WO2010058949A2 - 스냅샷 데이터베이스를 이용한 정보 복구 방법 및 장치 - Google Patents
스냅샷 데이터베이스를 이용한 정보 복구 방법 및 장치 Download PDFInfo
- Publication number
- WO2010058949A2 WO2010058949A2 PCT/KR2009/006782 KR2009006782W WO2010058949A2 WO 2010058949 A2 WO2010058949 A2 WO 2010058949A2 KR 2009006782 W KR2009006782 W KR 2009006782W WO 2010058949 A2 WO2010058949 A2 WO 2010058949A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- user log
- valid
- user
- recovery
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1471—Saving, restoring, recovering or retrying involving logging of persistent data for recovery
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/84—Using snapshots, i.e. a logical point-in-time copy of the data
Definitions
- the present invention relates to a method and apparatus for recovering information using a snapshot database, and more particularly, to select log information, store the information in a snapshot database, and to request recovery of log information from a user.
- the present invention relates to an information recovery method and apparatus for quickly recovering the log information to the selected log information.
- hacking cases such as malicious acts that extract information and take disadvantages or paralyze the computer network are frequently generated by searching for complementary vulnerabilities in the network and infiltrating other people's computers.
- the people affected by the hacking accident can recover the information through the network or the management server to which they belong, but the recovery process is quite complicated and takes a very long time.
- the present invention has been made to solve the above-described problems of the prior art, to provide a method and apparatus that can recover information damaged by hacking and the like.
- the present invention is to provide a method and apparatus that can increase the information recovery rate by simplifying the process of information recovery and shortening the processing time.
- the present invention is to provide a method that can significantly reduce the recovery task as the throughput for information recovery, by automating the information recovery process for the information management server.
- the present invention can solve the loss of information due to hacking from the customer's point of view, and to provide a method that can increase the image and reliability for the server or program providing the information.
- the information recovery method using a snapshot database the first user log information for the user of at least one user terminal Collecting the valid information from the first user log information, storing the valid information in a snapshot database type according to the period information, and receiving recovery request information for the valid information from the user terminal. And comparing and validating the second user log information at the time when the recovery request information is received and the valid information according to the recovery request information, and the second user log information according to the analysis result. And recovering.
- the step of recovering the valid information of the present invention is performed when the second user log information and the valid information are different and determined to be hacking.
- the information recovery method using the snapshot database transmitting the recovery request information for the valid information to the user log management server and the recovery request in accordance with the determination of the user log management server And recovering the valid information stored in a snapshot database type in the user log management server prior to the transmission of the information, wherein the user log management server is configured as a second user when the recovery request information is received.
- the second user log information is restored to the valid information according to a result of comparing and analyzing log information with the valid information.
- the information recovery apparatus using a snapshot database an information collection unit for collecting first user log information for a user of at least one user terminal, the effective information from the first user log information According to the information selection unit for selecting, the information storage unit for storing the valid information in a snapshot database type according to the period information, an information receiving unit for receiving the recovery request information for the valid information from the user terminal, according to the recovery request information, And an information analyzer for comparing and analyzing second user log information and the valid information at the time when the recovery request information is received, and an information recovery unit for recovering the second user log information to the valid information according to the analysis result. do.
- the information recovery apparatus using a snapshot database the information transmission unit for transmitting the recovery request information for the valid information to the user log management server and the user log management server, the determination, And an information recovery unit for recovering the valid information stored in a snapshot database type in the user log management server before the recovery request information is transmitted, wherein the user log management server is configured to receive the recovery request information. According to a result of comparing and analyzing second user log information and the valid information, the second user log information is restored to the valid information.
- the information recovery rate can be increased by simplifying the information recovery process and shortening the processing time.
- the recovery task can be significantly reduced.
- the customer can solve the loss of information loss due to hacking, and can increase the image and reliability of the server or program providing the information.
- FIG. 1 is a diagram showing the configuration of an information recovery system using a snapshot database according to an embodiment of the present invention.
- FIG. 2 is a block diagram showing the configuration of a user log management server of an information recovery system using a snapshot database according to an embodiment of the present invention.
- FIG. 3 is a block diagram illustrating a configuration of a user terminal of an information recovery system using a snapshot database according to an embodiment of the present invention.
- Figure 4 shows a first embodiment showing an information recovery process according to an embodiment of the present invention.
- FIG. 5 shows a second embodiment showing an information recovery process according to an embodiment of the present invention.
- FIG. 6 is a flowchart illustrating an information recovery method using a snapshot database according to an embodiment of the present invention.
- FIG. 7 is a flowchart illustrating an information recovery method using a snapshot database according to another embodiment of the present invention.
- FIG. 1 is a diagram showing the configuration of an information recovery system using a snapshot database according to an embodiment of the present invention.
- the present invention selects and stores valid information from a plurality of user log information collected by the user log management server 100 in a snapshot database format (type), and when an information recovery request signal is received from the user terminal 200. Without having to look at the entire user log information, by comparing the user log information of the user terminal 200 at the time when the valid information and the information recovery request signal is received to determine whether to hack, it is possible to automatically recover the information I would like to present a system.
- the information recovery method using the snapshot database of the present invention will be described as follows with reference to FIGS. 2 to 3 according to the information flow and information processing of the user log management server 100 and the user terminal 200. .
- FIG. 2 is a block diagram illustrating a configuration of a user log management server of an information recovery system using a snapshot database according to an embodiment of the present invention
- FIG. 3 is information using a snapshot database according to an embodiment of the present invention. It is a block diagram showing the configuration of a user terminal of a recovery system.
- the information collecting unit 110 of the user log management server 100 collects first user log information about a user of at least one user terminal 200.
- the first user log information is used by all game users of the game user collected by the user log management server 100 in operating the online game. This is a huge amount of information, including details.
- the administrator manually determines whether the first user log information including a large amount of information is hacked, and if the hack is determined, selects and restores relevant information, thereby recovering the work. The time spent was very high.
- the present invention selects the valid information from the first user log information including a large amount of information through the following process, and stores the valid information in a snapshot database format (type), the user if there is a request for information recovery You can recover information automatically and simply through the valid information.
- the information selecting unit 120 of the user log management server 100 selects valid information from the first user log information.
- the valid information may be various information such as a character name, inventory information, or economic information for the operator to recover information on the game.
- the inventory information may be information including items or game money that the online game character can collect through the game.
- the economic information may be flow information of items or game money in which the online game character is exchanged, sold, or purchased through a game.
- the information storage unit 130 of the user log management server 100 stores the valid information in a snapshot database format (type) according to the period information.
- the user log management server 100 since the user log management server 100 selects and stores valid information from the first user log information in a snapshot database format (type), the user log management server 100 restores the valid information and the recovery information when a user requests to recover the information later. The information can be restored simply by comparing only the second user log information about the time of application.
- valid information designated by an operator is selected from the first log information, which is the entire log information of the user, stored as a snapshot database type, and there is a request for information recovery from the user later.
- the snapshot database may mean a collection of computer files and directories that existed and maintained at a time in the computer file system.
- all records of a user in a game may be recorded. It may be referred to as an information storage unit that stores the first log information, which can be referred to as this, and selectively stores and manages valid information required for information recovery.
- the user may recover the hacked information as valid information stored in the user log management server 100 through the following process.
- the user transmits recovery request information for the valid information to the user log management server 100 by using the information transmitter 210 of the user terminal 200.
- the information receiving unit 140 of the user log management server 100 receives recovery request information for the valid information from the user terminal 200.
- the recovery request information includes the contents of the hacking damage time and the hacking damage case, the user of the user terminal, the operator later grasp the hacking damage time and damage cases included in the recovery application information to the hacking At the discretion, it may be possible to recover automatically.
- the information analysis unit 150 of the user log management server 100 compares the second user log information at the time when the recovery request information is received and the valid information according to the recovery request information.
- the information recovery unit 160 of the user log management server 100 restores the second user log information to the valid information according to the analysis result.
- the second recovery log 160 includes the second recovery log. User log information can be restored to the valid information.
- the user log management server 100 determines that the hacking is determined when the IP to which the user terminal is connected is the same as a preset hacking-related IP, and sets the second user log information as the valid information. To recover.
- the user snaps to the user log management server 100 before the time point at which the recovery request information is transmitted, according to the determination of the user log management server 100 through the information recovery unit 120 of the user terminal 200. Can be restored to the valid information stored in the shot database format (type).
- the valid information stored in the snapshot database is set to be automatically stored at a specific time by the setting of the operator, hacking damage of the user of the user terminal 200 that is a game user
- the operator can check the hacking damage point and damage cases based on the recovery application information received when an occurrence occurs.
- the operator may operate the information recovery system for the time point automatically in the information recovery system using the snapshot database based on the time point. That is, the information recovery system of the present invention automatically recovers the second log information, which is log information at the time of hacking, to the valid information stored on the snapshot database according to the operator's automatic information recovery command.
- the operator may recover one or more selected information of the valid information.
- Figure 4 shows a first embodiment showing an information recovery process according to an embodiment of the present invention.
- the operator may select and recover only the correct information determined as hacking from the valid information stored in the snapshot database format.
- the operator since the valid information is separately stored according to the period information, the operator may restore the valid information for the selected period of the period information.
- FIG. 5 shows a second embodiment showing an information recovery process according to an embodiment of the present invention.
- the operator may recover specific information by selecting a specific period of valid information divided according to the period information.
- the present invention may prohibit not only the recovery of information but also the change of the user log information to which the recovery request has been made according to the request of the user or the setting of the operator.
- any one of the second user log information during the period corresponding to the transaction suspension period information Changes to the above can be prohibited.
- the present invention provides a method for recovering hacked information into valid information in a selected snapshot database format among user log information, and the method will be described sequentially with reference to FIGS. 6 to 7. Do it.
- the method corresponds to the method of using the user log management server 100 and the user terminal 200, since it includes all the functional elements of the device, a detailed description thereof will be omitted.
- the user log management server 100 will be described with reference to FIG. 6.
- FIG. 6 is a flowchart illustrating an information recovery method using a snapshot database according to an embodiment of the present invention.
- the information collecting unit 110 collects first user log information about a user of at least one user terminal 200 (S610).
- the information selection unit 120 selects valid information from the first user log information (S620).
- the information storage unit 130 stores the valid information in a snapshot database format according to the period information (S630).
- the information receiving unit 140 receives the recovery request information for the valid information from the user terminal 200 (S640).
- the information analysis unit 150 compares and analyzes the second user log information and the valid information at the time when the recovery request information is received according to the recovery request information (S650).
- the information recovery unit 160 restores the second user log information to the valid information according to the analysis result (S660).
- FIG. 7 is a flowchart illustrating an information recovery method using a snapshot database according to another embodiment of the present invention.
- the information transmission unit 210 transmits the recovery application information for the valid information to the user log management server 100 (S710).
- the information recovery unit 220 in accordance with the determination of the user log management server 100, the valid information stored in the snapshot database format in the user log management server 100 before the time of transmitting the recovery request information. Received to (S720).
- the user log management server 100 restores the second user log information to the valid information according to a result of comparing and analyzing the second user log information and the valid information at the time when the recovery request information is received. do.
- Embodiments according to the present invention can be implemented in the form of program instructions that can be executed by various computer means can be recorded in a computer readable medium.
- the computer readable medium may include program instructions, data files, data structures, etc. alone or in combination.
- Program instructions recorded on the media may be those specially designed and constructed for the purposes of the present invention, or they may be of the kind well-known and available to those having skill in the computer software arts.
- Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks and magnetic tape, optical media such as CD-ROMs, DVDs, and magnetic disks such as floppy disks.
- program instructions include machine code, such as produced by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like.
- the hardware device described above may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Debugging And Monitoring (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims (18)
- 하나 이상의 사용자 단말기의 사용자에 대한 제1 사용자 로그 정보를 수집하는 단계;상기 제1 사용자 로그 정보로부터 유효 정보를 선별하는 단계;상기 유효 정보를 기간 정보에 따라 스냅샷 데이터베이스 타입으로 저장하는 단계;상기 사용자 단말기로부터 상기 유효 정보에 대한 복구 신청 정보를 수신하는 단계;상기 복구 신청 정보에 따라, 상기 복구 신청 정보가 수신된 시점의 제2 사용자 로그 정보와 상기 유효 정보를 비교하여 분석하는 단계; 및상기 분석 결과에 따라, 상기 제2 사용자 로그 정보를 상기 유효 정보로 복구하는 단계를 포함하는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 방법.
- 제1항에 있어서,상기 복구 신청 정보는 상기 사용자 단말기의 사용자가 해킹 피해 시점 정보 또는 해킹 피해 사례 정보 중 어느 하나 이상을 포함하는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 방법.
- 제1항에 있어서,상기 유효 정보로 복구하는 상기 단계는,상기 제2 사용자 로그 정보와 상기 유효 정보가 상이하여 해킹으로 판단된 경우 수행되는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 방법.
- 제3항에 있어서,상기 해킹으로 판단된 경우는, 상기 사용자 단말기가 접속된 IP가 기설정된 해킹 관련 IP와 동일한 경우인 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 방법.
- 제1항에 있어서,상기 각 단계는,설정 정보에 따라 자동으로 수행되는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 방법.
- 제1항에 있어서,상기 제1 사용자 로그 정보가 게임 상의 케릭터 내역 정보인 경우, 상기 유효 정보는, 케릭터 명, 인벤토리 정보 또는 경제 정보 중 어느 하나 이상을 포함하는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 방법.
- 제1항에 있어서,상기 유효 정보로 복구하는 상기 단계는,상기 유효 정보 중 하나 이상의 선택된 정보를 복구하는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 방법.
- 제1항에 있어서,상기 유효 정보로 복구하는 상기 단계는,상기 기간 정보 중 선택된 기간에 대한 상기 유효 정보로 복구하는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 방법.
- 제3항에 있어서,상기 해킹으로 판단된 경우, 거래 정지 기간 정보에 대응하는 기간 동안 상기 제2 사용자 로그 정보 중 어느 하나 이상에 대한 변경을 금지하는 단계를 더 포함하는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 방법.
- 사용자 로그 관리 서버로 유효 정보에 대한 복구 신청 정보를 전송하는 단계; 및상기 사용자 로그 관리 서버의 판단에 따라, 상기 복구 신청 정보를 전송한 시점의 이전에 상기 사용자 로그 관리 서버에 스냅샷 데이터베이스 타입으로 저장된 상기 유효 정보로 복구 받는 단계를 포함하고,상기 사용자 로그 관리 서버는,상기 복구 신청 정보가 수신된 시점의 제2 사용자 로그 정보와 상기 유효 정보를 비교하여 분석한 결과에 따라, 상기 제2 사용자 로그 정보를 상기 유효 정보로 복구하는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 방법.
- 제10항에 있어서,상기 사용자 로그 관리 서버는,하나 이상의 사용자 단말기의 사용자에 대한 제1 사용자 로그 정보를 수집하는 단계;상기 제1 사용자 로그 정보로부터 유효 정보를 선별하는 단계; 및상기 유효 정보를 기간 정보에 따라 스냅샷 데이터베이스 타입으로 저장하는 단계를 수행하는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 방법.
- 제11항에 있어서,상기 사용자 로그 관리 서버는,상기 제2 사용자 로그 정보와 상기 유효 정보가 상이하여 해킹으로 판단된 경우, 상기 제2 사용자 로그 정보를 상기 유효 정보로 복구하는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 방법.
- 제1항 내지 제12항 중 어느 한 항의 방법을 수행하는 프로그램을 기록한 컴퓨터 판독 가능 기록 매체.
- 하나 이상의 사용자 단말기의 사용자에 대한 제1 사용자 로그 정보를 수집하는 정보 수집부;상기 제1 사용자 로그 정보로부터 유효 정보를 선별하는 정보 선별부;상기 유효 정보를 기간 정보에 따라 스냅샷 데이터베이스 타입으로 저장하는 정보 저장부;상기 사용자 단말기로부터 상기 유효 정보에 대한 복구 신청 정보를 수신하는 정보 수신부;상기 복구 신청 정보에 따라, 상기 복구 신청 정보가 수신된 시점의 제2 사용자 로그 정보와 상기 유효 정보를 비교하여 분석하는 정보 분석부; 및상기 분석 결과에 따라, 상기 제2 사용자 로그 정보를 상기 유효 정보로 복구하는 정보 복구부를 포함하는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 장치.
- 제14항에 있어서,상기 정보 복구부는,상기 정보 분석부의 분석 결과, 상기 제2 사용자 로그 정보와 상기 유효 정보가 상이하여 해킹으로 판단된 경우, 상기 제2 사용자 로그 정보를 상기 유효 정보로 복구하는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 장치.
- 제15항에 있어서,상기 정보 분석부에 의해 해킹으로 판단된 경우, 거래 정지 기간 정보에 대응하는 기간 동안 상기 제2 사용자 로그 정보 중 어느 하나 이상에 대한 변경을 금지하는 정보 변경 정지부를 더 포함하는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 장치.
- 사용자 로그 관리 서버로 유효 정보에 대한 복구 신청 정보를 전송하는 정보 전송부; 및상기 사용자 로그 관리 서버의 판단에 따라, 상기 복구 신청 정보를 전송한 시점의 이전에 상기 사용자 로그 관리 서버에 스냅샷 데이터베이스 타입으로 저장된 상기 유효 정보로 복구 받는 정보 복구부를 포함하고,상기 사용자 로그 관리 서버는,상기 복구 신청 정보가 수신된 시점의 제2 사용자 로그 정보와 상기 유효 정보를 비교하여 분석한 결과에 따라, 상기 제2 사용자 로그 정보를 상기 유효 정보로 복구하는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 장치.
- 제17항에 있어서,상기 사용자 로그 관리 서버는,상기 제2 사용자 로그 정보와 상기 유효 정보가 상이하여 해킹으로 판단된 경우, 상기 제2 사용자 로그 정보를 상기 유효 정보로 복구하는 것을 특징으로 하는 스냅샷 데이터베이스를 이용한 정보 복구 장치.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2011536261A JP2012509520A (ja) | 2008-11-18 | 2009-11-18 | スナップショットデータベースを用いた情報復旧方法および装置 |
CN2009801458067A CN102239475A (zh) | 2008-11-18 | 2009-11-18 | 使用快照抓取数据库的信息恢复方法与装置 |
EP09827714.8A EP2367126A4 (en) | 2008-11-18 | 2009-11-18 | METHOD AND APPARATUS FOR EXTRACTING INFORMATION USING AN INSTANT DATA BASE CAPTURE |
US13/129,773 US20110246426A1 (en) | 2008-11-18 | 2009-11-18 | Method and apparatus for information recovery using snapshot database |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2008-0114844 | 2008-11-18 | ||
KR1020080114844A KR100926098B1 (ko) | 2008-11-18 | 2008-11-18 | 스냅샷 데이터베이스를 이용한 정보 복구 방법 및 장치 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2010058949A2 true WO2010058949A2 (ko) | 2010-05-27 |
WO2010058949A3 WO2010058949A3 (ko) | 2010-08-26 |
Family
ID=41561498
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2009/006782 WO2010058949A2 (ko) | 2008-11-18 | 2009-11-18 | 스냅샷 데이터베이스를 이용한 정보 복구 방법 및 장치 |
Country Status (7)
Country | Link |
---|---|
US (1) | US20110246426A1 (ko) |
EP (1) | EP2367126A4 (ko) |
JP (1) | JP2012509520A (ko) |
KR (1) | KR100926098B1 (ko) |
CN (1) | CN102239475A (ko) |
TW (1) | TWI453623B (ko) |
WO (1) | WO2010058949A2 (ko) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9105009B2 (en) | 2011-03-21 | 2015-08-11 | Microsoft Technology Licensing, Llc | Email-based automated recovery action in a hosted environment |
CN102739415A (zh) * | 2011-03-31 | 2012-10-17 | 华为技术有限公司 | 确定网络故障数据、记录网络瞬时状态数据方法及装置 |
KR20130040048A (ko) * | 2011-10-13 | 2013-04-23 | 주식회사 네오플 | 비정상 계정 검출 장치 및 방법 |
US9466065B2 (en) | 2011-11-02 | 2016-10-11 | Microsoft Technology Licensing, Llc | Integrating usage information with operation of a system |
US9218417B2 (en) | 2011-11-02 | 2015-12-22 | Microsoft Technology Licensing, Llc | Ad-hoc queries integrating usage analytics with search results |
US10402299B2 (en) | 2011-11-02 | 2019-09-03 | Microsoft Technology Licensing, Llc | Configuring usage events that affect analytics of usage information |
US8839257B2 (en) | 2011-11-22 | 2014-09-16 | Microsoft Corporation | Superseding of recovery actions based on aggregation of requests for automated sequencing and cancellation |
US20130133024A1 (en) * | 2011-11-22 | 2013-05-23 | Microsoft Corporation | Auto-Approval of Recovery Actions Based on an Extensible Set of Conditions and Policies |
US9460303B2 (en) | 2012-03-06 | 2016-10-04 | Microsoft Technology Licensing, Llc | Operating large scale systems and cloud services with zero-standing elevated permissions |
US8881249B2 (en) | 2012-12-12 | 2014-11-04 | Microsoft Corporation | Scalable and automated secret management |
US9098453B2 (en) * | 2013-07-11 | 2015-08-04 | International Business Machines Corporation | Speculative recovery using storage snapshot in a clustered database |
US9558078B2 (en) * | 2014-10-28 | 2017-01-31 | Microsoft Technology Licensing, Llc | Point in time database restore from storage snapshots |
US9762585B2 (en) | 2015-03-19 | 2017-09-12 | Microsoft Technology Licensing, Llc | Tenant lockbox |
US10931682B2 (en) | 2015-06-30 | 2021-02-23 | Microsoft Technology Licensing, Llc | Privileged identity management |
CN106897311B (zh) * | 2015-12-21 | 2020-08-11 | 财团法人工业技术研究院 | 数据库批次更新方法、数据还原日志产生方法与存储装置 |
US10114708B2 (en) | 2016-08-31 | 2018-10-30 | International Business Machines Corporation | Automatic log collection for an automated data storage library |
US10223192B2 (en) | 2016-08-31 | 2019-03-05 | International Business Machines Corporation | Automated data storage library snapshot for host detected errors |
US10698615B2 (en) | 2016-08-31 | 2020-06-30 | International Business Machines Corporation | Trigger event detection for automatic log collection in an automated data storage library |
KR102422595B1 (ko) * | 2017-05-26 | 2022-07-20 | 주식회사 코어사이트 | 커뮤니티 관리 시스템 |
KR102151731B1 (ko) * | 2019-02-27 | 2020-09-03 | 넷마블 주식회사 | 아이템 셀프 처리를 허용하기 위한 기법 |
CN111611108A (zh) * | 2020-05-21 | 2020-09-01 | 云和恩墨(北京)信息技术有限公司 | 虚拟数据库还原的方法及装置 |
KR20230034005A (ko) | 2021-09-02 | 2023-03-09 | 주식회사 나눔기술 | 엣지 클라우드 컴퓨팅 환경에서 멀티 클러스터 스냅샷 생성 및 복구 장치 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6687390B2 (en) * | 2001-12-04 | 2004-02-03 | Applied Neural Conputing Ltd. | System for and method of web signature recognition system based on object map |
US7873985B2 (en) * | 2002-01-08 | 2011-01-18 | Verizon Services Corp. | IP based security applications using location, port and/or device identifier information |
US6938056B2 (en) * | 2002-02-22 | 2005-08-30 | International Business Machines Corporation | System and method for restoring a file system from backups in the presence of deletions |
US6732171B2 (en) * | 2002-05-31 | 2004-05-04 | Lefthand Networks, Inc. | Distributed network storage system with virtualization |
US8095511B2 (en) * | 2003-06-30 | 2012-01-10 | Microsoft Corporation | Database data recovery system and method |
US7440966B2 (en) * | 2004-02-12 | 2008-10-21 | International Business Machines Corporation | Method and apparatus for file system snapshot persistence |
US7146386B2 (en) * | 2004-03-29 | 2006-12-05 | Microsoft Corporation | System and method for a snapshot query during database recovery |
US7143120B2 (en) * | 2004-05-03 | 2006-11-28 | Microsoft Corporation | Systems and methods for automated maintenance and repair of database and file systems |
US7421617B2 (en) * | 2004-08-30 | 2008-09-02 | Symantec Corporation | Systems and methods for optimizing restoration of stored data |
US7506379B2 (en) * | 2004-11-04 | 2009-03-17 | International Business Machines Corporation | Method and system for storage-based intrusion detection and recovery |
US8267778B2 (en) * | 2004-12-15 | 2012-09-18 | Google Inc. | Video game feedback system and method |
US7624443B2 (en) * | 2004-12-21 | 2009-11-24 | Microsoft Corporation | Method and system for a self-heating device |
US8468604B2 (en) * | 2005-08-16 | 2013-06-18 | Emc Corporation | Method and system for detecting malware |
WO2007050244A2 (en) * | 2005-10-27 | 2007-05-03 | Georgia Tech Research Corporation | Method and system for detecting and responding to attacking networks |
US7756834B2 (en) * | 2005-11-03 | 2010-07-13 | I365 Inc. | Malware and spyware attack recovery system and method |
KR100804671B1 (ko) * | 2006-02-27 | 2008-02-20 | 엔에이치엔(주) | 응답 지연 제거를 위한 로컬 단말기 검색 시스템 및 방법 |
TWI316188B (en) * | 2006-05-17 | 2009-10-21 | Ind Tech Res Inst | Mechanism and method to snapshot data |
KR20080055524A (ko) * | 2006-12-15 | 2008-06-19 | 주식회사 케이티 | 다중 레벨 데이터베이스 관리 시스템에서의 질의 처리 장치및 그 방법 |
-
2008
- 2008-11-18 KR KR1020080114844A patent/KR100926098B1/ko active IP Right Grant
-
2009
- 2009-11-18 CN CN2009801458067A patent/CN102239475A/zh active Pending
- 2009-11-18 WO PCT/KR2009/006782 patent/WO2010058949A2/ko active Application Filing
- 2009-11-18 US US13/129,773 patent/US20110246426A1/en not_active Abandoned
- 2009-11-18 EP EP09827714.8A patent/EP2367126A4/en not_active Withdrawn
- 2009-11-18 TW TW098139176A patent/TWI453623B/zh active
- 2009-11-18 JP JP2011536261A patent/JP2012509520A/ja active Pending
Non-Patent Citations (2)
Title |
---|
None |
See also references of EP2367126A4 |
Also Published As
Publication number | Publication date |
---|---|
TW201025069A (en) | 2010-07-01 |
KR100926098B1 (ko) | 2009-11-11 |
EP2367126A4 (en) | 2013-06-05 |
TWI453623B (zh) | 2014-09-21 |
US20110246426A1 (en) | 2011-10-06 |
JP2012509520A (ja) | 2012-04-19 |
EP2367126A2 (en) | 2011-09-21 |
CN102239475A (zh) | 2011-11-09 |
WO2010058949A3 (ko) | 2010-08-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2010058949A2 (ko) | 스냅샷 데이터베이스를 이용한 정보 복구 방법 및 장치 | |
US9537897B2 (en) | Method and apparatus for providing analysis service based on behavior in mobile network environment | |
JP3778652B2 (ja) | ログデータ収集管理方法及びその装置 | |
WO2013169059A1 (ko) | 웹 서비스 모니터링 시스템 및 방법 | |
CN101802805B (zh) | 用于验证应用程序并控制其执行的方法 | |
WO2012108623A1 (ko) | 이미지 데이터베이스에 신규 이미지 및 이에 대한 정보를 추가하기 위한 방법, 시스템 및 컴퓨터 판독 가능한 기록 매체 | |
WO2015056885A1 (ko) | 안드로이드 악성 애플리케이션의 탐지장치 및 탐지방법 | |
CN107667370A (zh) | 使用事件日志检测异常账户 | |
CN105556475A (zh) | 请求处理技术 | |
WO2019198885A1 (ko) | 블록체인 기반의 다수의 서비스 노드를 사용하는 탈중앙화 서비스 플랫폼 | |
WO2023096027A1 (ko) | 보안성이 향상된 데이터 백업 시스템 | |
WO2017171188A1 (ko) | 웹 애플리케이션 서버 또는 웹 서버로부터 수집된 트랜잭션 정보를 이용한 보안장치 | |
WO2013100320A1 (ko) | 시스템 파일 보호 및 복구를 위한 장치, 방법, 사용자 단말기 및 시스템 | |
CN109614203A (zh) | 一种基于应用数据仿真的安卓应用云数据取证分析系统及方法 | |
WO2013073762A1 (en) | Method and apparatus for providing and collecting data about abnormal termination of program | |
WO2021085701A1 (ko) | 블록체인 및 스마트컨트랙트를 이용한 보안 이벤트를 처리하기 위한 장치 및 이를 위한 방법 | |
WO2021049763A1 (ko) | 봇 구별 테스트를 활용한 크라우드 소싱 기반의 데이터 수집 방법 | |
CN111782908A (zh) | 一种基于数据挖掘聚类分析的web违规操作行为检测方法 | |
WO2012169752A2 (ko) | 접속 시도 기기 인증 시스템 및 방법 | |
CN102197363B (zh) | 用于选择和配置默认存储区的设备及对应方法 | |
WO2014058158A1 (ko) | 온라인 서비스로 제공되는 저작 콘텐츠의 보호를 위한 콘텐츠 유통 로그 에이전트 및 운영방법 | |
CN105487936A (zh) | 云环境下面向等级保护的信息系统安全性测评方法 | |
CN116132625A (zh) | 交易流程的监管方法和装置 | |
CN116049138A (zh) | 交易数据的数据追溯方法、追溯装置和追溯系统 | |
CN110221991A (zh) | 计算机外围设备的管控方法及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980145806.7 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09827714 Country of ref document: EP Kind code of ref document: A2 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011536261 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009827714 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13129773 Country of ref document: US |