US20170083630A1 - Method to virtualize large files in a sandbox - Google Patents
Method to virtualize large files in a sandbox Download PDFInfo
- Publication number
- US20170083630A1 US20170083630A1 US14/860,395 US201514860395A US2017083630A1 US 20170083630 A1 US20170083630 A1 US 20170083630A1 US 201514860395 A US201514860395 A US 201514860395A US 2017083630 A1 US2017083630 A1 US 2017083630A1
- Authority
- US
- United States
- Prior art keywords
- file
- sandbox
- bitmap
- bit
- modified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 244000035744 Hura crepitans Species 0.000 title claims abstract description 28
- 238000013507 mapping Methods 0.000 claims abstract description 3
- 238000012986 modification Methods 0.000 claims description 4
- 230000004048 modification Effects 0.000 claims description 4
- 238000012544 monitoring process Methods 0.000 claims 1
- 239000002699 waste material Substances 0.000 abstract description 2
- 230000002093 peripheral effect Effects 0.000 description 5
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Classifications
-
- G06F17/30914—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/174—Redundancy elimination performed by the file system
-
- G06F17/30598—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
Definitions
- File virtualization is a very important part of sandbox process.
- Common sandbox methods usually create a shadow file to redirect file access in the sandbox.
- a sandbox could build a separated environment from existing file system data. All access and operations on file in a sandbox are redirected to shadow files, thus does not change status and content of outside files.
- Shadow file method has a problem about big and large file virtualization.
- Existing methods create shadow file once upon write operation happens in sandbox. It copies entire file to redirected location as shadow file. After creating shadow file, all access and modifications are redirected to shadow file. Even a single byte change in a large file results in a copy operation of entire file.
- the current invention is a method and system to provide improved bitmap access control method of file virtualization for large file in sandbox.
- the invention method eliminates duplication of data on shadow file and makes virtualization more effective. There is no need to copy an entire file when the file is modified, which is time-consuming and downgrades overall performance of the sandbox. Also, it does not require duplicating file on a disk which wastes a user's disk storage.
- FIG. 1 is a depiction of general scheme of the invention.
- FIG. 2 a is a flowchart of one embodiment of the invention where a file is modified.
- FIG. 2 b is a schematic of the invention where the file is modified.
- FIG. 3 a is a flowchart of another embodiment of the invention where a call-back routine is written.
- FIG. 3 b is a schematic of another embodiment of the invention where a call-back routine is written.
- FIG. 4 is a flowchart of other embodiment of the invention where consistent baseline view of file in sandbox is provided.
- FIG. 5 is a schematic of the memory and hardware of a computer or handheld device, such as a tablet or smartphone.
- FIG. 6 is a schematic of an individual user operating a computer or handheld device connected to the internet.
- the present invention discloses the method of large file Virtualization in sandbox.
- the new method according to the present invention divides large file into pieces clusters by fixed byte counts, building a mapping relationship between logical view of sandboxed file and physical shadow file on disk.
- bitmap 8 contains filesize or clustersize bits 14 . Every bit 14 in bitmap 8 represents the redirect relationship of corresponding cluster 16 .
- Bitmap 8 is flushed to disk 18 as a stream file(ADS) of shadow file 20 periodically and loaded when the file 10 is accessed in sandbox 12 for the first time after reboot.
- FIGS. 2 a and 2 b show the flowchart and the scheme of the invention where file is modified.
- step 201 the original file 10 is divided into clusters 16 (a typical cluster size is 4096 bytes).
- step 202 a bitmap 8 containing filesize/clustersize bits 14 is allocated. If the bit 14 is 0, step 203 , it means the cluster 16 is not modified in sandbox 12 and process running in sandbox 12 should read this cluster 16 from original file 10 . Otherwise, in step 204 , if the bit 14 is 1, it means the cluster 16 has been changed in sandbox 12 and process running in sandbox 12 should read its data 6 from shadow file 20 .
- FIGS. 3 a and 3 b show the flowchart and the scheme of the invention where a call back routine is written.
- step 301 sandbox process writes a virtual file 10 .
- step 302 all modified clusters 16 are calculated and corresponding bits 14 are marked to 1 in bitmap 8 , so that the following read operations will read the modified data 6 from shadow file 20 .
- All clusters 16 beyond bitmap's size are treated as 1, which means redirected to shadow file 20 , step 303 . In this way, when file 10 is appended in sandbox 12 , the new data 6 is appended without changing bitmap 8 .
- a consistent baseline view of file 10 in sandbox 12 is provided.
- the file view should not change after virtualization even if original file 10 has been changed.
- modifications to original from outside processes are monitored as well.
- the modified cluster bit 14 is 1 in bitmap.
- the original file 10 is modified directly without extra process.
- the modified cluster bit 14 is 0 in bitmap. So in step 405 original data 6 are copied to the shadow file 20 and corresponding bit 14 is set to 1. Therefore sandbox process gets the baseline view data from virtual file 10 , step 406 .
- FIG. 5 illustrates a system 500 of a computer or device which includes a microprocessor 520 and a memory 540 which are coupled to a processor bus 560 which is coupled to a peripheral bus 600 by circuitry 580 .
- the bus 600 is communicatively coupled to a disk 620 .
- the processor bus 560 , the circuitry 580 and the peripheral bus 600 compose a bus system for computing system 500 in various embodiments of the invention.
- the microprocessor 520 starts disk access commands to access the disk 620 . Commands are passed through the processor bus 560 via the circuitry 580 to the peripheral bus 600 which initiates the disk access commands to the disk 620 .
- the present system intercepts the disk access commands which are to be passed to the hard disk.
- FIG. 6 there is a user 1000 of a computer 1010 or handheld device 1012 who accesses an Internet website 1020 with network connections to a server 1050 and database 1040 .
- the computer 1010 or handheld device is compatible operating systems known in the art, such as Windows, iOS or android devices or android type operating systems.
- the user 1000 is potentially exposed to many malicious or unsafe applications located on the web or a particular website 1020 due to lack of security and validation with the source, even though the website 1020 itself may be known as reliable and trusted.
- the website may be an application store or directory which includes other software applications for downloading.
- the computer 1010 or hand held devices 1012 a or 1012 b each has a processor and a memory coupled with the processor where the memory is configured to provide the processor with executable instructions.
- a boot disk 1030 is present for initiating an operating system as well for each of the computer 1010 or hand held devices 1012 .
- the term handheld device includes phones, smart phones, tablets, personal digital assistants, media and game players and the like.
- the term “query” or “queries” is used in the broadest manner to include requests, polls, calls, summons, queries, and like terms known to those of skill in the art.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
- File virtualization is a very important part of sandbox process. Common sandbox methods usually create a shadow file to redirect file access in the sandbox. Through the shadow file method, a sandbox could build a separated environment from existing file system data. All access and operations on file in a sandbox are redirected to shadow files, thus does not change status and content of outside files.
- Though the shadow file method has a problem about big and large file virtualization. Existing methods create shadow file once upon write operation happens in sandbox. It copies entire file to redirected location as shadow file. After creating shadow file, all access and modifications are redirected to shadow file. Even a single byte change in a large file results in a copy operation of entire file.
- In view of the forgoing, there is a need for a method and system that would provide more effective approach to file virtualization by saving time and disk storage resources.
- The current invention is a method and system to provide improved bitmap access control method of file virtualization for large file in sandbox.
- The invention method eliminates duplication of data on shadow file and makes virtualization more effective. There is no need to copy an entire file when the file is modified, which is time-consuming and downgrades overall performance of the sandbox. Also, it does not require duplicating file on a disk which wastes a user's disk storage.
-
FIG. 1 is a depiction of general scheme of the invention. -
FIG. 2a is a flowchart of one embodiment of the invention where a file is modified. -
FIG. 2b is a schematic of the invention where the file is modified. -
FIG. 3a is a flowchart of another embodiment of the invention where a call-back routine is written. -
FIG. 3b is a schematic of another embodiment of the invention where a call-back routine is written. -
FIG. 4 is a flowchart of other embodiment of the invention where consistent baseline view of file in sandbox is provided. -
FIG. 5 is a schematic of the memory and hardware of a computer or handheld device, such as a tablet or smartphone. -
FIG. 6 is a schematic of an individual user operating a computer or handheld device connected to the internet. - The present invention discloses the method of large file Virtualization in sandbox. The new method according to the present invention divides large file into pieces clusters by fixed byte counts, building a mapping relationship between logical view of sandboxed file and physical shadow file on disk.
- The invention is not restricted to the details of the foregoing embodiments. The invention extends to any novel one, or any novel combination, of the features disclosed in this specification (including any accompanying claims, abstract and drawings), or to any novel one, or any novel combination, of the steps of any method or process so disclosed.
- In
FIG. 1 the sandbox process, running on acomputer device 2, is accessingfile system 4; the modification of file data 6 is recorded by abitmap 8, and only modified part of thefile 10 is redirected insandbox 12. Bitmap 8 contains filesize orclustersize bits 14. Everybit 14 inbitmap 8 represents the redirect relationship of corresponding cluster 16. When thebitmap 8 is initially created, allbits 14 are cleared with 0, indicating thefile 10 same as the original one. Bitmap 8 is flushed to disk 18 as a stream file(ADS) ofshadow file 20 periodically and loaded when thefile 10 is accessed insandbox 12 for the first time after reboot. -
FIGS. 2a and 2b show the flowchart and the scheme of the invention where file is modified. Instep 201 theoriginal file 10 is divided into clusters 16 (a typical cluster size is 4096 bytes). In step 202 abitmap 8 containing filesize/clustersize bits 14 is allocated. If thebit 14 is 0, step 203, it means the cluster 16 is not modified insandbox 12 and process running insandbox 12 should read this cluster 16 fromoriginal file 10. Otherwise, instep 204, if thebit 14 is 1, it means the cluster 16 has been changed insandbox 12 and process running insandbox 12 should read its data 6 fromshadow file 20. -
FIGS. 3a and 3b show the flowchart and the scheme of the invention where a call back routine is written. Instep 301 sandbox process writes avirtual file 10. In step 302 all modified clusters 16 are calculated andcorresponding bits 14 are marked to 1 inbitmap 8, so that the following read operations will read the modified data 6 fromshadow file 20. All clusters 16 beyond bitmap's size are treated as 1, which means redirected toshadow file 20, step 303. In this way, whenfile 10 is appended insandbox 12, the new data 6 is appended without changingbitmap 8. - In
FIG. 4 , a consistent baseline view offile 10 insandbox 12 is provided. The file view should not change after virtualization even iforiginal file 10 has been changed. Instep 401 modifications to original from outside processes are monitored as well. In step 402 the modifiedcluster bit 14 is 1 in bitmap. Thus instep 403 theoriginal file 10 is modified directly without extra process. In step 404 the modifiedcluster bit 14 is 0 in bitmap. So instep 405 original data 6 are copied to theshadow file 20 andcorresponding bit 14 is set to 1. Therefore sandbox process gets the baseline view data fromvirtual file 10, step 406. - The method of the present invention may be used with computer systems and devices as shown in
FIGS. 5 and 6 .FIG. 5 illustrates asystem 500 of a computer or device which includes amicroprocessor 520 and amemory 540 which are coupled to a processor bus 560 which is coupled to a peripheral bus 600 bycircuitry 580. The bus 600 is communicatively coupled to adisk 620. It should be understood that any number of additional peripheral devices are communicatively coupled to the peripheral bus 600 in embodiments of the invention. Further, the processor bus 560, thecircuitry 580 and the peripheral bus 600 compose a bus system forcomputing system 500 in various embodiments of the invention. Themicroprocessor 520 starts disk access commands to access thedisk 620. Commands are passed through the processor bus 560 via thecircuitry 580 to the peripheral bus 600 which initiates the disk access commands to thedisk 620. In various embodiments of the invention, the present system intercepts the disk access commands which are to be passed to the hard disk. - As shown generally by
FIG. 6 , there is auser 1000 of acomputer 1010 orhandheld device 1012 who accesses anInternet website 1020 with network connections to aserver 1050 anddatabase 1040. Thecomputer 1010 or handheld device is compatible operating systems known in the art, such as Windows, iOS or android devices or android type operating systems. Theuser 1000 is potentially exposed to many malicious or unsafe applications located on the web or aparticular website 1020 due to lack of security and validation with the source, even though thewebsite 1020 itself may be known as reliable and trusted. The website may be an application store or directory which includes other software applications for downloading. Those of skill in the art would recognize that thecomputer 1010 or hand held devices 1012 a or 1012 b each has a processor and a memory coupled with the processor where the memory is configured to provide the processor with executable instructions. Aboot disk 1030 is present for initiating an operating system as well for each of thecomputer 1010 or hand helddevices 1012. It should also be noted that as used herein, the term handheld device includes phones, smart phones, tablets, personal digital assistants, media and game players and the like. As used throughout the specifications, the term “query” or “queries” is used in the broadest manner to include requests, polls, calls, summons, queries, and like terms known to those of skill in the art.
Claims (4)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/860,395 US20170083630A1 (en) | 2015-09-21 | 2015-09-21 | Method to virtualize large files in a sandbox |
US16/172,719 US11212284B2 (en) | 2014-09-22 | 2018-10-26 | Method to virtualize large files in a sandbox |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/860,395 US20170083630A1 (en) | 2015-09-21 | 2015-09-21 | Method to virtualize large files in a sandbox |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/172,719 Continuation US11212284B2 (en) | 2014-09-22 | 2018-10-26 | Method to virtualize large files in a sandbox |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170083630A1 true US20170083630A1 (en) | 2017-03-23 |
Family
ID=58282907
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/860,395 Abandoned US20170083630A1 (en) | 2014-09-22 | 2015-09-21 | Method to virtualize large files in a sandbox |
US16/172,719 Active US11212284B2 (en) | 2014-09-22 | 2018-10-26 | Method to virtualize large files in a sandbox |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/172,719 Active US11212284B2 (en) | 2014-09-22 | 2018-10-26 | Method to virtualize large files in a sandbox |
Country Status (1)
Country | Link |
---|---|
US (2) | US20170083630A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110135127B (en) * | 2019-04-11 | 2021-04-30 | 北京亿赛通科技发展有限责任公司 | Sandbox-based document distributed baseline system and importing and distributing method |
Citations (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5363487A (en) * | 1989-08-29 | 1994-11-08 | Microsoft Corporation | Method and system for dynamic volume tracking in an installable file system |
US5371885A (en) * | 1989-08-29 | 1994-12-06 | Microsoft Corporation | High performance file system |
US5675769A (en) * | 1995-02-23 | 1997-10-07 | Powerquest Corporation | Method for manipulating disk partitions |
US6070174A (en) * | 1997-09-30 | 2000-05-30 | Infraworks Corporation | Method and apparatus for real-time secure file deletion |
US6185575B1 (en) * | 1996-09-19 | 2001-02-06 | Powerquest Corporation | In-place disk partition canonization and storage optimization |
US6418449B1 (en) * | 2000-01-06 | 2002-07-09 | Inventec Corporation | Method of cloning the file system of a window web operating system by using a bitmap file |
US20020131423A1 (en) * | 2000-10-26 | 2002-09-19 | Prismedia Networks, Inc. | Method and apparatus for real-time parallel delivery of segments of a large payload file |
US6477544B1 (en) * | 1999-07-16 | 2002-11-05 | Microsoft Corporation | Single instance store for file systems |
US20030005235A1 (en) * | 2001-07-02 | 2003-01-02 | Sun Microsystems, Inc. | Computer storage systems |
US6594674B1 (en) * | 2000-06-27 | 2003-07-15 | Microsoft Corporation | System and method for creating multiple files from a single source file |
US20040107314A1 (en) * | 2002-11-29 | 2004-06-03 | Chang-Soo Kim | Apparatus and method for file-level striping |
US6957219B1 (en) * | 2001-11-15 | 2005-10-18 | Microsoft Corporation | System and method of pipeline data access to remote data |
US7058850B2 (en) * | 2002-07-31 | 2006-06-06 | Hewlett-Packard Development Company, L.P. | Method and system for preventing data loss within disk-array pairs supporting mirrored logical units |
US20060288263A1 (en) * | 2004-06-15 | 2006-12-21 | Matsushita Electric Industrial Co., Ltd. | Drive device |
US7206915B2 (en) * | 2004-06-03 | 2007-04-17 | Emc Corp | Virtual space manager for computer having a physical address extension feature |
US20070130232A1 (en) * | 2005-11-22 | 2007-06-07 | Therrien David G | Method and apparatus for efficiently storing and managing historical versions and replicas of computer data files |
US20070294319A1 (en) * | 2006-06-08 | 2007-12-20 | Emc Corporation | Method and apparatus for processing a database replica |
US7320012B2 (en) * | 2001-04-12 | 2008-01-15 | Hitachi, Ltd. | Method and apparatus for file management |
US20090043978A1 (en) * | 2007-08-06 | 2009-02-12 | International Business Machines Corporation | Efficient hierarchical storage management of a file system with snapshots |
US20090077327A1 (en) * | 2007-09-18 | 2009-03-19 | Junichi Hara | Method and apparatus for enabling a NAS system to utilize thin provisioning |
US20090150576A1 (en) * | 2007-12-06 | 2009-06-11 | Joaquin Madruga | Dynamic logical data channel assignment using channel bitmap |
US20100049930A1 (en) * | 2008-08-25 | 2010-02-25 | Vmware, Inc. | Managing Backups Using Virtual Machines |
US20100306270A1 (en) * | 2009-05-26 | 2010-12-02 | Microsoft Corporation | Generating a local copy of a virtualized application package from a local installation |
US7903575B2 (en) * | 2006-08-04 | 2011-03-08 | Lg Electronics, Inc. | Bandwidth-efficient control and bitmap signaling using super position coding in wireless communication systems |
US20120030439A1 (en) * | 2010-07-30 | 2012-02-02 | Ibm Corporation | Data Sharing for File Clones Using Reverse Ditto References |
US20120124306A1 (en) * | 2010-11-16 | 2012-05-17 | Actifio, Inc. | System and method for performing backup or restore operations utilizing difference information and timeline state information |
US8224796B1 (en) * | 2009-09-11 | 2012-07-17 | Symantec Corporation | Systems and methods for preventing data loss on external devices |
US8904081B1 (en) * | 2012-05-08 | 2014-12-02 | Vmware, Inc. | Composing a virtual disk using application delta disk images |
US20150142748A1 (en) * | 2013-11-18 | 2015-05-21 | Actifio, Inc. | Computerized methods and apparatus for data cloning |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7793266B2 (en) | 2007-06-04 | 2010-09-07 | International Business Machines Corporation | Method, apparatus and computer program product for optimizing access to the content of a virtual application container on a fixed, read-only medium |
US8434093B2 (en) | 2008-08-07 | 2013-04-30 | Code Systems Corporation | Method and system for virtualization of software applications |
US8453145B1 (en) | 2010-05-06 | 2013-05-28 | Quest Software, Inc. | Systems and methods for instant provisioning of virtual machine files |
US8751515B1 (en) | 2012-03-30 | 2014-06-10 | Emc Corporation | System and method for file-based virtual machine incremental backup |
-
2015
- 2015-09-21 US US14/860,395 patent/US20170083630A1/en not_active Abandoned
-
2018
- 2018-10-26 US US16/172,719 patent/US11212284B2/en active Active
Patent Citations (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5371885A (en) * | 1989-08-29 | 1994-12-06 | Microsoft Corporation | High performance file system |
US5363487A (en) * | 1989-08-29 | 1994-11-08 | Microsoft Corporation | Method and system for dynamic volume tracking in an installable file system |
US5675769A (en) * | 1995-02-23 | 1997-10-07 | Powerquest Corporation | Method for manipulating disk partitions |
US6185575B1 (en) * | 1996-09-19 | 2001-02-06 | Powerquest Corporation | In-place disk partition canonization and storage optimization |
US6070174A (en) * | 1997-09-30 | 2000-05-30 | Infraworks Corporation | Method and apparatus for real-time secure file deletion |
US6477544B1 (en) * | 1999-07-16 | 2002-11-05 | Microsoft Corporation | Single instance store for file systems |
US6418449B1 (en) * | 2000-01-06 | 2002-07-09 | Inventec Corporation | Method of cloning the file system of a window web operating system by using a bitmap file |
US6594674B1 (en) * | 2000-06-27 | 2003-07-15 | Microsoft Corporation | System and method for creating multiple files from a single source file |
US20020131423A1 (en) * | 2000-10-26 | 2002-09-19 | Prismedia Networks, Inc. | Method and apparatus for real-time parallel delivery of segments of a large payload file |
US7320012B2 (en) * | 2001-04-12 | 2008-01-15 | Hitachi, Ltd. | Method and apparatus for file management |
US20030005235A1 (en) * | 2001-07-02 | 2003-01-02 | Sun Microsystems, Inc. | Computer storage systems |
US6957219B1 (en) * | 2001-11-15 | 2005-10-18 | Microsoft Corporation | System and method of pipeline data access to remote data |
US7058850B2 (en) * | 2002-07-31 | 2006-06-06 | Hewlett-Packard Development Company, L.P. | Method and system for preventing data loss within disk-array pairs supporting mirrored logical units |
US20040107314A1 (en) * | 2002-11-29 | 2004-06-03 | Chang-Soo Kim | Apparatus and method for file-level striping |
US7206915B2 (en) * | 2004-06-03 | 2007-04-17 | Emc Corp | Virtual space manager for computer having a physical address extension feature |
US20060288263A1 (en) * | 2004-06-15 | 2006-12-21 | Matsushita Electric Industrial Co., Ltd. | Drive device |
US20070130232A1 (en) * | 2005-11-22 | 2007-06-07 | Therrien David G | Method and apparatus for efficiently storing and managing historical versions and replicas of computer data files |
US20070294319A1 (en) * | 2006-06-08 | 2007-12-20 | Emc Corporation | Method and apparatus for processing a database replica |
US7903575B2 (en) * | 2006-08-04 | 2011-03-08 | Lg Electronics, Inc. | Bandwidth-efficient control and bitmap signaling using super position coding in wireless communication systems |
US20090043978A1 (en) * | 2007-08-06 | 2009-02-12 | International Business Machines Corporation | Efficient hierarchical storage management of a file system with snapshots |
US20090077327A1 (en) * | 2007-09-18 | 2009-03-19 | Junichi Hara | Method and apparatus for enabling a NAS system to utilize thin provisioning |
US20090150576A1 (en) * | 2007-12-06 | 2009-06-11 | Joaquin Madruga | Dynamic logical data channel assignment using channel bitmap |
US20100049930A1 (en) * | 2008-08-25 | 2010-02-25 | Vmware, Inc. | Managing Backups Using Virtual Machines |
US20100306270A1 (en) * | 2009-05-26 | 2010-12-02 | Microsoft Corporation | Generating a local copy of a virtualized application package from a local installation |
US8224796B1 (en) * | 2009-09-11 | 2012-07-17 | Symantec Corporation | Systems and methods for preventing data loss on external devices |
US20120030439A1 (en) * | 2010-07-30 | 2012-02-02 | Ibm Corporation | Data Sharing for File Clones Using Reverse Ditto References |
US20120124306A1 (en) * | 2010-11-16 | 2012-05-17 | Actifio, Inc. | System and method for performing backup or restore operations utilizing difference information and timeline state information |
US8904081B1 (en) * | 2012-05-08 | 2014-12-02 | Vmware, Inc. | Composing a virtual disk using application delta disk images |
US20150142748A1 (en) * | 2013-11-18 | 2015-05-21 | Actifio, Inc. | Computerized methods and apparatus for data cloning |
Also Published As
Publication number | Publication date |
---|---|
US11212284B2 (en) | 2021-12-28 |
US20190068601A1 (en) | 2019-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8996468B1 (en) | Block status mapping system for reducing virtual machine backup storage | |
US10691341B2 (en) | Method for improving memory system performance in virtual machine systems | |
US6633968B2 (en) | Pre-fetching of pages prior to a hard page fault sequence | |
US8656386B1 (en) | Method to share identical files in a common area for virtual machines having the same operating system version and using a copy on write to place a copy of the shared identical file in a private area of the corresponding virtual machine when a virtual machine attempts to modify the shared identical file | |
US8966188B1 (en) | RAM utilization in a virtual environment | |
US9311375B1 (en) | Systems and methods for compacting a virtual machine file | |
US11327665B2 (en) | Managing data on volumes | |
KR102185150B1 (en) | Generalized write operations verification method | |
US9547655B1 (en) | Filesystem independent snapshot driver | |
US11328089B2 (en) | Built-in legal framework file management | |
US20210089680A1 (en) | Policy driven data movement | |
TW201941197A (en) | Hybrid memory system | |
US20140082275A1 (en) | Server, host and method for reading base image through storage area network | |
CN113826072B (en) | Code update in system management mode | |
US8549223B1 (en) | Systems and methods for reclaiming storage space on striped volumes | |
US11106813B2 (en) | Credentials for consent based file access | |
US9875184B2 (en) | Multi-level snapshot caching | |
US11409451B2 (en) | Systems, methods, and storage media for using the otherwise-unutilized storage space on a storage device | |
US20160012071A1 (en) | Immediate Recovery Of Virtual Machine Using Deduplication Device and Snapshots | |
US11212284B2 (en) | Method to virtualize large files in a sandbox | |
US9952984B2 (en) | Erasing a storage block before writing partial data | |
CN111373367A (en) | Operating system updates | |
US11169708B1 (en) | Zero memory buffer copying in a reliable distributed computing system | |
US10628317B1 (en) | System and method for caching data in a virtual storage environment based on the clustering of related data blocks | |
US10712952B1 (en) | Metadata caches in a reliable distributed computing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: COMODO SECURITY SOLUTIONS, INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TAS, EGEMEN;REEL/FRAME:045699/0230 Effective date: 20180405 Owner name: COMODO SECURITY SOLUTIONS, INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ZHANG, HAIBO;REEL/FRAME:046070/0570 Effective date: 20180409 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |