PROTECTING SELECTED DISKS ON A COMPUTER SYSTEM

    公开(公告)号:US20220027493A1

    公开(公告)日:2022-01-27

    申请号:US17361849

    申请日:2021-06-29

    摘要: A server kernel processing system receives an input/output (I/O) request from a user mode computing environment. The I/O request is analyzed to determine whether it is a modification request to modify data in a target volume. If so, target analysis logic determines whether the request is for a target volume that is within a first or second protected volume. If the request is to modify data stored in the first protected volume, the request is blocked. If the request is to modify data in a second protected volume, then a whitelist is examined to determine whether the requesting process and user are on the whitelist. If not, the request is also blocked.

    Network path redirection
    3.
    发明授权

    公开(公告)号:US11134023B2

    公开(公告)日:2021-09-28

    申请号:US16666078

    申请日:2019-10-28

    摘要: A method for directing network traffic includes, at a network device, receiving network traffic provided by one or more client computing devices. The network device directs the network traffic to a service entity over a first network path. A path quality indicator is received that indicates whether the network traffic directed over the first network path satisfies one or more experience criteria. Based at least on the path quality indicator indicating that the network traffic directed over the first network path does not satisfy the one or more experience criteria, the network device redirects some or all of the network traffic to the service entity over a second network path.

    Protecting selected disks on a computer system

    公开(公告)号:US11080416B2

    公开(公告)日:2021-08-03

    申请号:US16154197

    申请日:2018-10-08

    摘要: A server kernel processing system receives an input/output (I/O) request from a user mode computing environment. The I/O request is analyzed to determine whether it is a modification request to modify data in a target volume. If so, target analysis logic determines whether the request is for a target volume that is within a first or second protected volume. If the request is to modify data stored in the first protected volume, the request is blocked. If the request is to modify data in a second protected volume, then a whitelist is examined to determine whether the requesting process and user are on the whitelist. If not, the request is also blocked.