COMPUTER MACHINE AND ACCESS CONTROL METHOD
First Claim
1. A computer machine comprising:
- a local disk;
a memory;
a virtual machine monitor configured to run in the computer machine;
virtual machines configured to simultaneously run on the virtual machine monitor and comprising a client virtual machine and a file server virtual machine in which an internal file server accessible from the client virtual machine is executed;
a virtual machine manager configured to manage a part of the local disk and a part of the memory and to control booting of the virtual machines;
a monitoring module configured to monitor whether a communication with an external server in which an external file server is executed via a network is possible;
an access control module configured to access to a file stored in the external file server or the internal file server when the client virtual machine tries to accesses the file and the monitoring module determines that the communication is possible, and to access to a duplicate file which is a duplicate of the file and is stored in the part of the local disk or the part of the memory when the client virtual machine tries to access to the file and the monitoring module determines that the communication is impossible after determining that the communication is possible; and
a file deletion module configured to delete the duplicate file when the monitoring module detects the communication is impossible in a preset time.
4 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment, a computer machine includes a client virtual machine and a file server virtual machine configured to simultaneously run, a virtual machine manager configured to control booting of the client and file server virtual machines, a monitoring module configured to monitor whether a communication with an external file server is possible, an access control module configured to access to a duplicate file which is a duplicate of the file and is stored in a part of a local disk or a part of a memory which are managed by the monitoring module when the monitoring module determines that the communication is impossible after determining that the communication is possible, and a file deletion module configured to delete the duplicate file when the monitoring module detects the communication is impossible in a preset time.
72 Citations
8 Claims
-
1. A computer machine comprising:
-
a local disk; a memory; a virtual machine monitor configured to run in the computer machine; virtual machines configured to simultaneously run on the virtual machine monitor and comprising a client virtual machine and a file server virtual machine in which an internal file server accessible from the client virtual machine is executed; a virtual machine manager configured to manage a part of the local disk and a part of the memory and to control booting of the virtual machines; a monitoring module configured to monitor whether a communication with an external server in which an external file server is executed via a network is possible; an access control module configured to access to a file stored in the external file server or the internal file server when the client virtual machine tries to accesses the file and the monitoring module determines that the communication is possible, and to access to a duplicate file which is a duplicate of the file and is stored in the part of the local disk or the part of the memory when the client virtual machine tries to access to the file and the monitoring module determines that the communication is impossible after determining that the communication is possible; and a file deletion module configured to delete the duplicate file when the monitoring module detects the communication is impossible in a preset time. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An access control method of a computer machine comprising a local disk, a memory, virtual machines comprising a client virtual machine and a file server virtual machine on which an internal file server accessible from the client virtual machine is executed and which simultaneously run on the virtual machine monitor, and a virtual machine manager configured to manage a part of the local disk and a part of memory and to control the booting of the virtual machines, the method comprising:
-
monitoring whether a communication with an external server on which an external file server is operated via a network is possible; accessing a file stored in the external server or the internal file server when the client virtual machine tries to access the file and it is determined that the communication is possible; accessing to a duplicate file which is a duplicate of the file and is stored in the part of local the local disk or the part of the memory when the client virtual machine tries to access to the file and the monitoring module determines that the communication is impossible after determining that the communication is possible; and deleting the duplicate file when it is detected that the communication is impossible in a preset time.
-
Specification