Checking Consistency Patents (Class 707/690)
-
Publication number: 20130041872Abstract: A method and system is disclosed for providing a cloud storage system supporting existing APIs and protocols. The method of storing cloud storage system (CSS) object metadata separates object metadata that describes each CSS object as a collection of named chunks with chunk locations specified as a separate part of the metadata. Chunks are identified using globally unique permanent identifiers that are never re-used to identify different chunk payload. While avoiding the bottleneck of a single metadata server, the disclosed system provides ordering guarantees to clients such as guaranteeing access to the most recent version of an object. The disclosed system also provides end-to-end data integrity protection, inline data deduplication, configurable replication, hierarchical storage management and location-aware optimization of chunk storage.Type: ApplicationFiled: August 12, 2011Publication date: February 14, 2013Inventors: Alexander Aizman, Caitlin Bestler
-
Patent number: 8375007Abstract: A method to expose status information is provided. The status information is associated with metadata extracted from multimedia files and stored in a metadata database. The metadata information that is extracted from the multimedia files is stored in a read queue to allow a background thread to process the metadata and populate the metadata database. Additionally, the metadata database may be updated to include user-define metadata, which is written back to the multimedia files. The user-defined metadata is included in a write queue and is written to the multimedia files associated with the user-defined metadata. The status of the read and write queues are exposed to a user through a graphical user interface. The status may include the list of multimedia files included in the read and write queues, the priorities of each multimedia file, and the number of remaining multimedia files.Type: GrantFiled: June 21, 2011Date of Patent: February 12, 2013Assignee: Microsoft CorporationInventors: Alexander S. Brodie, Benjamin L. Perry, David R. Parlin, Jae Pum Park, Michael J. Gilmore, Scott E. Dart
-
Publication number: 20130036098Abstract: Systems and methods are disclosed for checking the data integrity of a data object copied between storage pools by comparing data fingerprints of data objects, comprising scheduling a series of successive copy operations over time for copying a data object from a source data store to a target data store; generating a partial fingerprint of the data object at the source data store that creates a fingerprint from a subset of the data object; sending the partial fingerprint of the data object to the target data store; sending any new data contents to the target data store; and creating a partial fingerprint of the data object at the target data store and comparing it to the received partial fingerprint to determine if they differ, thereby allowing incremental verification that the copy of the data object at the target data store is the same as at the source data store.Type: ApplicationFiled: August 1, 2012Publication date: February 7, 2013Applicant: Actifio, Inc.Inventors: Madhav MUTALIK, Philip J. ABERCROMBIE, Christopher A. PROVENZANO
-
Publication number: 20130036097Abstract: Systems and methods are disclosed for efficiently creating a data fingerprint to identify or characterize contents of a data object by using a selection function to select a plurality of non-contiguous regions from the data object, the selected regions each having a small number of bytes relative to the number of bytes in the data object and being distributed throughout the data object so that the selected regions comprise a sparse subset of the data of the data object yet provide a significant probability of including bytes that change if the data object were modified; and performing a hash operation on the data to produce a fingerprint based on the sparse subset of the data object. The data fingerprint thereby efficiently provides an indication of the contents of the data object, so that comparing data fingerprints can determine if the data objects are different if the corresponding fingerprints are different.Type: ApplicationFiled: August 1, 2012Publication date: February 7, 2013Applicant: ACTIFIO, INC.Inventors: Madhav MUTALIK, Philip J. ABERCROMBIE, Christopher A. PROVENZANO
-
Publication number: 20130036099Abstract: A method of operation of a navigation system includes: receiving a change request with a proposed change for an item; verifying a validity of the change request based on a confidence level meeting or exceeding a change threshold with a control unit; and updating a target element of the item based on the validity of the proposed change for avoiding an incorrect update to the target element for displaying on a device.Type: ApplicationFiled: October 11, 2012Publication date: February 7, 2013Applicant: TELENAV, INC.Inventor: Winston Yonglong Liu
-
Patent number: 8370306Abstract: A computer-implemented method for recovering from continuous-data-protection blackouts may include identifying a continuous data protection system configured to copy each change made to a set of data. The computer-implemented method may also include identifying a set of changes made to the set of data but missed by the continuous data protection system. The computer-implemented method may further include identifying an alternate change-tracking system that tracks changes made to the set of data. The computer-implemented method may additionally include updating the continuous data protection system with the missed set of changes as tracked by the alternate change-tracking system. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: November 13, 2009Date of Patent: February 5, 2013Assignee: Symantec CorporationInventor: Taher Vohra
-
Publication number: 20130031061Abstract: A system and method of identifying fraudulent data in a contact database is disclosed herein. In some embodiments, a set of contact records is received where each of the contact records includes a set of contact field values corresponding to a set of contact fields. Some embodiments determine whether a similar content pattern exists in the contact records using at least one of the set of contact field values. In some embodiments, a determination is made as to whether an unusual content pattern exists in the contact records using at least one of the set of contact field values. The set of contact records is flagged when at least one of the similar content pattern or the unusual content pattern is determined to exist in the contact records.Type: ApplicationFiled: January 24, 2012Publication date: January 31, 2013Applicant: salesforce.com Inc.Inventor: Arun Kumar Jagota
-
Patent number: 8364650Abstract: A method and a system for maintaining coherence of cache contents in a multi-tiered architecture of servers are described. This includes a front tier of satellite servers, each operating a local cache, and a middle tier of central servers each operating a central cache. Central servers interface with databases through database servers to retrieve the data elements used to construct objects and store them in central caches. Once constructed, objects are attributed a time-to-live (TTL) and stored in central caches then, forwarded to the satellite servers where they are stored in local caches before being delivered to the software applications that have requested them. They are invalidated when outdated and reconstructed from a central server from where they are forwarded to all central caches and to the local caches where they are needed.Type: GrantFiled: September 27, 2006Date of Patent: January 29, 2013Assignee: Amadeus S.A.S.Inventors: Benoit Janin, Rémy Gole, Luc Isnardy, Rudy Daniello, Wayne Rubenstein
-
Publication number: 20130024430Abstract: A method, computer program product, and system for analyzing data within one or more databases, comprising selecting one or more databases for analysis, each database comprising one or more database objects comprising one or more data values, applying a function to each data value in each database object within the one or more databases, where the function produces function values limited to a predetermined range, identifying for analysis the data values producing a certain function value within the predetermined range to form a sampled data set, and analyzing the sampled data set to determine relationships between the database objects within and across the one or more databases.Type: ApplicationFiled: July 19, 2011Publication date: January 24, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Alexander Gorelik
-
Patent number: 8359294Abstract: An incorrect hyperlink detecting apparatus which can detect a semantic inconsistency of a hyperlink with high accuracy is provided.Type: GrantFiled: January 15, 2007Date of Patent: January 22, 2013Assignee: International Business Machines CorporationInventor: Noriko Ohshima
-
Publication number: 20130018850Abstract: A computer implemented method for configuring multiple products within a defined grouping of user-configurable products including providing a computer-implemented database of user-configurable products at a first computer, each user-configurable product including design parameters distinguishing the user-configurable product from other user-configurable products, each design parameter including a range of values, providing a listing of user-configurable products based on one or, more product configuration selections provided by a user, receiving a selection of a plurality of user-configurable products from the listing of user-configurable products, the selection including identifying a grouping to be associated with the each user-configurable product to create at least two virtual product groups. Each grouping includes at least two user-configurable products.Type: ApplicationFiled: July 12, 2012Publication date: January 17, 2013Inventors: Kevin Houlihan, Nathan Herbst, James Lang
-
Patent number: 8356016Abstract: The disclosed embodiments provide a system that facilitates forwarding filesystem-level information to a storage management system. During operation, a computing device receives a request for a file operation from a client computing device, and issues one or more filesystem operations in response. A filesystem device driver extracts filesystem-level information from these filesystem operations, and then forwards the extracted filesystem-level information to the storage management system.Type: GrantFiled: September 2, 2011Date of Patent: January 15, 2013Assignee: Panzura, Inc.Inventor: Randy Yen-pang Chou
-
Publication number: 20130013558Abstract: A method and apparatus for semantic checking for synchronization. In one embodiment, a process is provided to define a relationship model for each data type in a first set of data and may store each relationship model. For each entry in a second set of data to be synchronized with the first set of data, the process determines if the entry violates the relationship model for the data type corresponding to the entry.Type: ApplicationFiled: July 8, 2011Publication date: January 10, 2013Inventor: Andrew T. Belk
-
Patent number: 8352440Abstract: Provided are techniques for identifying an incremental consistency checking job. During a run of the incremental consistency checking job, one or more queries are issued for a set of content holding objects in an object repository.Type: GrantFiled: June 28, 2010Date of Patent: January 8, 2013Assignee: International Business Machines CorporationInventor: David Aaron Hanson
-
Publication number: 20120330901Abstract: Methods and systems for validating ingested data are disclosed. In accordance with the methods and systems, data elements can be received for storage in slots of an individual descriptor in a storage medium. In addition, at least one validation test can be selected based on a weighting of the data elements that indicates a respective degree of importance of the data elements. The selected validation test or tests can be applied to the data elements stored in the slots to generate respective validation results. Further, a validation score indicating a sufficiency of the stored data elements can be generated based on the validation results.Type: ApplicationFiled: September 5, 2012Publication date: December 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Varun Bhagwan, Tyrone W. A. Grandison, Daniel F. Gruhl, Kilian M. Pohl
-
Publication number: 20120330900Abstract: The present subject matter relates to systems and methods for database sampling. The method comprises identifying at least one query table and one or more associated tables amongst a plurality of tables in a production database, based on filtering criteria. Further, the method comprises generating a key value list for the at least one query table and each of the one or more associated tables based on an order indicated by an order list. Based on the generated key value list, the sample data is extracted in a reverse order indicated by the order list, from the at least one query table and each of the one or more associated tables.Type: ApplicationFiled: February 27, 2012Publication date: December 27, 2012Inventors: Nikhil Patwardhan, Sumit Johri, Amol Limaye, Ashim Roy, Rupali Kulkarni, Sachin Lodha
-
Patent number: 8341128Abstract: Transaction processing is disclosed. A first transaction associated with a first system tenant is received. The first transaction is associated with a transaction effective time. It is determined whether the first transaction modifies data. In the event that the first transaction modifies data, it is determined whether a second transaction is executing that modifies data associated with the first system tenant. In the event that there is not a second transaction executing, the first transaction is executed with respect to the transaction effective time.Type: GrantFiled: May 9, 2008Date of Patent: December 25, 2012Assignee: Workday, Inc.Inventor: Jon Ruggiero
-
Publication number: 20120324588Abstract: A name of one or more entity classes of the data model may be refined to conform to a naming convention. A semantic meaning of each of the names and one or more attributes of each entity class may be determined. It may be determined that the name of a first entity class is semantically similar to the name of a second entity class based on a semantic distance between the semantic meaning of the names, where a substantial similarity may be determined between the first entity class and the second entity class by comparing the semantic meaning of the one or more attributes of the first entity class to the semantic meaning of the one or more attributes of the second entity class. The data model may be normalized based on the substantial similarity.Type: ApplicationFiled: August 28, 2012Publication date: December 20, 2012Applicant: SAP AGInventors: Gunther Stuhec, Florian Gessner, Jens Lemcke
-
Patent number: 8326807Abstract: A method for measuring consistability of a distributed storage system is disclosed. The method includes determining at least one consistency level that the distributed storage system can provide. A plurality of failure classes can be determined for the distributed storage system. A probability of the distributed storage system to be in each of the plurality of failure classes can be measured. Each failure class can be mapped to the at least one consistency level. The probability of each failure class for each consistency level can be summed to determine an expected portion of time that the distributed storage system provides each consistency level.Type: GrantFiled: January 23, 2009Date of Patent: December 4, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Amitanand Aiyer, Eric A. Anderson, Xiaozhou Li, Mehul A. Shah, John Johnson Wylie
-
Patent number: 8326808Abstract: A method of verifying the consistency in a hierarchical database includes: generating a pointer record by acquiring a reference point stored in the hierarchical database and associating a first reference point identification value determined from a storage location of the reference point with pointer information retained at the reference point; generating a segment record by acquiring a segment stored in the hierarchical database and associating verification data with a retention address of the acquired segment, the verification data giving a second reference point identification value in connection with the calculation module, the calculation module calculating, for a segment in the hierarchical database, a reference point identification value used to identify a reference point which points to the segment; and verifying the consistency of a chain formed in the hierarchical database from the reference point to the segment by comparing the segment record with the pointer record.Type: GrantFiled: March 19, 2010Date of Patent: December 4, 2012Assignee: International Business Machines CorporationInventors: Shigeko Mori, Toshikazu Takahashi
-
Publication number: 20120303593Abstract: Presented herein are methods of continuously verifying data and repairing errors introduced during replication. In a particular embodiment, a primary data store sends out information sufficient to create a checkpoint together with a checksum for the data being verified at that checkpoint. At the secondary data store, a checkpoint is created in accordance with the checkpointing information, and a checksum is calculated over the indicated data at the created checkpoint. If the calculated checksum disagrees with the received checksum, additional checksums are calculated over subranges of the indicated data and compared with corresponding checksums over the data at the primary data store. The checksums at the primary data store may be requested from the primary data store or calculated locally based on the received overall checksum. Once an erroneous entry is identified, it can then be re-replicated from the primary data store to restore data consistency.Type: ApplicationFiled: May 23, 2011Publication date: November 29, 2012Applicant: MICROSOFT CORPORATIONInventors: Bradley Gene Calder, Niranjan Nilakantan, Shashwat Srivastav, Jiesheng Wu, Abdul Rafay Abbasi, Shane Mainali, Padmanabha Chakravarthy Uddaraju
-
Patent number: 8321724Abstract: A device includes a taxonomy schema; a display link base; a calculation link base; an XBRL document memory unit which stores an instance; an error inference unit which compares a calculated value of an input value of the instance corresponding to an item element of the calculation value in accordance with the calculation link base with the input value of the instance corresponding to the calculated value based on the display link base, detects a discrepancy between the calculation value and the input value, specifies a calculation tree structure of the calculation link base including the item element in which the discrepancy is detected and a display tree structure of the display link base including the item element in which the discrepancy is detected, and infers that a state of too many or too few item elements is regarded as a discrepancy error in the case that such an item element is set only in either one of the trees and that the item element has an input that is consistent with an absolute value of theType: GrantFiled: March 24, 2009Date of Patent: November 27, 2012Assignee: Fujitsu LimitedInventor: Kazuya Tanahashi
-
Publication number: 20120296878Abstract: A check code generating means 10 generates, based on metadata of files satisfying a designated condition, a first check code uniquely representing a characteristic of a first file set whose components are files satisfying the condition. Moreover, the check code generating means 10 generates, based on metadata of files satisfying the condition, a second check code uniquely representing a characteristic of a second file set whose components are files satisfying the condition. An inconsistency detecting means 20 compares the first check code and the second check code and, based on inconsistency between the check codes, detecting inconsistency between the first file set and the second file set.Type: ApplicationFiled: January 12, 2011Publication date: November 22, 2012Applicant: NEC CorporationInventors: Masayuki Nakae, Yuki Ashino
-
Patent number: 8315991Abstract: Embodiments of the invention detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored, by mapping the table data to locations within the file system and mapping the file system locations to volume logical blocks; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks. Changes which are reflected in the bitmaps for the data, but which do not have corresponding entries in the transaction logs are flagged as unauthorized changes. Snapshots of the data, from a time prior to the time at which a flagged snapshot was taken, are identified for use in restoring data to its status prior to the unauthorized change.Type: GrantFiled: April 20, 2010Date of Patent: November 20, 2012Assignee: International Business Machines CorporationInventors: Nagapramod S. Mandagere, Mark J. Seaman, Sandeep M. Uttamchandani
-
Patent number: 8316100Abstract: Autonomic correction of incorrect identities in repositories. A communication is prepared and sent to one or more recipients. In response thereto, a notification is provided to the sender that one or more of the recipient's identities is incorrect. Based on this notification, corrective action is automatically initiated in order to locate the repository, and in particular, an entry in the repository corresponding to the incorrect identity and to take action to correct that identity.Type: GrantFiled: June 6, 2008Date of Patent: November 20, 2012Assignee: International Business Machines CorporationInventors: Michael D. Essenmacher, Thomas E. Murphy, Jr., Francis A. Pflug
-
Patent number: 8315989Abstract: A method is disclosed for checking the integrity of a database through a test of database integrity information provided in the database and integrity information provided external to the database. The integrity information may be provided in a configuration file.Type: GrantFiled: November 9, 2011Date of Patent: November 20, 2012Assignee: Roche Diagnostics Operations, Inc.Inventors: Igor Gejdos, Lawrence G. Yarian, II, Keith E. Bernard, Morris J. Young, Christopher R. Baker
-
Patent number: 8315990Abstract: A new approach for handling stream imperfections based on speculative execution involves the retraction of incorrect events facilitated using operators to remove speculatively produced incorrect output. Additionally, parameters are disclosed that define a spectrum of consistency levels. A first parameter, maximum blocking time, exposes a tradeoff between a degree of speculation and latency. A second parameter, the maximum time data is remembered before being purged from the system, exposes a tradeoff between state size and correctness. Varying these two parameters produces a spectrum of consistency levels (e.g., strong, middle, weak) which address the specific tradeoffs built into other systems. Retraction is accomplished using operators that include Select, AlterLifetime, Join, Sum, Align, and Finalize.Type: GrantFiled: November 8, 2007Date of Patent: November 20, 2012Assignee: Microsoft CorporationInventors: Roger S Barga, Jonathan D Goldstein, Mohamed Ali, Mingsheng Hong
-
Patent number: 8315988Abstract: Embodiments consistent with the present invention relate to methods and systems for verifying data or data communication operations of an application system. Consistent with exemplary embodiments, such methods and systems may verify a data communication operation by an application system. The methods and systems may, for example, communicate a message including data copied from a first data set and store messaging data describing the communicated message. As described, the methods and systems may then verify the communication of the message based on the first data set and the stored messaging data.Type: GrantFiled: August 31, 2006Date of Patent: November 20, 2012Assignee: SAP AGInventors: Christoph W. Glania, Thomas G. Wieczorek, Stefan A. Baeuerle, Robert Getzner, Mario A. Mueller, Till Oppert, Peter W. Engel
-
Patent number: 8311993Abstract: Some embodiments of the inventive subject matter are directed to performing sub-transactions of a long-lived transaction (LLT) in a sequence (e.g., according to an LLT flow) and writing a log entry at the performance of each of the sub-transactions that specifies results of the sub-transaction. Some embodiments do not require generating any compensating transactions during performance of the sub-transactions. Some embodiments are further directed to detecting that an interruption occurs to the LLT and repeating, or initiating re-performance of the LLT from the beginning of the sequence following the flow of the LLT from its beginning. During the re-performance of the LLT, some embodiments are further directed to checking the log entry at each sub-transaction to determine whether the sub-transaction was performed successfully before the interruption.Type: GrantFiled: September 10, 2010Date of Patent: November 13, 2012Assignee: International Business Machines CorporationInventors: Manoj N. Kumar, Gunisha Madan, Grover H. Neuman
-
Patent number: 8311988Abstract: Systems and methods are provided for performing backup operations while a user is using a device. In one implementation, a method is provided. A backup operation of data including a plurality of related items is initiated. Modifications to one or more items of the plurality of related items are monitored for during the backup operation. The backup operation is completed. If a modification occurred to one or more items, a second backup operation is performed for the modified items.Type: GrantFiled: August 4, 2006Date of Patent: November 13, 2012Assignee: Apple Inc.Inventors: Pavel Cisler, Eric Weiss, Peter McInerney, Dominic Giampaolo
-
Publication number: 20120284238Abstract: A “forward” delta data management technique uses a “sparse” index associated with a delta file to achieve both delta management efficiency and to eliminate read latency while accessing history data. The invention may be implemented advantageously in a data management system that provides real-time data services to data sources associated with a set of application host servers. A host driver embedded in an application server connects an application and its data to a cluster. The host driver captures real-time data transactions, preferably in the form of an event journal that is provided to the data management system. In particular, the driver functions to translate traditional file/database/block I/O into a continuous, application-aware, output data stream. A given application-aware data stream is processed through a multi-stage data reduction process to produce a compact data representation from which an “any point-in-time” reconstruction of the original data can be made.Type: ApplicationFiled: June 1, 2012Publication date: November 8, 2012Applicant: QUEST SOFTWARE, INC.Inventor: Siew Yong Sim-Tang
-
Patent number: 8306954Abstract: Methods and systems for efficient file replication are provided. In some embodiments, one or more coarse signatures for blocks in a base file are compared with those coarse signatures for blocks of a revised file, until a match is found. A fine signature is then generated for the matching block of the revised file and compared to a fine signature of the base file. Thus, fine signatures are not computed unless a coarse signature match has been found, thereby minimizing unneeded time-consuming fine signature calculations. Methods are also provided for determining whether to initiate a delta file generation algorithm, or whether to utilize a more efficient replication method, based upon system and/or file parameters. In accordance with additional embodiments, the lengths of valid data on physical blocks are obtained from physical block mappings for the files, and these lengths and mappings are utilized for delta file generation, to minimize unnecessary signature computations.Type: GrantFiled: November 22, 2010Date of Patent: November 6, 2012Assignee: Oracle International CorporationInventors: Piyush Kumar Srivastava, Madhusudhana Honnuduke Srinivasa Murthy
-
Publication number: 20120278290Abstract: A database archiving model error detection and correction system including an error detection module to detect a referential integrity error in a database archiving model. A column in a foreign key and/or a corresponding unique key column to the foreign key column may include an assigned data mask operation. The error detection module may detect the referential integrity error if a corresponding other column in a foreign key-unique key relationship does not have an identical assigned data mask operation, or if the assigned data mask operation will not result in a unique output value for a unique input value.Type: ApplicationFiled: April 29, 2011Publication date: November 1, 2012Inventors: Thomas Anthony Pinch, Cedric Dandoy
-
Publication number: 20120278261Abstract: Computer-implemented methods, systems, and articles of manufacture for determining the importance of a data item. A method includes: (a) receiving a node graph; (b) approximating a number of neighbor nodes of a node; and (c) calculating a average shortest path length of the node to the remaining nodes using the approximation step, where this calculation demonstrates the importance of a data item represented by the node. Another method includes: (a) receiving a node graph; (b) building a decomposed line graph of the node graph; (c) calculating stationary probabilities of incident edges of a node graph node in the decomposed line graph, and (d) calculating a summation of the stationary probabilities of the incident edges associated with the node, where the summation demonstrates the importance of a data item represented by the node. Both methods have at least one step carried out using a computer device.Type: ApplicationFiled: April 28, 2011Publication date: November 1, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ching-Yung Lin, Hanghang Tong, Jimeng Sun, Spyridon Papadimitriou, U Kang
-
Patent number: 8301640Abstract: A system and method for rating an essay writing using a statistical system so it can be applied on any language with very few changes. The system comprising multiple modules capable of providing a style score, a punctuation score, a spelling score, a quotation score, an enrichment score, a syntax analysis score, a focus score, an idea score and a cohesion score. The scores are then combined to provide a final overall rating of the essay.Type: GrantFiled: November 24, 2010Date of Patent: October 30, 2012Assignee: King Abdulaziz City for Science and TechnologyInventors: Mohammed A. Al Badrashiny, Mansour M. Alghamdi, Abdulaziz S. Alharbi, Mohamed I. Alkanhal, Abdulaziz O. Al-Qabbany, Naif A. Alrajhi, Ali M. Areshey
-
Patent number: 8291005Abstract: Providing consistency guarantees in a data stream processing engine is provided. Consistency tracking information is attached to data streams coming into the data stream processing engine. The consistency tracking information is propagated through a plurality of streaming operators that process the data streams within the data stream processing engine. Then, the propagated consistency tracking information is used to detect a consistent state in an output stream.Type: GrantFiled: January 7, 2008Date of Patent: October 16, 2012Assignee: International Business Machines CorporationInventors: Christian Alexander Lang, George Andrei Mihaila, Ioana Roxana Stanoi
-
Patent number: 8290914Abstract: Disclosed is a system for, and method of, determining whether records and entity representations should be delinked. The system and method need no human interaction in order to calculate internal match scores by considering data associated with an entity representation and external match scores by considering data external to the entity representation. The system and method uses the internal match scores and external match scores to make the delinking decisions.Type: GrantFiled: September 1, 2010Date of Patent: October 16, 2012Assignee: LexisNexis Risk Data Management, Inc.Inventor: David Alan Bayliss
-
Patent number: 8285689Abstract: A distributed file system and a data block consistency managing method thereof are disclosed. The method comprises: a file location register generates the values of the counters corresponding to CHUNKs and the values of the counters are simultaneously stored in file access servers and a file location register; when writing data into a CHUNK, a file access client writes data into both the main and standby file access servers and revises the values of counters of CHUNKs in the file access servers into which data is written normally; the file location register takes the CHUNK whose counter has the maximal value as the normal and valid one according to the corresponding values of the counters of corresponding CHUNK reported by the main and standby file access servers.Type: GrantFiled: July 30, 2009Date of Patent: October 9, 2012Assignee: ZTE CorporationInventors: Shoufu Du, Ruifeng Wang, Jian Cheng
-
Publication number: 20120254130Abstract: According to one embodiment, a request is received for obtaining a consistent point of data stored in a file system of a storage system having a plurality of storage units. In response to the request, retrieving a prime dependency list from a first prime segment stored in a first of the storage units, where the prime dependency list includes information identifying at least a second prime segment stored in a second of the storage units. The first and second prime segments collectively form a prime segment representing a consistent view of the file system. Each of the prime segments listed in the prime dependency list is ascertained in an attempt to generate the consistent point of data.Type: ApplicationFiled: March 31, 2011Publication date: October 4, 2012Applicant: EMC CORPORATIONInventors: Soumyadeb Mitra, Windsor W. Hsu
-
Patent number: 8280859Abstract: The present invention provides for a system and method for assuring integrity of deduplicated data objects stored within a storage system. A data object is copied to secondary storage media, and a digital signature such as a checksum is generated of the data object. Then, deduplication is performed upon the data object and the data object is split into chunks. The chunks are combined when the data object is subsequently accessed, and a signature is generated for the reassembled data object. The reassembled data object is provided if the newly generated signature is identical to the originally generated signature, and otherwise a backup copy of the data object is provided from secondary storage media.Type: GrantFiled: August 2, 2010Date of Patent: October 2, 2012Assignee: International Business Machines CorporationInventors: Matthew J. Anglin, David M. Cannon
-
Publication number: 20120246122Abstract: A method and system for integrating data-handling policies into a computer-implemented workflow model is provided. In one embodiment, a workflow editor implemented using one or more processors may include a privacy manager module configured to permit a business process designer to integrate data handling policies into a workflow model. A privacy manager module, or simply a privacy manager, may also be configured to execute a consistency check with respect to newly-created and existing data handling policies to determine whether there is a conflict among any of the data-handling policies associated with tasks and data objects of the workflow model.Type: ApplicationFiled: March 21, 2011Publication date: September 27, 2012Applicant: SAP AGInventors: Stuart Short, Samuel Paul Kaluvuri
-
Patent number: 8275754Abstract: One particular implementation conforming to aspects of the present invention takes the form of a method for tracking the stability of a data set for multiple observers. More particularly, a tracker object may be used to both mark a particular state of the data and to query if the data remains unchanged. Code that accesses the data set to calculate a result may fetch a reference to a current tracker object associated with the data set. The code may compare the current tracker object received from the data set against the tracker object associated with the last cached result. In an alternate arrangement, a state may be associated with the data set to indicate some characteristics of the data set. The state value associated with the data set may further simplify the action required by a code accessing the data set to receive an accurate calculation.Type: GrantFiled: February 20, 2008Date of Patent: September 25, 2012Assignee: Oracle America, Inc.Inventor: James A. Graham
-
Publication number: 20120229872Abstract: A computerized method for authenticating documents having VIZ sections, the method comprising capturing an image of a document to be authenticated from a scanner and enhancing the captured image, and using a processor for identifying and cropping a VIZ section in the image.Type: ApplicationFiled: November 10, 2010Publication date: September 13, 2012Applicant: AU10TIX LIMITEDInventor: Guy Dolev
-
Patent number: 8266100Abstract: This invention provides an information processing apparatus which shortens the memory access time and reduces the cost while ensuring data reliability. To accomplish this, the information processing apparatus shifts each write start timing so that data to be written in at least one memory is not influenced by noise during write when writing the same information in a plurality of memories. When reading data from a plurality of memories, the information processing apparatus compares the data with each other to estimate normal data.Type: GrantFiled: November 17, 2008Date of Patent: September 11, 2012Assignee: Canon Kabushiki KaishaInventor: Daisuke Suga
-
Patent number: 8266113Abstract: Apparatus, methods and articles of manufacture for file integrity and baseline maintenance on a computer system or systems are shown. A file integrity check is made of files on a system by hashing the files and comparing the hash to a stored hash of the files. If the comparison is false, the system requests a copy of the file from a server, which may be unknown or untrusted. The system then compares the received file to the stored hash. If the comparison is true, the copy of the file will be installed on the system. If false, the system repeats the request.Type: GrantFiled: April 1, 2003Date of Patent: September 11, 2012Assignee: Cybersoft, Inc.Inventor: Peter V. Radatti
-
Publication number: 20120226669Abstract: A method for merging a source electronic memory storage cluster into a destination electronic memory storage cluster may include designating a source storage cluster having a first configuration; designating a destination storage cluster having a second configuration; receiving a configuration database including mapping information associated with the first configuration of the source storage cluster; merging the configuration database for the source storage cluster into the destination storage cluster; identifying a conflict between the source storage cluster configuration and the destination storage cluster configuration by comparing mapping information for the imported configuration database for the source storage cluster to mapping information for a configuration database associated with the second configuration of the destination storage cluster; resolving the identified conflict between the source storage cluster configuration and the destination storage cluster configuration; and merging the configuratType: ApplicationFiled: March 4, 2011Publication date: September 6, 2012Applicant: LSI CORPORATIONInventors: Martin Jess, Keith W. Holt
-
Publication number: 20120226668Abstract: Managing database recovery time. A method includes receiving user input specifying a target recovery time for a database. The method further includes determining an amount of time to read a data page of the database from persistent storage. The method further includes determining an amount of time to process a log record of the database to apply changes specified in the log record to a data page. The method further includes determining a number of dirty pages that presently would be read in recovery if a database failure occurred. The method further includes determining a number of log records that would be processed in recovery if a database failure occurred. The method further includes adjusting at least one of the number of dirty pages that presently would be read in recovery or the number of log records that would be processed in recovery to meet the specified target recovery time.Type: ApplicationFiled: March 4, 2011Publication date: September 6, 2012Applicant: Microsoft CorporationInventors: Robin Dhananjay Dhamankar, Hanumantha Rao Kodavalla
-
Patent number: 8260811Abstract: Each time the file access request is received, it is discriminated whether there is an ACL which corresponds with the file system of the type following the switching in the file designated by the file access request. In cases where the judgment result is that there is no such ACL, an ACL which corresponds with the file system of the type following the switching is generated on the basis of an ACL which corresponds with the file system of the type prior to the switching which is associated with the designated file, and the ACL thus generated is used to control access in accordance with the received file access request.Type: GrantFiled: January 28, 2008Date of Patent: September 4, 2012Assignee: Hitachi, Ltd.Inventors: Akihiro Urano, Takaki Nakamura, Hitoshi Kamei, Masakuni Agetsuma, Yasuo Yamasaki
-
Patent number: 8260758Abstract: A method and system for performing at least one transaction on at least one column of a table in a database system is disclosed. The method includes determining whether a first transaction of the at least one transaction fulfills all of at least one criteria. The method further includes ensuring that the at least one column is in a shared numeric lock if the first transaction fulfills all of the at least one criteria, wherein the shared numeric lock is a lock that allows at least a second transaction fulfilling all of the at least one criteria to access the same column concurrently with the first transaction without releasing the shared numeric lock between transactions, and wherein the shared numeric lock is released only after all of the transactions fulfilling all of the criteria have completed processing. The method further includes processing the first transaction.Type: GrantFiled: October 10, 2008Date of Patent: September 4, 2012Assignee: SAP AGInventor: Konduru Israel Rajakumar
-
Publication number: 20120221533Abstract: A hierarchical compression tester and associated method stored in a computer readable medium employs a grid-based storage capacity wherein a storage unit is defined by a grouping of data blocks. Each data block is stored in one of a plurality of storage devices. Each stored data block has a data portion and a data integrity field (DIF) including a data reliability qualifier (DRQ) indicating whether the respective data portion is valid. The tester also has a logical device allocation map that includes a storage unit descriptor array that identifies one or more storage units corresponding to a selected logical address. The logical device allocation map has a DIF array that identifies whether any of the data blocks in the one or more storage units corresponding to the selected logical address includes invalid data.Type: ApplicationFiled: February 25, 2011Publication date: August 30, 2012Applicant: SEAGATE TECHNOLOGY LLCInventors: John Oliver Burness, Richard Franklin Lary