US20170083630A1 - Method to virtualize large files in a sandbox - Google Patents

Method to virtualize large files in a sandbox Download PDF

Info

Publication number
US20170083630A1
US20170083630A1 US14/860,395 US201514860395A US2017083630A1 US 20170083630 A1 US20170083630 A1 US 20170083630A1 US 201514860395 A US201514860395 A US 201514860395A US 2017083630 A1 US2017083630 A1 US 2017083630A1
Authority
US
United States
Prior art keywords
file
sandbox
bitmap
bit
modified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/860,395
Inventor
Egemen Tas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Comodo Security Solutions Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US14/860,395 priority Critical patent/US20170083630A1/en
Publication of US20170083630A1 publication Critical patent/US20170083630A1/en
Assigned to Comodo Security Solutions, Inc. reassignment Comodo Security Solutions, Inc. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TAS, EGEMEN
Assigned to Comodo Security Solutions, Inc. reassignment Comodo Security Solutions, Inc. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ZHANG, HAIBO
Priority to US16/172,719 priority patent/US11212284B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • G06F17/30914
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/174Redundancy elimination performed by the file system
    • G06F17/30598
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs

Definitions

  • File virtualization is a very important part of sandbox process.
  • Common sandbox methods usually create a shadow file to redirect file access in the sandbox.
  • a sandbox could build a separated environment from existing file system data. All access and operations on file in a sandbox are redirected to shadow files, thus does not change status and content of outside files.
  • Shadow file method has a problem about big and large file virtualization.
  • Existing methods create shadow file once upon write operation happens in sandbox. It copies entire file to redirected location as shadow file. After creating shadow file, all access and modifications are redirected to shadow file. Even a single byte change in a large file results in a copy operation of entire file.
  • the current invention is a method and system to provide improved bitmap access control method of file virtualization for large file in sandbox.
  • the invention method eliminates duplication of data on shadow file and makes virtualization more effective. There is no need to copy an entire file when the file is modified, which is time-consuming and downgrades overall performance of the sandbox. Also, it does not require duplicating file on a disk which wastes a user's disk storage.
  • FIG. 1 is a depiction of general scheme of the invention.
  • FIG. 2 a is a flowchart of one embodiment of the invention where a file is modified.
  • FIG. 2 b is a schematic of the invention where the file is modified.
  • FIG. 3 a is a flowchart of another embodiment of the invention where a call-back routine is written.
  • FIG. 3 b is a schematic of another embodiment of the invention where a call-back routine is written.
  • FIG. 4 is a flowchart of other embodiment of the invention where consistent baseline view of file in sandbox is provided.
  • FIG. 5 is a schematic of the memory and hardware of a computer or handheld device, such as a tablet or smartphone.
  • FIG. 6 is a schematic of an individual user operating a computer or handheld device connected to the internet.
  • the present invention discloses the method of large file Virtualization in sandbox.
  • the new method according to the present invention divides large file into pieces clusters by fixed byte counts, building a mapping relationship between logical view of sandboxed file and physical shadow file on disk.
  • bitmap 8 contains filesize or clustersize bits 14 . Every bit 14 in bitmap 8 represents the redirect relationship of corresponding cluster 16 .
  • Bitmap 8 is flushed to disk 18 as a stream file(ADS) of shadow file 20 periodically and loaded when the file 10 is accessed in sandbox 12 for the first time after reboot.
  • FIGS. 2 a and 2 b show the flowchart and the scheme of the invention where file is modified.
  • step 201 the original file 10 is divided into clusters 16 (a typical cluster size is 4096 bytes).
  • step 202 a bitmap 8 containing filesize/clustersize bits 14 is allocated. If the bit 14 is 0, step 203 , it means the cluster 16 is not modified in sandbox 12 and process running in sandbox 12 should read this cluster 16 from original file 10 . Otherwise, in step 204 , if the bit 14 is 1, it means the cluster 16 has been changed in sandbox 12 and process running in sandbox 12 should read its data 6 from shadow file 20 .
  • FIGS. 3 a and 3 b show the flowchart and the scheme of the invention where a call back routine is written.
  • step 301 sandbox process writes a virtual file 10 .
  • step 302 all modified clusters 16 are calculated and corresponding bits 14 are marked to 1 in bitmap 8 , so that the following read operations will read the modified data 6 from shadow file 20 .
  • All clusters 16 beyond bitmap's size are treated as 1, which means redirected to shadow file 20 , step 303 . In this way, when file 10 is appended in sandbox 12 , the new data 6 is appended without changing bitmap 8 .
  • a consistent baseline view of file 10 in sandbox 12 is provided.
  • the file view should not change after virtualization even if original file 10 has been changed.
  • modifications to original from outside processes are monitored as well.
  • the modified cluster bit 14 is 1 in bitmap.
  • the original file 10 is modified directly without extra process.
  • the modified cluster bit 14 is 0 in bitmap. So in step 405 original data 6 are copied to the shadow file 20 and corresponding bit 14 is set to 1. Therefore sandbox process gets the baseline view data from virtual file 10 , step 406 .
  • FIG. 5 illustrates a system 500 of a computer or device which includes a microprocessor 520 and a memory 540 which are coupled to a processor bus 560 which is coupled to a peripheral bus 600 by circuitry 580 .
  • the bus 600 is communicatively coupled to a disk 620 .
  • the processor bus 560 , the circuitry 580 and the peripheral bus 600 compose a bus system for computing system 500 in various embodiments of the invention.
  • the microprocessor 520 starts disk access commands to access the disk 620 . Commands are passed through the processor bus 560 via the circuitry 580 to the peripheral bus 600 which initiates the disk access commands to the disk 620 .
  • the present system intercepts the disk access commands which are to be passed to the hard disk.
  • FIG. 6 there is a user 1000 of a computer 1010 or handheld device 1012 who accesses an Internet website 1020 with network connections to a server 1050 and database 1040 .
  • the computer 1010 or handheld device is compatible operating systems known in the art, such as Windows, iOS or android devices or android type operating systems.
  • the user 1000 is potentially exposed to many malicious or unsafe applications located on the web or a particular website 1020 due to lack of security and validation with the source, even though the website 1020 itself may be known as reliable and trusted.
  • the website may be an application store or directory which includes other software applications for downloading.
  • the computer 1010 or hand held devices 1012 a or 1012 b each has a processor and a memory coupled with the processor where the memory is configured to provide the processor with executable instructions.
  • a boot disk 1030 is present for initiating an operating system as well for each of the computer 1010 or hand held devices 1012 .
  • the term handheld device includes phones, smart phones, tablets, personal digital assistants, media and game players and the like.
  • the term “query” or “queries” is used in the broadest manner to include requests, polls, calls, summons, queries, and like terms known to those of skill in the art.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

There is provided a method and system with an improved bitmap access control method of file virtualization for large files in sandbox. The process divides a large file to pieces clusters by fixed byte counts, building a mapping relationship between logical view of sandboxed file and physical shadow file on disk. Thus, there is no need to copy an entire file when a file is modified and waste the user's disk storage.

Description

    BACKGROUND
  • File virtualization is a very important part of sandbox process. Common sandbox methods usually create a shadow file to redirect file access in the sandbox. Through the shadow file method, a sandbox could build a separated environment from existing file system data. All access and operations on file in a sandbox are redirected to shadow files, thus does not change status and content of outside files.
  • Though the shadow file method has a problem about big and large file virtualization. Existing methods create shadow file once upon write operation happens in sandbox. It copies entire file to redirected location as shadow file. After creating shadow file, all access and modifications are redirected to shadow file. Even a single byte change in a large file results in a copy operation of entire file.
  • In view of the forgoing, there is a need for a method and system that would provide more effective approach to file virtualization by saving time and disk storage resources.
  • SUMMARY OF THE INVENTION
  • The current invention is a method and system to provide improved bitmap access control method of file virtualization for large file in sandbox.
  • The invention method eliminates duplication of data on shadow file and makes virtualization more effective. There is no need to copy an entire file when the file is modified, which is time-consuming and downgrades overall performance of the sandbox. Also, it does not require duplicating file on a disk which wastes a user's disk storage.
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 is a depiction of general scheme of the invention.
  • FIG. 2a is a flowchart of one embodiment of the invention where a file is modified.
  • FIG. 2b is a schematic of the invention where the file is modified.
  • FIG. 3a is a flowchart of another embodiment of the invention where a call-back routine is written.
  • FIG. 3b is a schematic of another embodiment of the invention where a call-back routine is written.
  • FIG. 4 is a flowchart of other embodiment of the invention where consistent baseline view of file in sandbox is provided.
  • FIG. 5 is a schematic of the memory and hardware of a computer or handheld device, such as a tablet or smartphone.
  • FIG. 6 is a schematic of an individual user operating a computer or handheld device connected to the internet.
  • DETAILED DESCRIPTION
  • The present invention discloses the method of large file Virtualization in sandbox. The new method according to the present invention divides large file into pieces clusters by fixed byte counts, building a mapping relationship between logical view of sandboxed file and physical shadow file on disk.
  • The invention is not restricted to the details of the foregoing embodiments. The invention extends to any novel one, or any novel combination, of the features disclosed in this specification (including any accompanying claims, abstract and drawings), or to any novel one, or any novel combination, of the steps of any method or process so disclosed.
  • In FIG. 1 the sandbox process, running on a computer device 2, is accessing file system 4; the modification of file data 6 is recorded by a bitmap 8, and only modified part of the file 10 is redirected in sandbox 12. Bitmap 8 contains filesize or clustersize bits 14. Every bit 14 in bitmap 8 represents the redirect relationship of corresponding cluster 16. When the bitmap 8 is initially created, all bits 14 are cleared with 0, indicating the file 10 same as the original one. Bitmap 8 is flushed to disk 18 as a stream file(ADS) of shadow file 20 periodically and loaded when the file 10 is accessed in sandbox 12 for the first time after reboot.
  • FIGS. 2a and 2b show the flowchart and the scheme of the invention where file is modified. In step 201 the original file 10 is divided into clusters 16 (a typical cluster size is 4096 bytes). In step 202 a bitmap 8 containing filesize/clustersize bits 14 is allocated. If the bit 14 is 0, step 203, it means the cluster 16 is not modified in sandbox 12 and process running in sandbox 12 should read this cluster 16 from original file 10. Otherwise, in step 204, if the bit 14 is 1, it means the cluster 16 has been changed in sandbox 12 and process running in sandbox 12 should read its data 6 from shadow file 20.
  • FIGS. 3a and 3b show the flowchart and the scheme of the invention where a call back routine is written. In step 301 sandbox process writes a virtual file 10. In step 302 all modified clusters 16 are calculated and corresponding bits 14 are marked to 1 in bitmap 8, so that the following read operations will read the modified data 6 from shadow file 20. All clusters 16 beyond bitmap's size are treated as 1, which means redirected to shadow file 20, step 303. In this way, when file 10 is appended in sandbox 12, the new data 6 is appended without changing bitmap 8.
  • In FIG. 4, a consistent baseline view of file 10 in sandbox 12 is provided. The file view should not change after virtualization even if original file 10 has been changed. In step 401 modifications to original from outside processes are monitored as well. In step 402 the modified cluster bit 14 is 1 in bitmap. Thus in step 403 the original file 10 is modified directly without extra process. In step 404 the modified cluster bit 14 is 0 in bitmap. So in step 405 original data 6 are copied to the shadow file 20 and corresponding bit 14 is set to 1. Therefore sandbox process gets the baseline view data from virtual file 10, step 406.
  • The method of the present invention may be used with computer systems and devices as shown in FIGS. 5 and 6. FIG. 5 illustrates a system 500 of a computer or device which includes a microprocessor 520 and a memory 540 which are coupled to a processor bus 560 which is coupled to a peripheral bus 600 by circuitry 580. The bus 600 is communicatively coupled to a disk 620. It should be understood that any number of additional peripheral devices are communicatively coupled to the peripheral bus 600 in embodiments of the invention. Further, the processor bus 560, the circuitry 580 and the peripheral bus 600 compose a bus system for computing system 500 in various embodiments of the invention. The microprocessor 520 starts disk access commands to access the disk 620. Commands are passed through the processor bus 560 via the circuitry 580 to the peripheral bus 600 which initiates the disk access commands to the disk 620. In various embodiments of the invention, the present system intercepts the disk access commands which are to be passed to the hard disk.
  • As shown generally by FIG. 6, there is a user 1000 of a computer 1010 or handheld device 1012 who accesses an Internet website 1020 with network connections to a server 1050 and database 1040. The computer 1010 or handheld device is compatible operating systems known in the art, such as Windows, iOS or android devices or android type operating systems. The user 1000 is potentially exposed to many malicious or unsafe applications located on the web or a particular website 1020 due to lack of security and validation with the source, even though the website 1020 itself may be known as reliable and trusted. The website may be an application store or directory which includes other software applications for downloading. Those of skill in the art would recognize that the computer 1010 or hand held devices 1012 a or 1012 b each has a processor and a memory coupled with the processor where the memory is configured to provide the processor with executable instructions. A boot disk 1030 is present for initiating an operating system as well for each of the computer 1010 or hand held devices 1012. It should also be noted that as used herein, the term handheld device includes phones, smart phones, tablets, personal digital assistants, media and game players and the like. As used throughout the specifications, the term “query” or “queries” is used in the broadest manner to include requests, polls, calls, summons, queries, and like terms known to those of skill in the art.

Claims (4)

What is claimed is:
1. A method to provide an improved bitmap access control method of file virtualization for a large file in sandbox comprising:
dividing a large file to pieces clusters by fixed byte counts; and
building a mapping relationship between logical view of a sandboxed file and a physical shadow file on disk.
2. The method according to claim 1, where the large file is modified comprising:
Dividing the large file into clusters;
Allocating a bitmap containing filesize/clustersize bits;
Running a process in a sandbox which reads a cluster from original large file if the bit is zero; and
Running a process in a sandbox which reads a cluster from shadow file if the bit is one.
3. The method according to claim 1, where callback routine is written comprising:
Writing a virtual file by the sandbox process;
Calculating modified clusters and marking corresponding bits to 1 in bitmap; and
Treating all clusters beyond bitmap's size as 1.
4. A method according to claim 1, where consistent baseline view of file in sandbox is provided comprising:
Monitoring modifications to original from outside processes;
Defining the modified cluster bit as 1 in bitmap;
Modifying the original file directly without extra process;
Defining the modified cluster bit as 0 in bitmap; and
Copying original data to the shadow file and setting corresponding bit as 1.
US14/860,395 2014-09-22 2015-09-21 Method to virtualize large files in a sandbox Abandoned US20170083630A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US14/860,395 US20170083630A1 (en) 2015-09-21 2015-09-21 Method to virtualize large files in a sandbox
US16/172,719 US11212284B2 (en) 2014-09-22 2018-10-26 Method to virtualize large files in a sandbox

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US14/860,395 US20170083630A1 (en) 2015-09-21 2015-09-21 Method to virtualize large files in a sandbox

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/172,719 Continuation US11212284B2 (en) 2014-09-22 2018-10-26 Method to virtualize large files in a sandbox

Publications (1)

Publication Number Publication Date
US20170083630A1 true US20170083630A1 (en) 2017-03-23

Family

ID=58282907

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/860,395 Abandoned US20170083630A1 (en) 2014-09-22 2015-09-21 Method to virtualize large files in a sandbox
US16/172,719 Active US11212284B2 (en) 2014-09-22 2018-10-26 Method to virtualize large files in a sandbox

Family Applications After (1)

Application Number Title Priority Date Filing Date
US16/172,719 Active US11212284B2 (en) 2014-09-22 2018-10-26 Method to virtualize large files in a sandbox

Country Status (1)

Country Link
US (2) US20170083630A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110135127B (en) * 2019-04-11 2021-04-30 北京亿赛通科技发展有限责任公司 Sandbox-based document distributed baseline system and importing and distributing method

Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5363487A (en) * 1989-08-29 1994-11-08 Microsoft Corporation Method and system for dynamic volume tracking in an installable file system
US5371885A (en) * 1989-08-29 1994-12-06 Microsoft Corporation High performance file system
US5675769A (en) * 1995-02-23 1997-10-07 Powerquest Corporation Method for manipulating disk partitions
US6070174A (en) * 1997-09-30 2000-05-30 Infraworks Corporation Method and apparatus for real-time secure file deletion
US6185575B1 (en) * 1996-09-19 2001-02-06 Powerquest Corporation In-place disk partition canonization and storage optimization
US6418449B1 (en) * 2000-01-06 2002-07-09 Inventec Corporation Method of cloning the file system of a window web operating system by using a bitmap file
US20020131423A1 (en) * 2000-10-26 2002-09-19 Prismedia Networks, Inc. Method and apparatus for real-time parallel delivery of segments of a large payload file
US6477544B1 (en) * 1999-07-16 2002-11-05 Microsoft Corporation Single instance store for file systems
US20030005235A1 (en) * 2001-07-02 2003-01-02 Sun Microsystems, Inc. Computer storage systems
US6594674B1 (en) * 2000-06-27 2003-07-15 Microsoft Corporation System and method for creating multiple files from a single source file
US20040107314A1 (en) * 2002-11-29 2004-06-03 Chang-Soo Kim Apparatus and method for file-level striping
US6957219B1 (en) * 2001-11-15 2005-10-18 Microsoft Corporation System and method of pipeline data access to remote data
US7058850B2 (en) * 2002-07-31 2006-06-06 Hewlett-Packard Development Company, L.P. Method and system for preventing data loss within disk-array pairs supporting mirrored logical units
US20060288263A1 (en) * 2004-06-15 2006-12-21 Matsushita Electric Industrial Co., Ltd. Drive device
US7206915B2 (en) * 2004-06-03 2007-04-17 Emc Corp Virtual space manager for computer having a physical address extension feature
US20070130232A1 (en) * 2005-11-22 2007-06-07 Therrien David G Method and apparatus for efficiently storing and managing historical versions and replicas of computer data files
US20070294319A1 (en) * 2006-06-08 2007-12-20 Emc Corporation Method and apparatus for processing a database replica
US7320012B2 (en) * 2001-04-12 2008-01-15 Hitachi, Ltd. Method and apparatus for file management
US20090043978A1 (en) * 2007-08-06 2009-02-12 International Business Machines Corporation Efficient hierarchical storage management of a file system with snapshots
US20090077327A1 (en) * 2007-09-18 2009-03-19 Junichi Hara Method and apparatus for enabling a NAS system to utilize thin provisioning
US20090150576A1 (en) * 2007-12-06 2009-06-11 Joaquin Madruga Dynamic logical data channel assignment using channel bitmap
US20100049930A1 (en) * 2008-08-25 2010-02-25 Vmware, Inc. Managing Backups Using Virtual Machines
US20100306270A1 (en) * 2009-05-26 2010-12-02 Microsoft Corporation Generating a local copy of a virtualized application package from a local installation
US7903575B2 (en) * 2006-08-04 2011-03-08 Lg Electronics, Inc. Bandwidth-efficient control and bitmap signaling using super position coding in wireless communication systems
US20120030439A1 (en) * 2010-07-30 2012-02-02 Ibm Corporation Data Sharing for File Clones Using Reverse Ditto References
US20120124306A1 (en) * 2010-11-16 2012-05-17 Actifio, Inc. System and method for performing backup or restore operations utilizing difference information and timeline state information
US8224796B1 (en) * 2009-09-11 2012-07-17 Symantec Corporation Systems and methods for preventing data loss on external devices
US8904081B1 (en) * 2012-05-08 2014-12-02 Vmware, Inc. Composing a virtual disk using application delta disk images
US20150142748A1 (en) * 2013-11-18 2015-05-21 Actifio, Inc. Computerized methods and apparatus for data cloning

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7793266B2 (en) 2007-06-04 2010-09-07 International Business Machines Corporation Method, apparatus and computer program product for optimizing access to the content of a virtual application container on a fixed, read-only medium
US8434093B2 (en) 2008-08-07 2013-04-30 Code Systems Corporation Method and system for virtualization of software applications
US8453145B1 (en) 2010-05-06 2013-05-28 Quest Software, Inc. Systems and methods for instant provisioning of virtual machine files
US8751515B1 (en) 2012-03-30 2014-06-10 Emc Corporation System and method for file-based virtual machine incremental backup

Patent Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5371885A (en) * 1989-08-29 1994-12-06 Microsoft Corporation High performance file system
US5363487A (en) * 1989-08-29 1994-11-08 Microsoft Corporation Method and system for dynamic volume tracking in an installable file system
US5675769A (en) * 1995-02-23 1997-10-07 Powerquest Corporation Method for manipulating disk partitions
US6185575B1 (en) * 1996-09-19 2001-02-06 Powerquest Corporation In-place disk partition canonization and storage optimization
US6070174A (en) * 1997-09-30 2000-05-30 Infraworks Corporation Method and apparatus for real-time secure file deletion
US6477544B1 (en) * 1999-07-16 2002-11-05 Microsoft Corporation Single instance store for file systems
US6418449B1 (en) * 2000-01-06 2002-07-09 Inventec Corporation Method of cloning the file system of a window web operating system by using a bitmap file
US6594674B1 (en) * 2000-06-27 2003-07-15 Microsoft Corporation System and method for creating multiple files from a single source file
US20020131423A1 (en) * 2000-10-26 2002-09-19 Prismedia Networks, Inc. Method and apparatus for real-time parallel delivery of segments of a large payload file
US7320012B2 (en) * 2001-04-12 2008-01-15 Hitachi, Ltd. Method and apparatus for file management
US20030005235A1 (en) * 2001-07-02 2003-01-02 Sun Microsystems, Inc. Computer storage systems
US6957219B1 (en) * 2001-11-15 2005-10-18 Microsoft Corporation System and method of pipeline data access to remote data
US7058850B2 (en) * 2002-07-31 2006-06-06 Hewlett-Packard Development Company, L.P. Method and system for preventing data loss within disk-array pairs supporting mirrored logical units
US20040107314A1 (en) * 2002-11-29 2004-06-03 Chang-Soo Kim Apparatus and method for file-level striping
US7206915B2 (en) * 2004-06-03 2007-04-17 Emc Corp Virtual space manager for computer having a physical address extension feature
US20060288263A1 (en) * 2004-06-15 2006-12-21 Matsushita Electric Industrial Co., Ltd. Drive device
US20070130232A1 (en) * 2005-11-22 2007-06-07 Therrien David G Method and apparatus for efficiently storing and managing historical versions and replicas of computer data files
US20070294319A1 (en) * 2006-06-08 2007-12-20 Emc Corporation Method and apparatus for processing a database replica
US7903575B2 (en) * 2006-08-04 2011-03-08 Lg Electronics, Inc. Bandwidth-efficient control and bitmap signaling using super position coding in wireless communication systems
US20090043978A1 (en) * 2007-08-06 2009-02-12 International Business Machines Corporation Efficient hierarchical storage management of a file system with snapshots
US20090077327A1 (en) * 2007-09-18 2009-03-19 Junichi Hara Method and apparatus for enabling a NAS system to utilize thin provisioning
US20090150576A1 (en) * 2007-12-06 2009-06-11 Joaquin Madruga Dynamic logical data channel assignment using channel bitmap
US20100049930A1 (en) * 2008-08-25 2010-02-25 Vmware, Inc. Managing Backups Using Virtual Machines
US20100306270A1 (en) * 2009-05-26 2010-12-02 Microsoft Corporation Generating a local copy of a virtualized application package from a local installation
US8224796B1 (en) * 2009-09-11 2012-07-17 Symantec Corporation Systems and methods for preventing data loss on external devices
US20120030439A1 (en) * 2010-07-30 2012-02-02 Ibm Corporation Data Sharing for File Clones Using Reverse Ditto References
US20120124306A1 (en) * 2010-11-16 2012-05-17 Actifio, Inc. System and method for performing backup or restore operations utilizing difference information and timeline state information
US8904081B1 (en) * 2012-05-08 2014-12-02 Vmware, Inc. Composing a virtual disk using application delta disk images
US20150142748A1 (en) * 2013-11-18 2015-05-21 Actifio, Inc. Computerized methods and apparatus for data cloning

Also Published As

Publication number Publication date
US11212284B2 (en) 2021-12-28
US20190068601A1 (en) 2019-02-28

Similar Documents

Publication Publication Date Title
US8996468B1 (en) Block status mapping system for reducing virtual machine backup storage
US10691341B2 (en) Method for improving memory system performance in virtual machine systems
US6633968B2 (en) Pre-fetching of pages prior to a hard page fault sequence
US8656386B1 (en) Method to share identical files in a common area for virtual machines having the same operating system version and using a copy on write to place a copy of the shared identical file in a private area of the corresponding virtual machine when a virtual machine attempts to modify the shared identical file
US8966188B1 (en) RAM utilization in a virtual environment
US9311375B1 (en) Systems and methods for compacting a virtual machine file
US11327665B2 (en) Managing data on volumes
KR102185150B1 (en) Generalized write operations verification method
US9547655B1 (en) Filesystem independent snapshot driver
US11328089B2 (en) Built-in legal framework file management
US20210089680A1 (en) Policy driven data movement
TW201941197A (en) Hybrid memory system
US20140082275A1 (en) Server, host and method for reading base image through storage area network
CN113826072B (en) Code update in system management mode
US8549223B1 (en) Systems and methods for reclaiming storage space on striped volumes
US11106813B2 (en) Credentials for consent based file access
US9875184B2 (en) Multi-level snapshot caching
US11409451B2 (en) Systems, methods, and storage media for using the otherwise-unutilized storage space on a storage device
US20160012071A1 (en) Immediate Recovery Of Virtual Machine Using Deduplication Device and Snapshots
US11212284B2 (en) Method to virtualize large files in a sandbox
US9952984B2 (en) Erasing a storage block before writing partial data
CN111373367A (en) Operating system updates
US11169708B1 (en) Zero memory buffer copying in a reliable distributed computing system
US10628317B1 (en) System and method for caching data in a virtual storage environment based on the clustering of related data blocks
US10712952B1 (en) Metadata caches in a reliable distributed computing system

Legal Events

Date Code Title Description
AS Assignment

Owner name: COMODO SECURITY SOLUTIONS, INC., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TAS, EGEMEN;REEL/FRAME:045699/0230

Effective date: 20180405

Owner name: COMODO SECURITY SOLUTIONS, INC., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ZHANG, HAIBO;REEL/FRAME:046070/0570

Effective date: 20180409

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION