Patents by Inventor Yasuhiro Kirihata
Yasuhiro Kirihata has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9015131Abstract: When an online storage service is used to expand a storage capacity of a file server, an amount of communication in synchronization processing and an amount of data retained on the online storage service are reduced to save an amount of charge. In a kernel module provided with a storage area on the online storage service, files are divided into block files and managed, and blocks overlapping with an already registered and saved block file group are not uploaded, but only configuration information of the files is changed. A mechanism is adopted, in which DBs for managing meta information and elimination of duplication are divided and managed, and only updated sections are appropriately uploaded.Type: GrantFiled: August 26, 2011Date of Patent: April 21, 2015Assignee: Hitachi Solutions, Ltd.Inventors: Yasuhiro Kirihata, Kouji Nakayama
-
Patent number: 9015214Abstract: A file scan process is carried out, in parallel in a distributed manner, on a file server for which indices have been created once, to create a list of added, changed, or updated files. A file list of indexed scan target files is created by a distributed processing server. Directory URLs of the scan target files are acquired from the file list and analyzed to count a number of directories in each layer and determine a division unit for division of a scan process to be carried out on the scan target directories, based on a result of the counting.Type: GrantFiled: January 15, 2013Date of Patent: April 21, 2015Assignee: Hitachi Solutions, Ltd.Inventors: Shimpei Nishida, Yasuhiro Kirihata, Koji Nakayama
-
Patent number: 8682874Abstract: When an index is partitioned and managed in a plurality of indexes in a search system which deals with large amounts of data, the number of documents registered in each partitioned index may be varied, and inefficient data transfer may occur at the time of index reconfiguration when search nodes are added or deleted. In the present invention, mapping information is used to map search node IDs to slot regions obtained by equally partitioning a circular hash value space in which a start point and an end point of the hash value space are assumed to be identical, so that each document is mapped to each partitioned index.Type: GrantFiled: September 11, 2012Date of Patent: March 25, 2014Assignee: Hitachi Solutions, Ltd.Inventor: Yasuhiro Kirihata
-
Publication number: 20140006355Abstract: A system, method and program which enables a search for specific data included in a virtual machine image that has been backed up, without activating the virtual machine image. At least one virtual machine image is mounted from a repository of virtual machine images that have been backed up, so that a file included in the virtual machine image can be searched for without the virtual machine image being activated. In addition, a function of adequately performing backup management is implemented as well as archiving by detecting a file that contains mail data to be archived or specific information such as personal information, and automatically performing a process of archiving, moving, or deleting the data from the virtual machine image in accordance with a policy.Type: ApplicationFiled: August 25, 2011Publication date: January 2, 2014Applicant: HITACHI SOLUTIONS, LTD.Inventor: Yasuhiro Kirihata
-
Patent number: 8595440Abstract: When a storage capacity of a file server is expanded using an online storage service, elimination of an upper-limit constraint of the file size as a constraint of the online storage service and reduction in the communication cost are realized. A kernel module including logical volumes on the online storage service divides a file into block files at a fixed length and stores and manages the block files to prevent the upper-limit constraint of the file size. When a READ/WRITE request is generated for a mounted file system, only necessary block files are downloaded and used from the online storage service based on an offset value and size information to optimize the communication and realize the communication cost reduction.Type: GrantFiled: March 31, 2010Date of Patent: November 26, 2013Assignee: Hitachi Solutions, Ltd.Inventors: Yasuhiro Kirihata, Hideyuki Kashiwase
-
Publication number: 20130268499Abstract: When an online storage service is used to expand a storage capacity of a file server, an amount of communication in synchronization processing and an amount of data retained on the online storage service are reduced to save an amount of charge. In a kernel module provided with a storage area on the online storage service, files are divided into block files and managed, and blocks overlapping with an already registered and saved block file group are not uploaded, but only configuration information of the files is changed. A mechanism is adopted, in which DBs for managing meta information and elimination of duplication are divided and managed, and only updated sections are appropriately uploaded.Type: ApplicationFiled: August 26, 2011Publication date: October 10, 2013Applicant: HITACHI SOLUTIONS, LTD.Inventors: Yasuhiro Kirihata, Kouji Nakayama
-
Publication number: 20130151492Abstract: When an index is partitioned and managed in a plurality of indexes in a search system which deals with large amounts of data, the number of documents registered in each partitioned index may be varied, and inefficient data transfer may occur at the time of index reconfiguration when search nodes are added or deleted. In the present invention, mapping information is used to map search node IDs to slot regions obtained by equally partitioning a circular hash value space in which a start point and an end point of the hash value space are assumed to be identical, so that each document is mapped to each partitioned index.Type: ApplicationFiled: September 11, 2012Publication date: June 13, 2013Applicant: HITACHI SOLUTIONS, LTD.Inventor: Yasuhiro KIRIHATA
-
Publication number: 20130085997Abstract: In order for a conventional information search system to realize online updating of search indices, there would have to be provided two systems of physical storages for storing copies of indices, namely one for searching and another for updating. By means of a snapshot function provided by an OS, duplicates of original indices are created. A search engine is attached to those duplicates and is used as such, while an index update process is applied to the original index data.Type: ApplicationFiled: March 2, 2012Publication date: April 4, 2013Applicant: HITACHI SOLUTIONS, LTD.Inventors: Yasuhiro KIRIHATA, Koji NAKAYAMA, Shimpei NISHIDA
-
Data processing control method, information processing apparatus, and data processing control system
Patent number: 8316199Abstract: In a system which realizes to prevent leakage/loss of secret information by prohibiting a write operation to a secondary storage apparatus and a write operation to an external medium, an automatic collection of secret data to a server is executed, an existing application mode of PC is not damaged, and then an update of OS and an application is executed. The present invention places a secondary storage apparatus write control driver on the lower level than a file system, and redirects a write operation to the secondary storage apparatus, setting up a memory to be a primary cache, and cache data file on a cache server of a network destination to be a secondary cache. Thereby, the write operation to the secondary storage apparatus is not executed, and difference data is stored on the cache server, so that the automatic collection of secret data to the server can be realized.Type: GrantFiled: November 7, 2006Date of Patent: November 20, 2012Assignee: Hitachi Solutions, Ltd.Inventor: Yasuhiro Kirihata -
Publication number: 20120226869Abstract: When a storage capacity of a file server is expanded using an online storage service, elimination of an upper-limit constraint of the file size as a constraint of the online storage service and reduction in the communication cost are realized. A kernel module including logical volumes on the online storage service divides a file into block files at a fixed length and stores and manages the block files to prevent the upper-limit constraint of the file size. When a READ/WRITE request is generated for a mounted file system, only necessary block files are downloaded and used from the online storage service based on an offset value and size information to optimize the communication and realize the communication cost reduction.Type: ApplicationFiled: March 31, 2010Publication date: September 6, 2012Applicant: HITACHI SOLUTIONS, LTD.Inventors: Yasuhiro Kirihata, Hideyuki Kashiwase
-
Publication number: 20120102080Abstract: Provided is a computer system configured so that security compliance problems can be avoided and an access control model which can be uniquely customized can be implemented by extending the storage capacity to an external storage service by means of integrated management of an existing NAS(s) and the external storage service, and controlling the optimum data placement according to the confidentiality and importance level of data. In a computer system according to this invention, a local storage system includes an extended server for integrating a NAS(s) existing in the local storage system with an external storage service and thereby providing a client with a storage area as a single virtual NAS.Type: ApplicationFiled: May 20, 2010Publication date: April 26, 2012Applicants: HITACHI SOFTWARE ENGINEERING CO., LTD., HITACHI, LTD.Inventors: Yasuhiro Kirihata, Michael Hay, Kota Yamaguchi
-
Publication number: 20110167098Abstract: In order to enable backup and restoration of data even in a hetero file format environment by using preexisting backup tools, the present invention provides with the following configuration. The configuration is characterized by: a BK tool cooperative module 11 for mediating the instruction of such as backup received from a master server 2; a data handling module 12 capable of such as backup and restoration in response to the instruction; a file format analyzing module 13 capable of recognizing file format of a file stored in a sub-volume 32; and FS drivers of plural types necessary to each type of file system; wherein the data handling module 12, in response to a received instruction, is capable of mounting a sub-volume 32 via a FS driver (1˜N) 14 conformable to file format of a designated file, thereby allowing backup, restore and so on.Type: ApplicationFiled: July 27, 2009Publication date: July 7, 2011Applicant: HITACHI SOFTWARE ENGINEERING CO., LTD.Inventor: Yasuhiro Kirihata
-
Publication number: 20110022811Abstract: To reduce the size of backup data, increase the backup speed, and solve a problem that the amount of unnecessary writing could undesirably increase in a restoration process, which would otherwise require physical disks with a capacity greater than the size of a virtual volume. On a backup server having mounted thereon a virtual volume that is the target to be backed up and restored, read/write access to only the blocks of data areas is performed by a device driver that filters I/O access to a device from a file system on the basis of the data mapping information of the virtual volume, whereby read/write access to unnecessary portions is avoided. Thus, it is possible to reduce the size of backup data, increase the backup speed, and prevent an increase in the amount of unnecessary writing to the virtual volume in a restoration process.Type: ApplicationFiled: August 21, 2009Publication date: January 27, 2011Applicant: HITACHI SOFTWARE ENGINEERING CO., LTD.Inventors: Yasuhiro Kirihata, Kouichi Gondou, Yoshiki Sameshima, Toru Hashimoto
-
Publication number: 20100153716Abstract: In a system to realize prevention of leakage and loss of confidential information by inhibiting writing into a secondary storage device or writing into external storage media, created confidential data is archived by a secure method without being lost if communication is not available and a file server cannot save the information. For this purpose, first, a designated folder is created on a non-volatile storing memory being built in a mobile terminal and created confidential data is saved in the folder. Then, a filter driver controls access to the designated folder to prevent leakage of information by an application in a mobile phone by a malicious user. Further, a function to remove data in the designated folder in the mobile terminal from a mobile terminal management server through a telephone network prevents loss of saved confidential data due to loss of the mobile terminal.Type: ApplicationFiled: October 10, 2007Publication date: June 17, 2010Inventors: Yasuhiro Kirihata, Nobuyuki Ohama
-
DATA PROCESSING CONTROL METHOD, INFORMATION PROCESSING APPARATUS, AND DATA PROCESSING CONTROL SYSTEM
Publication number: 20090319731Abstract: In a system which realizes to prevent leakage/loss of secret information by prohibiting a write operation to a secondary storage apparatus and a write operation to an external medium, an automatic collection of secret data to a server is executed, an existing application mode of PC is not damaged, and then an update of OS and an application is executed. The present invention places a secondary storage apparatus write control driver on the lower level than a file system, and redirects a write operation to the secondary storage apparatus, setting up a memory to be a primary cache, and cache data file on a cache server of a network destination to be a secondary cache. Thereby, the write operation to the secondary storage apparatus is not executed, and difference data is stored on the cache server, so that the automatic collection of secret data to the server can be realized.Type: ApplicationFiled: November 7, 2006Publication date: December 24, 2009Inventor: Yasuhiro Kirihata -
Publication number: 20090241114Abstract: There is realized such a method for safely using and storing secret data that electronic copies of the secret data do not flow out of a particular external storage medium. In the present invention, a special format area which cannot be recognized from an ordinary PC is created in an external storage medium, and secret data is stored therein. By making a configuration in which a function of mounting the special format area is provided, and secret data in the special format area is edited and used on a work OS on which network access is inhibited and writing to a secondary storage device is inhibited, the destination of storing the secret data after it is used is limited to the special format area on the external storage medium so that outflow of the secret data from the external storage medium is prevented.Type: ApplicationFiled: July 29, 2008Publication date: September 24, 2009Applicant: Hitachi Software Engineering Co., Ltd.Inventor: Yasuhiro Kirihata
-
Publication number: 20090077096Abstract: A secure file holding system that can, for confidential data from a PC to a mobile phone, prevent flow-out of data due to wrong operation of the mobile phone by an authorized user and malicious take-out of data by authorized and unauthorized users. The file holding system has a function of reserving part of an execution memory as volatile memory or part of a non-volatile memory as a non-volatile file and coupling the part to the non-volatile memory accessible as a folder in which a user saves data at OS startup, a function of redirecting access to the folder to the volatile memory or the file during OS startup, a function of capturing an input/output request to the non-volatile memory and constraining access to the folder by a processes other than a file management process, and a function of deleting the volatile memory or the file at OS termination.Type: ApplicationFiled: March 18, 2008Publication date: March 19, 2009Inventors: Nobuyuki Ohama, Yasuhiro Kirihata
-
Publication number: 20070220226Abstract: In a user terminal having a feature to prevent the leakage or loss of classified information by inhibiting the writing in a secondary storage unit or out in an external recording medium, the user is allowed to update an OS patch, a virus pattern and the like as needed while preventing unauthorized activities. In a first step, a first control means provided in the user terminal causes a login mode selection screen to be displayed upon login to the user terminal, on which screen the user is asked to select either a write inhibit mode regarding the secondary storage unit or an update mode for updating an OS patch or the like. In a second step, a second control means provided in the user terminal causes, in response to a mode selection operation received in the first step, the secondary storage unit to be placed in a write inhibit state or an update allowed state, and then starts up the user terminal with the secondary storage unit placed in the write inhibit state or the update allowed state.Type: ApplicationFiled: March 9, 2007Publication date: September 20, 2007Inventor: Yasuhiro KIRIHATA