by querying the user of the external device and performing the restore operation based on instructions from the user, but it would also be possible to have the restore operation performed automatically by the storage control device 101 based on a preset algorithm.
  • [0068]
    Next, virus checking is performed sequentially on all the files that have not been checked in copy volume 112 in which the infected file was detected (S808-S809). If another infected file is detected during this virus checking (S811), a search is made as described above, going from the nth generation to the first generation, for an uninfected file that would have the contents of the infected file before infection. The infected file is then restored using the retrieved uninfected file. The restore operation in this case can, for the reason described above, be performed on the volume level as well.
  • [0069]
    The operations described above are repeated until virus checking has been performed on all the files in copy volume 112 in which an infected file was detected. Once this operation is completed, a message indicating that the restore operation has been completed is output to the external device (S812). After the restore operation is completed, the unavailability attribute for primary volume 111 and copy volume 112, which have been disconnected from the storage system, is removed and the storage system can be restored to the operation status it had before a virus was detected.
  • [0070]
    If, as shown in FIG. 4, the uninfected file described above spans across multiple generations from the k-th generation backup volume 133 to the first generation backup volume 133, it would be possible in the restore execution query to the user of the external device (S805) to ask which uninfected file from which generation should be restored. Alternatively, the uninfected file from the most recent generation can be restored automatically.
  • [0071]
    Since the copy volume that has been restored as described above is now in an uninfected state, a backup operation is performed on the restored contents as the most recent generation backup (n+1-th generation). In this manner, when storage control device 101 uses the generational backup volumes 133 for restore operations, up-to-date virus checking based on the most recent virus definition information is performed on the files stored in backup volumes 133 for each generation. This prevents damage from infected files in case an infected file that was not detected in a virus check from a prior backup operation is stored in a backup volume. With the backup method of the present invention, the processing load on the storage control device can be reduced and the operation of the device can be improved.

Claims (6)

    What is claimed is:
  1. 1. In a backup method for a storage control device that instructs a storage device to split a pair of volumes consisting of a primary volume and a copy volume thereof in the storage device and executes a backup operation from the copy volume of the split pair to a backup volume, the storage device including the pair consisting of the primary volume and the copy volume thereof and the backup volume for the copy volume, a backup method for a storage control device comprising:
    causing the storage control device allocate a specified number of generations of the backup volume in the storage device for the copy volume;
    instructing the storage device to split the pair:
    executing a virus check on the copy volume of the pair;
    copying contents of the virus checked copy volume to the backup volume as a most recent generation backup for the copy volume if no virus is detected by the virus check;
    updating the generations in the backup volume for generations prior to the most recent generation; and
    instructing the storage device to re-link the split pair.
  2. 2. A backup method as in claim 1 wherein a process according to the backup method is activated in response to at least one of a schedule or an instruction from a user.
  3. 3. A backup method as in claim 1 wherein a copy volume in which the virus checking detected a virus is restored based on a backup volume storing a copy volume backup from one generation prior.
  4. 4. A backup method as in claim 1 wherein:
    an up-to-date virus check is performed on each of the backup volumes containing backup generations for a copy volume on which a virus was detected by the virus check;
    a search is made, starting from one generation prior and working backwards, for a backup volume for the copy volume in which the virus is detected in which a virus is not detected by the up-to-date virus check; and
    a backup volume retrieved by the search is used to restore the copy volume in which the virus was detected.
  5. 5. A backup method as in claim 1 wherein:
    a determination is made, based on at least one of desired conditions or a user instruction, as to whether a predetermined restore operation is to be executed for a copy volume in which the virus check detected a virus; and
    the pair for the copy volume in which the virus was detected is eliminated if the determination indicates that the predetermined restore operation is not to be executed.
  6. 6. In a storage control device that instructs a storage device to split a pair of volumes consisting of a primary volume and a copy volume thereof in the storage device and executes a backup operation from the copy volume of the split pair to a backup volume, the storage device including the pair consisting of the primary volume and the copy volume thereof and the backup volume for the copy volume, a storage device comprising:
    means for allocating a specified number of generations of the backup volumes in the storage device for the copy volume;
    means for instructing the storage device to split the pair and executing a virus check on the copy volume of the pair;
    means for copying contents of the checked copy volume to the backup volume as a most recent generation backup for the copy volume if no virus is detected by the virus check;
    means for updating the generations in the backup volume for generations prior to the most recent generation; and
    means for instructing the storage device to re-link the split pair.
US10356162 2002-07-10 2003-01-31 Backup method and storage control device using the same Abandoned US20040010732A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2002201545A JP2004046435A (en) 2002-07-10 2002-07-10 Backup method and storage controller used for the same
JP2002-201545 2002-07-10

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11485035 US7240241B2 (en) 2002-07-10 2006-07-11 Backup method and storage control device using the same

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11485035 Continuation US7240241B2 (en) 2002-07-10 2006-07-11 Backup method and storage control device using the same

Publications (1)

Publication Number Publication Date
US20040010732A1 true true US20040010732A1 (en) 2004-01-15

Family

ID=30112574

Family Applications (2)

Application Number Title Priority Date Filing Date
US10356162 Abandoned US20040010732A1 (en) 2002-07-10 2003-01-31 Backup method and storage control device using the same
US11485035 Expired - Fee Related US7240241B2 (en) 2002-07-10 2006-07-11 Backup method and storage control device using the same

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11485035 Expired - Fee Related US7240241B2 (en) 2002-07-10 2006-07-11 Backup method and storage control device using the same

Country Status (2)

Country Link
US (2) US20040010732A1 (en)
JP (1) JP2004046435A (en)

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040240297A1 (en) * 2003-05-30 2004-12-02 Kenichi Shimooka Data protecting apparatus and method, and computer system
US20050022056A1 (en) * 2003-05-27 2005-01-27 International Business Machines Corporation Access by distributed computers to a same hardware resource
US20050071590A1 (en) * 2002-11-13 2005-03-31 Hitachi, Ltd. Method of managing generation of backup data and storage control device used therefor
US20050120063A1 (en) * 2003-07-08 2005-06-02 Luke Koestler Automatic regeneration of computer files
US20050223278A1 (en) * 2004-03-25 2005-10-06 Nobuyuki Saika Control system of NAS, backup method, and program therefor
WO2005098633A2 (en) * 2004-03-25 2005-10-20 Arco Computer Products, Llc Hard disk automatic hardware-based scheduled archiving
US20060047929A1 (en) * 2004-09-02 2006-03-02 Hitachi, Ltd. Storage system
US7114046B2 (en) 2003-06-27 2006-09-26 Hitachi, Ltd. Storage system, backup system, and backup method
US20060218439A1 (en) * 2005-03-23 2006-09-28 Microsoft Corporation Threat event-driven backup
US20060236047A1 (en) * 2005-04-18 2006-10-19 Hidehisa Shitomi Method for replicating snapshot volumes between storage systems
WO2007015266A2 (en) * 2005-08-02 2007-02-08 Ajay Madhok System and method of time based hierarchical storage management
WO2007022392A2 (en) 2005-08-16 2007-02-22 Emc Corporation Information protection method and system
US20070113045A1 (en) * 2005-11-16 2007-05-17 Challener David C System and method for tracking changed LBAs on disk drive
US20070158410A1 (en) * 2006-01-12 2007-07-12 Jorge Bustamante Employer notification system
US20070192553A1 (en) * 2006-02-14 2007-08-16 Hitachi, Ltd. Backup apparatus and backup method
US20070255767A1 (en) * 2006-05-01 2007-11-01 Toru Kikuchi Image forming apparatus and information processing apparatus
US7302501B1 (en) 2004-03-31 2007-11-27 Western Digital Technologies, Inc. Peripheral data storage system with multi-state user display
US7302579B1 (en) 2004-03-31 2007-11-27 Western Digital Technologies, Inc. Performing backup operations to peripheral data storage systems
US20080016564A1 (en) * 2005-08-16 2008-01-17 Emc Corporation Information protection method and system
EP1770514A3 (en) * 2005-09-29 2008-01-23 Hitachi, Ltd. Operation Management and virus detection system for a diskless computer
US20080047013A1 (en) * 2005-08-16 2008-02-21 Emc Corporation Method and system for detecting malware
US7346790B1 (en) * 2004-03-31 2008-03-18 Western Digital Technologies, Inc. Remote power cycling of peripheral data storage system
US20080134335A1 (en) * 2006-12-05 2008-06-05 Hitachi, Ltd. Storage system, virus infection spreading prevention method, and virus removal support method
US20080184370A1 (en) * 2007-01-25 2008-07-31 Kabushiki Kaisha Toshiba Image forming apparatus and control method thereof
US7590813B1 (en) * 2004-08-09 2009-09-15 Symantec Corporation Cache scanning system and method
US7788488B2 (en) 2005-10-25 2010-08-31 Hitachi, Ltd. Computer virus check method in a storage system
US7917481B1 (en) 2005-10-31 2011-03-29 Symantec Operating Corporation File-system-independent malicious content detection
US20110082838A1 (en) * 2009-10-07 2011-04-07 F-Secure Oyj Computer security method and apparatus
US20110119764A1 (en) * 2009-11-16 2011-05-19 Wade Gregory L Fingerprint analysis for anti-virus scan
US20120260039A1 (en) * 2011-04-08 2012-10-11 Nti Corporation Method and a removable device for backing up and restoring a host device
US8312548B1 (en) * 2009-04-24 2012-11-13 Network Appliance, Inc. Volume metadata update system for antivirus attributes
US20130006393A1 (en) * 2011-06-29 2013-01-03 Mega Fluid Systems, Inc. Continuous equipment operation in an automated control environment
US8370943B1 (en) 2009-10-28 2013-02-05 Netapp, Inc. Load balancing of scan requests to all antivirus servers in a cluster
US8667591B1 (en) * 2008-06-26 2014-03-04 Emc Corporation Commonality factoring remediation
US8935281B1 (en) 2005-10-31 2015-01-13 Symantec Operating Corporation Optimized content search of files
US9009525B1 (en) 2012-06-07 2015-04-14 Western Digital Technologies, Inc. Methods and systems for NAS device pairing and mirroring
US20150286530A1 (en) * 2014-04-08 2015-10-08 International Business Machines Corporation Recovery of an infected and quarantiled file in a primary storage controller from a secondary storage controller
US9557924B2 (en) 2014-04-08 2017-01-31 International Business Machines Corporation Anti-virus scan via a secondary storage controller that maintains an asynchronous copy of data of a primary storage controller
US20170180394A1 (en) * 2015-12-16 2017-06-22 Carbonite, Inc. Systems and methods for automatic detection of malicious activity via common files

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7506374B2 (en) * 2001-10-31 2009-03-17 Computer Associates Think, Inc. Memory scanning system and method
JP2005165542A (en) * 2003-12-01 2005-06-23 Advanced Application Kk Data backup device, data backup method and program
JP2005292865A (en) 2004-03-31 2005-10-20 Hitachi Ltd Storage system and backup method for storage system
US7461100B2 (en) 2004-05-27 2008-12-02 International Business Machines Corporation Method for fast reverse restore
JP2006072789A (en) 2004-09-03 2006-03-16 Hitachi Ltd Storage system and data management device of the same
JP4620111B2 (en) * 2005-03-10 2011-01-26 日本電信電話株式会社 Network system, access control method to the storage device, the management server, a storage device and a login control method
CN100465978C (en) * 2005-11-16 2009-03-04 白 杰;李 薇;鲁征宇 Method for recovering data damaged by virus program, apparatus and virus clearing method
US7587565B1 (en) 2006-09-28 2009-09-08 Emc Corporation Generating automated and scheduled SAN copy sessions for ISB protocol systems
US7725669B1 (en) * 2006-09-28 2010-05-25 Emc Corporation Backup and restore operations using coherency groups for ISB protocol systems
US7584339B1 (en) 2006-09-28 2009-09-01 Emc Corporation Remote backup and restore operations for ISB protocol systems
JP4956135B2 (en) * 2006-10-16 2012-06-20 株式会社アイ・オー・データ機器 Backup device, backup method, and program
US7921258B1 (en) * 2006-12-14 2011-04-05 Microsoft Corporation Nonvolatile disk cache for data security
US7849354B2 (en) * 2007-06-12 2010-12-07 Microsoft Corporation Gracefully degradable versioned storage systems
JP5028218B2 (en) * 2007-10-30 2012-09-19 株式会社日立製作所 Storage controller, a control method for a storage system and storage control device
US7934262B1 (en) * 2007-12-26 2011-04-26 Emc (Benelux) B.V., S.A.R.L. Methods and apparatus for virus detection using journal data
JP5446167B2 (en) * 2008-08-13 2014-03-19 富士通株式会社 Anti-virus method, computer, and program
WO2010140222A1 (en) * 2009-06-02 2010-12-09 富士通株式会社 Information processing system, management device, and information processing method
JP5290938B2 (en) * 2009-11-18 2013-09-18 富士通株式会社 Copy control apparatus and method
JP4904414B2 (en) * 2010-05-12 2012-03-28 横河レンタ・リース株式会社 Virus inspection system and method
JP5555052B2 (en) * 2010-05-28 2014-07-23 キヤノン株式会社 Information processing apparatus and information processing method
JP5543949B2 (en) * 2011-09-21 2014-07-09 株式会社東芝 Controller and monitor program

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5559991A (en) * 1991-11-04 1996-09-24 Lucent Technologies Inc. Incremental computer file backup using check words
US6205450B1 (en) * 1997-10-31 2001-03-20 Kabushiki Kaisha Toshiba Computer system capable of restarting system using disk image of arbitrary snapshot
US20020095598A1 (en) * 2000-10-31 2002-07-18 Camble Peter Thomas Method of transferring data
US20020133747A1 (en) * 2001-03-13 2002-09-19 Gonen Ravid Method of and apparatus for computer hard disk drive protection and recovery
US20030046605A1 (en) * 2001-09-03 2003-03-06 Farstone Technology Inc. Data protection system and method regarding the same
US20030115414A1 (en) * 2001-12-18 2003-06-19 Kabushiki Kaisha Toshiba Disk array apparatus and data backup method used therein
US20030115432A1 (en) * 2001-12-14 2003-06-19 Biessener Gaston R. Data backup and restoration using dynamic virtual storage
US20030126107A1 (en) * 2001-12-27 2003-07-03 Hitachi, Ltd. Methods and apparatus for backup and restoring systems
US20030135650A1 (en) * 2001-12-26 2003-07-17 Hitachi, Ltd. Backup system
US20040073677A1 (en) * 2000-06-29 2004-04-15 Hitachi, Ltd, Computer system using a storage area network and method of handling data in the computer system
US6732125B1 (en) * 2000-09-08 2004-05-04 Storage Technology Corporation Self archiving log structured volume with intrinsic data protection
US6836830B1 (en) * 1999-06-01 2004-12-28 Hitachi, Ltd. Method of data backup in a computer system and a storage system therefor
US20050108302A1 (en) * 2002-04-11 2005-05-19 Rand David L. Recovery of data on a primary data volume
US6912629B1 (en) * 1999-07-28 2005-06-28 Storage Technology Corporation System and method for restoring data from secondary volume to primary volume in a data storage system
US6922763B2 (en) * 2002-03-29 2005-07-26 Hitachi, Ltd. Method and apparatus for storage system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5212784A (en) * 1990-10-22 1993-05-18 Delphi Data, A Division Of Sparks Industries, Inc. Automated concurrent data backup system
JPH11134234A (en) * 1997-08-26 1999-05-21 Real Technology Kk Backup list method, its controller and recording medium which records backup restoration program and which computer can read
US6205527B1 (en) * 1998-02-24 2001-03-20 Adaptec, Inc. Intelligent backup and restoring system and method for implementing the same
US6532535B1 (en) * 1998-02-24 2003-03-11 Adaptec, Inc. Method for managing primary and secondary storage devices in an intelligent backup and restoring system
US6347375B1 (en) * 1998-07-08 2002-02-12 Ontrack Data International, Inc Apparatus and method for remote virus diagnosis and repair
US6839819B2 (en) * 2001-12-28 2005-01-04 Storage Technology Corporation Data management appliance

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5559991A (en) * 1991-11-04 1996-09-24 Lucent Technologies Inc. Incremental computer file backup using check words
US6205450B1 (en) * 1997-10-31 2001-03-20 Kabushiki Kaisha Toshiba Computer system capable of restarting system using disk image of arbitrary snapshot
US6836830B1 (en) * 1999-06-01 2004-12-28 Hitachi, Ltd. Method of data backup in a computer system and a storage system therefor
US6912629B1 (en) * 1999-07-28 2005-06-28 Storage Technology Corporation System and method for restoring data from secondary volume to primary volume in a data storage system
US20040073677A1 (en) * 2000-06-29 2004-04-15 Hitachi, Ltd, Computer system using a storage area network and method of handling data in the computer system
US6732125B1 (en) * 2000-09-08 2004-05-04 Storage Technology Corporation Self archiving log structured volume with intrinsic data protection
US20020095598A1 (en) * 2000-10-31 2002-07-18 Camble Peter Thomas Method of transferring data
US20020133747A1 (en) * 2001-03-13 2002-09-19 Gonen Ravid Method of and apparatus for computer hard disk drive protection and recovery
US20030046605A1 (en) * 2001-09-03 2003-03-06 Farstone Technology Inc. Data protection system and method regarding the same
US20030115432A1 (en) * 2001-12-14 2003-06-19 Biessener Gaston R. Data backup and restoration using dynamic virtual storage
US20030115414A1 (en) * 2001-12-18 2003-06-19 Kabushiki Kaisha Toshiba Disk array apparatus and data backup method used therein
US20030135650A1 (en) * 2001-12-26 2003-07-17 Hitachi, Ltd. Backup system
US20030126107A1 (en) * 2001-12-27 2003-07-03 Hitachi, Ltd. Methods and apparatus for backup and restoring systems
US6922763B2 (en) * 2002-03-29 2005-07-26 Hitachi, Ltd. Method and apparatus for storage system
US20050108302A1 (en) * 2002-04-11 2005-05-19 Rand David L. Recovery of data on a primary data volume

Cited By (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7017019B2 (en) 2002-11-13 2006-03-21 Hitachi, Ltd. Method of managing generation of backup data and storage control device used therefor
US20050071590A1 (en) * 2002-11-13 2005-03-31 Hitachi, Ltd. Method of managing generation of backup data and storage control device used therefor
US7117329B2 (en) 2002-11-13 2006-10-03 Hitachi, Ltd. Method of managing generation of backup data and storage control device used therefor
US20050022056A1 (en) * 2003-05-27 2005-01-27 International Business Machines Corporation Access by distributed computers to a same hardware resource
US7661026B2 (en) * 2003-05-27 2010-02-09 International Business Machines Corporation Access by distributed computers to a same hardware resource
US20040240297A1 (en) * 2003-05-30 2004-12-02 Kenichi Shimooka Data protecting apparatus and method, and computer system
US7376804B2 (en) 2003-06-27 2008-05-20 Hitachi, Ltd. Storage system, backup system, and backup method
US7114046B2 (en) 2003-06-27 2006-09-26 Hitachi, Ltd. Storage system, backup system, and backup method
US7685174B2 (en) * 2003-07-08 2010-03-23 Seventh Knight Inc. Automatic regeneration of computer files
US20050120063A1 (en) * 2003-07-08 2005-06-02 Luke Koestler Automatic regeneration of computer files
US7100077B2 (en) * 2004-03-25 2006-08-29 Hitachi, Ltd. Control system of NAS, backup method, and program therefor
WO2005098633A2 (en) * 2004-03-25 2005-10-20 Arco Computer Products, Llc Hard disk automatic hardware-based scheduled archiving
US20050223278A1 (en) * 2004-03-25 2005-10-06 Nobuyuki Saika Control system of NAS, backup method, and program therefor
WO2005098633A3 (en) * 2004-03-25 2006-12-21 Arco Comp Products Llc Hard disk automatic hardware-based scheduled archiving
US7302501B1 (en) 2004-03-31 2007-11-27 Western Digital Technologies, Inc. Peripheral data storage system with multi-state user display
US7346790B1 (en) * 2004-03-31 2008-03-18 Western Digital Technologies, Inc. Remote power cycling of peripheral data storage system
US7302579B1 (en) 2004-03-31 2007-11-27 Western Digital Technologies, Inc. Performing backup operations to peripheral data storage systems
US7590813B1 (en) * 2004-08-09 2009-09-15 Symantec Corporation Cache scanning system and method
US20060047929A1 (en) * 2004-09-02 2006-03-02 Hitachi, Ltd. Storage system
US7634625B2 (en) 2004-09-02 2009-12-15 Hitachi, Ltd. Storage system and method for copying volumes by inspection of data security
US20060218439A1 (en) * 2005-03-23 2006-09-28 Microsoft Corporation Threat event-driven backup
US7636872B2 (en) * 2005-03-23 2009-12-22 Microsoft Corporation Threat event-driven backup
US20060236047A1 (en) * 2005-04-18 2006-10-19 Hidehisa Shitomi Method for replicating snapshot volumes between storage systems
US7930498B2 (en) * 2005-04-18 2011-04-19 Hitachi, Ltd. Method for replicating snapshot volumes between storage systems
US7404051B2 (en) * 2005-04-18 2008-07-22 Hitachi, Ltd. Method for replicating snapshot volumes between storage systems
US20080250215A1 (en) * 2005-04-18 2008-10-09 Hitachi, Ltd. Method for replicating snapshot volumes between storage systems
WO2007015266A3 (en) * 2005-08-02 2007-07-12 Ajay Madhok System and method of time based hierarchical storage management
WO2007015266A2 (en) * 2005-08-02 2007-02-08 Ajay Madhok System and method of time based hierarchical storage management
EP1915719A2 (en) * 2005-08-16 2008-04-30 EMC Corporation Information protection method and system
US20080047013A1 (en) * 2005-08-16 2008-02-21 Emc Corporation Method and system for detecting malware
US8468604B2 (en) 2005-08-16 2013-06-18 Emc Corporation Method and system for detecting malware
US20080016564A1 (en) * 2005-08-16 2008-01-17 Emc Corporation Information protection method and system
US8255998B2 (en) * 2005-08-16 2012-08-28 Emc Corporation Information protection method and system
EP1915719A4 (en) * 2005-08-16 2012-06-06 Emc Corp Information protection method and system
WO2007022392A2 (en) 2005-08-16 2007-02-22 Emc Corporation Information protection method and system
EP1770514A3 (en) * 2005-09-29 2008-01-23 Hitachi, Ltd. Operation Management and virus detection system for a diskless computer
US7725940B2 (en) 2005-09-29 2010-05-25 Hitachi, Ltd. Operation management system for a diskless computer
US7788488B2 (en) 2005-10-25 2010-08-31 Hitachi, Ltd. Computer virus check method in a storage system
US7917481B1 (en) 2005-10-31 2011-03-29 Symantec Operating Corporation File-system-independent malicious content detection
US8935281B1 (en) 2005-10-31 2015-01-13 Symantec Operating Corporation Optimized content search of files
US20070113045A1 (en) * 2005-11-16 2007-05-17 Challener David C System and method for tracking changed LBAs on disk drive
US7523319B2 (en) * 2005-11-16 2009-04-21 Lenovo (Singapore) Pte. Ltd. System and method for tracking changed LBAs on disk drive
US20070158410A1 (en) * 2006-01-12 2007-07-12 Jorge Bustamante Employer notification system
US20070192553A1 (en) * 2006-02-14 2007-08-16 Hitachi, Ltd. Backup apparatus and backup method
EP1837765A3 (en) * 2006-02-14 2011-12-14 Hitachi, Ltd. Backup apparatus and backup method
EP1837765A2 (en) * 2006-02-14 2007-09-26 Hitachi, Ltd. Backup apparatus and backup method
US20070255767A1 (en) * 2006-05-01 2007-11-01 Toru Kikuchi Image forming apparatus and information processing apparatus
US8996992B2 (en) * 2006-05-01 2015-03-31 Canon Kabushiki Kaisha Image forming apparatus and information processing apparatus
US7979905B2 (en) 2006-12-05 2011-07-12 Hitachi, Ltd. Storage system, virus infection spreading prevention method, and virus removal support method
US20080134335A1 (en) * 2006-12-05 2008-06-05 Hitachi, Ltd. Storage system, virus infection spreading prevention method, and virus removal support method
US7895658B2 (en) * 2007-01-25 2011-02-22 Kabushiki Kaisha Toshiba Image forming apparatus and control method thereof
US20080184370A1 (en) * 2007-01-25 2008-07-31 Kabushiki Kaisha Toshiba Image forming apparatus and control method thereof
US8863287B1 (en) 2008-06-26 2014-10-14 Emc Corporation Commonality factoring pattern detection
US8667591B1 (en) * 2008-06-26 2014-03-04 Emc Corporation Commonality factoring remediation
US8938806B1 (en) 2008-06-26 2015-01-20 Emc Corporation Partial pattern detection with commonality factoring
US8312548B1 (en) * 2009-04-24 2012-11-13 Network Appliance, Inc. Volume metadata update system for antivirus attributes
US9779267B2 (en) 2009-10-07 2017-10-03 F-Secure Oyj Computer security method and apparatus
US20110082838A1 (en) * 2009-10-07 2011-04-07 F-Secure Oyj Computer security method and apparatus
WO2011042306A1 (en) * 2009-10-07 2011-04-14 F-Secure Corporation Computer security methods and apparatuses
US8370943B1 (en) 2009-10-28 2013-02-05 Netapp, Inc. Load balancing of scan requests to all antivirus servers in a cluster
US9449174B2 (en) 2009-11-16 2016-09-20 Quantum Corporation Fingerprint analysis for anti-virus scan
US20110119764A1 (en) * 2009-11-16 2011-05-19 Wade Gregory L Fingerprint analysis for anti-virus scan
US8893277B2 (en) * 2009-11-16 2014-11-18 Quantum Corporation Fingerprint analysis for anti-virus scan
US20120260039A1 (en) * 2011-04-08 2012-10-11 Nti Corporation Method and a removable device for backing up and restoring a host device
US20130006393A1 (en) * 2011-06-29 2013-01-03 Mega Fluid Systems, Inc. Continuous equipment operation in an automated control environment
US9459619B2 (en) * 2011-06-29 2016-10-04 Mega Fluid Systems, Inc. Continuous equipment operation in an automated control environment
US9009525B1 (en) 2012-06-07 2015-04-14 Western Digital Technologies, Inc. Methods and systems for NAS device pairing and mirroring
US9503436B1 (en) 2012-06-07 2016-11-22 Western Digital Technologies, Inc. Methods and systems for NAS device pairing and mirroring
US9557924B2 (en) 2014-04-08 2017-01-31 International Business Machines Corporation Anti-virus scan via a secondary storage controller that maintains an asynchronous copy of data of a primary storage controller
US20150286530A1 (en) * 2014-04-08 2015-10-08 International Business Machines Corporation Recovery of an infected and quarantiled file in a primary storage controller from a secondary storage controller
US9898374B2 (en) * 2014-04-08 2018-02-20 International Business Machines Corporation Recovery of an infected and quarantined file in a primary storage controller from a secondary storage controller
US20170180394A1 (en) * 2015-12-16 2017-06-22 Carbonite, Inc. Systems and methods for automatic detection of malicious activity via common files
US9935973B2 (en) * 2015-12-16 2018-04-03 Carbonite, Inc. Systems and methods for automatic detection of malicious activity via common files

Also Published As

Publication number Publication date Type
US7240241B2 (en) 2007-07-03 grant
US20060253734A1 (en) 2006-11-09 application
JP2004046435A (en) 2004-02-12 application

Similar Documents

Publication Publication Date Title
US7457822B1 (en) Apparatus and method for hardware-based file system
US5379412A (en) Method and system for dynamic allocation of buffer storage space during backup copying
US7685171B1 (en) Techniques for performing a restoration operation using device scanning
US6366988B1 (en) Systems and methods for electronic data storage management
US7103619B1 (en) System and method for automatic audit data archiving within a remote database backup system
US6397229B1 (en) Storage-controller-managed outboard incremental backup/restore of data
US6101585A (en) Mechanism for incremental backup of on-line files
US5448718A (en) Method and system for time zero backup session security
US7668884B2 (en) Systems and methods for classifying and transferring information in a storage network
US7596713B2 (en) Fast backup storage and fast recovery of data (FBSRD)
US7076685B2 (en) Information replication system mounting partial database replications
US6978282B1 (en) Information replication system having automated replication storage
US7047380B2 (en) System and method for using file system snapshots for online data backup
EP1357465A2 (en) Storage system having virtualized resource
US20060010154A1 (en) Systems and methods for performing storage operations using network attached storage
US7281104B1 (en) System and method for online data migration
US6081875A (en) Apparatus and method for backup of a disk storage system
US5644696A (en) Recovering multi-volume data sets during volume recovery
US20040080558A1 (en) Method and apparatus for monitoring the storage of data in a computer system
US20130227352A1 (en) Log monitoring
US20070006018A1 (en) Creation of a single snapshot using a server job request
US20060230244A1 (en) System and method for performing auxillary storage operations
US6526418B1 (en) Systems and methods for backing up data files
US6161111A (en) System and method for performing file-handling operations in a digital data processing system using an operating system-independent file map
US7017076B2 (en) Apparatus and storage system for controlling acquisition of snapshot

Legal Events

Date Code Title Description
AS Assignment

Owner name: HITACHI, LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OKA, NOBUYUKI;REEL/FRAME:013732/0003

Effective date: 20021125