Patents Assigned to Chengdu Huawei Symantec Technologies Co., Ltd.
  • Publication number: 20120259941
    Abstract: Embodiments of the present technical solution relate to the technique field of storage, and disclose a server and a method for the server to access a volume. The method comprises: determining, from a first list, a block that needs to be accessed according to an access offset of a volume that needs to be accessed; determining, from a second list, a storage controller corresponding to the block that needs to be accessed according to the determined block; and sending a data reading request or a data writing request to the storage controller corresponding to the block that needs to be accessed to process. Embodiments of the present invention can reduce time delay when the data reading request or the data writing request of the server reaches the block that needs to be accessed.
    Type: Application
    Filed: June 18, 2012
    Publication date: October 11, 2012
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventors: Jiaolin LUO, Guobin ZHANG, Maoyin LIU
  • Publication number: 20120260125
    Abstract: A multi-disk fault-tolerant system, a method for generating a check block, and a method for recovering a data block are provided. The multi-disk fault-tolerant system includes a disk array and a calculation module connected through a system bus, the disk array is formed by p disks, and a fault-tolerant disk amount of the disk array is q; data in the disk array is arranged according to a form of a matrix M of (m+q)×p, where m is a prime number smaller than or equal to p?q; in the matrix M, a 0th row is virtual data blocks being virtual and having values being 0, a 1st row to an (m?1)th row are data blocks, an mth row to an (m+q?1)th row are check blocks. Therefore, during a procedure of generating the check block and recovering the data block in the multi-disk fault-tolerant system, calculation complexity is lowered.
    Type: Application
    Filed: February 3, 2012
    Publication date: October 11, 2012
    Applicants: University of Electronic Science and Technology of China, CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventors: Yulin WANG, Jianye YAO
  • Patent number: 8285910
    Abstract: A method and system for taking over devices are provided. In a solution, a first control board first performs topology discovery on a Peripheral Component Interconnect Express (PCIE) bus, and reserves resources for a Switch (SW) where a NON-Transparent (NT) bridge is located and devices connected to down ports of the SW according to a set resource reservation policy when the topology discovery proceeds to the NT bridge, where the SW and the devices are currently controlled by a second control board. After the SW and the devices are taken over from the second control board, the resource reserved in advance may be allocated to the SW and the devices, so that the devices that are taken over operate normally under control of the first control board. Dual control is implemented through direct taking over devices, and a response speed for processing a device request is improved.
    Type: Grant
    Filed: February 7, 2012
    Date of Patent: October 9, 2012
    Assignee: Chengdu Huawei Symantec Technologies Co., Ltd.
    Inventor: Xueyou Wang
  • Publication number: 20120254977
    Abstract: The present invention discloses a method for network attack protection, a device, and a system thereof. The method includes: receiving information about attack source, in which the information about the attack source carries address information about an attacker; obtaining address information about a gateway corresponding to the attacker according to the address information about the attacker and a preset mapping relationship between the attacker and the gateway corresponding to the attacker; and sending a first control message to the gateway corresponding to the attacker according to the address information about the gateway corresponding to the attacker, wherein the first control message instructs the gateway corresponding to the attacker to control traffic of the attacker. The present invention may be used on a communications network to prevent the attacker from attacking victim hosts on the network from the root, avoid blockage on the upstream network of the victim hosts.
    Type: Application
    Filed: June 4, 2012
    Publication date: October 4, 2012
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventor: Wu JIANG
  • Publication number: 20120239804
    Abstract: A method, a device, and a system for backup are disclosed. The method includes: receiving a backup packet; analyzing the backup packet to obtain a serial number of an active data packet, where the serial number is carried in the backup packet; calculating a sum of the serial number of the active data packet and a specific increment value to obtain a serial number of a standby data packet; and backing up the serial number of the standby data packet. Therefore, after the service is switched over from the active device to the standby device, the active device still regards the data packet sent by the former standby device as a new data packet and receives the data packet, which prevents service interruption caused by the switchover and improves continuity of service processing in the process of two-node cluster hot backup.
    Type: Application
    Filed: May 25, 2012
    Publication date: September 20, 2012
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD
    Inventors: Jun LIU, Wenhui XIE
  • Publication number: 20120233691
    Abstract: A method, a device, and a system for alerting against unknown malicious codes are disclosed. The method includes: detecting characteristics of a packet; judging whether any suspicious code exists in the packet according to a result of the detection; recording a source address of the suspicious code if the suspicious code exists in the packet; and sending alert information that carries the source address to a monitoring device. The embodiments of the present invention can report source addresses of numerous suspicious codes proactively at the earliest possible time, lay a foundation for shortening the time required for overcoming virus threats, and avoid the trouble of installing software on the client.
    Type: Application
    Filed: May 25, 2012
    Publication date: September 13, 2012
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventor: Wu JIANG
  • Patent number: 8254143
    Abstract: The present invention discloses a communication apparatus. The communication apparatus includes one or more board and a backplane. The board includes a connector and a function processing unit circuit connected to the connector. The backplane includes at least one group of board connectors. Each group of the board connectors includes two board connectors that receive signals from different boards. The board connector includes connection terminals connected to the connector on boards. The two board connectors are distributed up and down, and the connection terminals of the two board connectors are distributed symmetrically around a center. The foregoing communication apparatus and backplane are cost-efficient.
    Type: Grant
    Filed: November 5, 2008
    Date of Patent: August 28, 2012
    Assignee: Chengdu Huawei Symantec Technologies Co., Ltd.
    Inventor: Yumin Du
  • Publication number: 20120203910
    Abstract: A method and an apparatus for buffering and obtaining resources as well as a resource buffering system are disclosed. The method includes: obtaining an access popularity value of a resource from a database at intervals of a first preset time, and obtaining load values of cache servers from the database if determining that the access popularity value reaches a preset first threshold; and determining a duplication cache server for duplicating the resource according to the access popularity value and the load values, and notifying the duplication cache server to duplicate the resource from a cache server that stores the resource and buffer the resource. The method overcome the problems in the prior, namely, the same resource is buffered in only one cache server and the relatively idle cache servers are unable to share loads with busy cache servers. The method improves extensibility and working efficiency of the buffering system.
    Type: Application
    Filed: April 13, 2012
    Publication date: August 9, 2012
    Applicant: Chengdu Huawei Symantec Technologies Co., Ltd.
    Inventors: Gang LAN, Rui WANG, Chen GONG, Shuguo ZHOU
  • Publication number: 20120204264
    Abstract: A method, an apparatus, and a system for detecting Botnet are disclosed. The method for detecting Botnet includes: obtaining an address information about a control host in a Bot sample by using an auto breakout environment; sending a query request message to a traffic analysis device to obtain an address information of a Bot host connected with the control host, in which the query request message carries the address information about the control host; and receiving a query response message returned by the traffic analysis device, in which the query response message carries the address information of the Bot host connected with the control host. The method for detecting Botnet can obtain the Botnet information in real time and construct a topology of the Botnet.
    Type: Application
    Filed: April 20, 2012
    Publication date: August 9, 2012
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventor: Wu JIANG
  • Publication number: 20120173941
    Abstract: A method, a system, and a processor for loading a logical device online are disclosed. The method for loading a logical device online includes receiving an online loading command; disabling a Joint Test Action Group (JTAG) link of a board on which the logical device is located through a bus between a processor and the logical device according to the online loading command, and enabling a link between an input/output (I/O) interface and a JTAG interface of the logical device through the bus according to the online loading command; and controlling the logical device through the bus so that the logical device is loaded online through the link between the I/O interface and the JTAG interface of the logical device. In this way, the logical device is loaded online without occupying any I/O interface or requiring addition of any I/O device.
    Type: Application
    Filed: March 9, 2012
    Publication date: July 5, 2012
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventors: Bingbing TONG, Yusen LI, Lei SHI, Yongning CHEN
  • Publication number: 20120151070
    Abstract: A method and system for implementing network proxy are provided. The method includes: establishing a first connection between a client and a server through a proxy adapter, so as to enable the client to acquire status information of the server through the first connection; and if the status information of the server shows that the server is in a turn-on state, establishing a second connection between the client and the server, so as to enable the client and the server to transmit a data packet through the second connection. Through the method for implementing network proxy, the client acquires the status information of the server through the first connection, and only when the status information of the server is the turn-on state, could the second connection between the client and the server be established, thereby ensuring the reliability of establishing the second connection, and improving the user experience.
    Type: Application
    Filed: February 17, 2012
    Publication date: June 14, 2012
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventor: Yongyong LI
  • Publication number: 20120144192
    Abstract: A method, a device, and a system for managing permission information are provided. The method includes: receiving a permission modification instruction, where the permission modification instruction is used to instruct modification of permission information of a file; modifying the permission information according to the permission modification instruction of the file; and sending an Identifier (ID) of the file and the modified permission information to a server. The device includes: a modification module, a processing module, and a first sending module. The system includes: a client and a server. The server and the file jointly store the permission information, thereby effectively improving the flexibility of file encryption, reducing the burden of the server, and improving the performance of the server.
    Type: Application
    Filed: February 14, 2012
    Publication date: June 7, 2012
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventors: Liangde CHEN, Chunmao LI, Jian YU, Xiuhua LIU
  • Publication number: 20120137042
    Abstract: A method and system for taking over devices are provided. In a solution, a first control board first performs topology discovery on a Peripheral Component Interconnect Express (PCIE) bus, and reserves resources for a Switch (SW) where a NON-Transparent (NT) bridge is located and devices connected to down ports of the SW according to a set resource reservation policy when the topology discovery proceeds to the NT bridge, where the SW and the devices are currently controlled by a second control board. After the SW and the devices are taken over from the second control board, the resource reserved in advance may be allocated to the SW and the devices, so that the devices that are taken over operate normally under control of the first control board. Dual control is implemented through direct taking over devices, and a response speed for processing a device request is improved.
    Type: Application
    Filed: February 7, 2012
    Publication date: May 31, 2012
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventor: Xueyou WANG
  • Publication number: 20120124660
    Abstract: A Virtual Private Network (VPN) node information processing method and a VPN node information processing device are provided, in which the method comprises: receiving an access request message sent by a node, in which the access request message at least carries authentication information, a current real Internet Protocol (IP) address, a node name and information indicating whether to accept extranet connection of the node; allocating a virtual IP address for the node when the authentication information of the node is correct; and registering the current real IP address, the node name, the information indicating whether to accept the extranet connection, and the virtual IP address of the node as registration information. Through the method and the device, when a node is added into a VPN, configuration of other nodes does not need to be adjusted.
    Type: Application
    Filed: November 4, 2011
    Publication date: May 17, 2012
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventor: Yuchen WANG
  • Publication number: 20120089799
    Abstract: A data backup processing method is provided, which includes: numbering at least one data storage node in a data storage device, in which the data storage node includes a primary storage area and a backup storage area, and the primary storage area of the data storage node and a backup storage area of a next adjacently numbered data storage node are logically connected, so that a number of data storage nodes form a ring structure with sequential logical connection; and respectively backing up the data stored in a primary storage area of a random data storage node into a backup storage area of at least one next adjacently numbered data storage node of the data storage node in the ring structure. Therefore, data redundancy may be provided for users among a random number of disks, thereby effectively guaranteeing the security of user data and achieving high flexibility and practicability.
    Type: Application
    Filed: December 13, 2011
    Publication date: April 12, 2012
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventor: Mingchang WEI
  • Patent number: 8156376
    Abstract: A method, device and system for storing data in a cache in case of power failure are disclosed. The method includes: in case of power failure of a storage system, receiving configuration information from a central processing unit (CPU); establishing a mapping relationship between an address of data in the cache and an address in a storage device according to the configuration information; sending a signaling message that carries the mapping relationship to the cache, so that the cache migrates the data to the storage device according to the signaling message.
    Type: Grant
    Filed: October 28, 2009
    Date of Patent: April 10, 2012
    Assignee: Chengdu Huawei Symantec Technologies Co., Ltd.
    Inventor: Liyao Chen
  • Publication number: 20120036394
    Abstract: A data recovery method includes: by a first data node, obtaining a notification that a second data node fails; and storing specified data to a third data node, recording information of the specified data stored in the third data node in backup information stored in the first data node, and providing a metadata node and other data nodes storing the specified data with the information of the specified data stored in the third data node, where the specified data is data stored in the first and second data nodes. A data recovery method, two data nodes, and a distributed file system are also provided. In embodiments of the present invention, the data recovery is mainly performed among the data nodes, and the metadata node does not need to perform a lot of operations. Therefore, the load of the metadata node is reduced.
    Type: Application
    Filed: October 14, 2011
    Publication date: February 9, 2012
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventor: Huan FENG
  • Publication number: 20120032508
    Abstract: An apparatus and a method for peak shifting adjustment are disclosed. The apparatus includes a controlling unit that is configured to sequentially control different outputting units to output the Pulse-Width Modulation (PWM) signals according to a preset time sequence. The interval between two adjacent outputted PWM signals is T1, which is the time when the current required by an electric device is higher than the normal current in case of an increase of the duty cycle of the PWM signals. At least two outputting units are connected to corresponding electric devices and configured to output the PWM signals to the corresponding electric devices according to the control of the controlling unit.
    Type: Application
    Filed: October 13, 2011
    Publication date: February 9, 2012
    Applicant: Chengdu Huawei Symantec Technologies Co., Ltd.
    Inventors: Yumin Du, Hongdong Zhang
  • Publication number: 20110320532
    Abstract: A data operating method, system, client, and data server are provided. The method includes: sending a write request of a file to a data server, where the write request includes identifiers of sub-data blocks constituting the file; receiving mappings between the identifiers of the sub-data blocks and storage servers returned by the data server according to the write request; and writing the sub-data blocks to the corresponding storage servers according to the mappings. With the present invention, whether the identifiers of the sub-data blocks are saved may serve as a basis for determining whether the sub-data blocks are written, thus ensuring that no duplicate data is stored in the system and increasing the storage space of the system.
    Type: Application
    Filed: September 2, 2011
    Publication date: December 29, 2011
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventors: Jusheng Cheng, Yuan Yuan, Hai Wen
  • Publication number: 20110320712
    Abstract: The embodiments of the present invention provide a method and an apparatus for controlling a state of a storage device, and a storage device, and relate to the field of electronic technologies. State control information of logic disks in the storage device is obtained; it is judged whether the state control information of all the logic disks in the storage device includes sleep instructions; and the storage device is controlled to switch into a sleep state when the state control information of all the logic disks includes the sleep instructions. The technical solutions may effectively control the storage device to switch into the sleep state, overcome the inconvenience of the read and write operations when the storage device automatically switches into the sleep state, and save the power consumption of the storage device with convenient use.
    Type: Application
    Filed: September 12, 2011
    Publication date: December 29, 2011
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventors: Mingjun XU, Yumin DU