G06F16/148

Method, system, and apparatus for probabilistic identification of encrypted files
11544390 · 2023-01-03 · ·

A mechanism for probabilistically determining the contents of an encrypted file is provided, such that a transfer of the encrypted file can be restricted according to rules associated with an unencrypted version of the file. Embodiments generate a file size table of a subset of files, where each entry of the file size table includes a size information regarding the unencrypted file. Embodiments compare the size of the encrypted file against the file sizes and compressed file size ranges to determine whether the encrypted file has a match. If the size of the encrypted file has a single match in the table, then there is a high probability that the file associated with the matching entry is the unencrypted version of the encrypted file. Rules associated with restricting access of the file related to the matching entry can be used to control transfer of the encrypted file.

Techniques for handling letter case in file systems

Described herein are technologies that provide an element of security related to file system operations. Individual nodes in a file system, such as a directory or a file, can be associated with information that describes how to handle letter case when a file name included in a file system operation request is used to locate a file in the file system. For example, a case sensitive designation associated with a directory can require a case sensitive match between a file name included in a request and a file name included in the directory, in order to perform the requested file system operation. In another example, a case preferring designation associated with a directory first checks for a case sensitive match between file names. If a case sensitive match does not exist, then a case insensitive match between the file names can be used to perform the requested file system operation.

BATCH DELETION METHOD AND APPARATUS FOR CACHE CONTENTS, DEVICE AND READABLE STORAGE MEDIUM
20220405244 · 2022-12-22 ·

A batch deletion method, apparatus, and device for cached content and a non-transitory computer-readable storage medium are disclosed. The method may include: adding keywords to content identifiers which correspond to cached resources (S101); saving the content identifiers separately (S102); finding, through a keyword-based query, content identifiers meeting at least one condition (S103); locating storage paths of cached resources by using the content identifiers meeting the at least one condition (S104); and deleting the located cached resources one by one (S105).

METHOD OF RECOMMENDING EMOTICONS AND USER TERMINAL PROVIDING EMOTICON RECOMMENDATION
20220404952 · 2022-12-22 ·

Provided is a method for recommending emoticons, the method including: displaying, by a user terminal, a first emoticon related to first meta information; and displaying, by the user terminal, first and second recommendation groups, the first and second recommendation groups each comprising at least one recommended emoticon corresponding to the first emoticon, wherein at least one recommended emoticon included in the first recommendation group is related to at least one piece of first associated meta information corresponding to the first meta information, wherein at least one recommended emoticon included in the second recommendation group is related to at least one piece of second associated meta information that corresponds to the first meta information and is different from the first associated meta information, and wherein the first meta information and the first and second associated meta information are different.

ONLINE ANALYTICAL PROCESSING PRECOMPUTATION ENGINE OPTIMIZATION METHOD BASED ON OBJECT STORAGE AND APPLICATION
20220398259 · 2022-12-15 ·

The Online Analytical Processing (OLAP) precomputation engine optimization method based on an object storage, and application, and provides three optimization directions: reduction of an object renaming operation, data consistency check, and inversion of a logical path of an index file. A mapping relationship of a file before and after renaming is matched through a file mapping table added to a metadata layer, and a renaming operation on a bottom layer of a file system is reduced. Logical path inversion of a partition directory hierarchical structure of the file is corresponded to a prefix of the file in the object storage, and the object storage is rapidly queried and read. Logical verification is added to a read operation, a deletion operation, and a write operation, and the data consistency is checked.

SYSTEM AND METHOD FOR INSTANT ACCESS AND MANAGEMENT OF DATA IN FILE BASED BACKUPS IN A BACKUP STORAGE SYSTEM USING TEMPORARY STORAGE DEVICES
20220398164 · 2022-12-15 ·

A method for managing file based backups (FBBs) includes obtaining, by a FBB metadata file manager and by an application, a file request for a file stored in a FBB, wherein the FBB is stored in a backup storage system, identifying, using a FBB metadata file of the FBB, a storage location of the file, initiating generation of a temporary storage device, storing a copy of the file in the temporary storage device using the storage location and the FBB, and initiating, after the storing, access to the copy of the file for the application.

Scaling HDFS for hive
11526464 · 2022-12-13 · ·

A non-transitory computer-readable storage media storing program instructions which, when executed by one or more processors, cause the one or more processors to perform: receiving a query to the distributed file system; determining a particular partition, associated with the data warehouse system, targeted by the query; accessing a repository associated with the data warehouse system to determine whether a partition-to-cluster mapping entry for the particular partition targeted by the query exists in the repository; in response to a determination that the entry for the particular partition exists in the repository, obtaining, from the entry for the particular partition, an identifier of a particular cluster to which the particular partition is assigned by the entry for the particular partition, the particular cluster being one of a plurality of clusters of the distributed file system, each cluster of the plurality of clusters having one name node and a plurality of data nodes.

Multi-trigger personalized virtual repository
11526472 · 2022-12-13 ·

A virtual repository system with robust item management automatically derives item data from accessed current and past transactions. The system interfaces with merchant systems to receive current and archived transaction data, scans emails for current and past transaction data, monitors browser data for online transaction data, and accepts manual input. Data obtained from all sources is collated and stored in a cache for user validation, whereupon it is added to a virtual repository. Triggers prompt the delivery of responsive results including information from shared virtual repositories.

Systems and methods for term prevalance-volume based relevance
11526672 · 2022-12-13 ·

Techniques for prevalence-volume based relevance are provided. Corresponding systems and methods may include ingesting a corpus of documents; receiving a search operator; segmenting the corpus of documents into (i) a first set of documents that matches the search operator, and (ii) a second set of documents that do not match the search operator; extracting a first and second token list of tokens; calculating a prevalence-volume value for tokens included in the first and second token lists; generating a prevalence-volume ratio (PVR) matrix that associates tokens included in the first and/or second token lists with a PVR value, wherein the PVR value for a particular token is a ratio between the prevalence-volume value of the particular token for the first set of documents and the prevalence-volume value of the particular token for the second set of documents; and associating the search operator with the generated PVR matrix.

Database log performance

A computer-implemented method improves the performance of write ahead logging. The method includes generating a set of query data and a set of log data, where the set of log data is configured to create a write ahead log, and the set of query data is configured to make changes to data in a database. The method also includes writing the set of query data to a virtual file system. The method further includes separating the set of log data into a set of control intervals, where each control interval includes an entry. The method includes writing, each entry into a log buffer, where the writing the set of query data to the virtual file system and the writing each entry into the log buffer are performed in parallel. The method also includes combining each entry into a complete log.