1. Field of the Invention
The present invention relates to an apparatus, method, and program for partitioning and managing logics which are present in a subsystem, and a recording medium for recording the program.
2. Description of the Related Art
A storage subsystem is proposed which is expected to be accessed from a variety of types of computers and which has a port to which an interface for connecting to a plurality of computers can be applied, a logical unit (LU) which can be accessed from the computers via said port, one or a plurality of storage devices for storing data which is stored in said logical unit, and a storage control device for conducting read/write control on the storage devices in order to realize security for each logical unit while effectively utilizing system resources in a conventional Logical Unit Number (LUN) security function. The computers accessing the logical unit are grouped into groups in such a manner that the computers can overlap each other. Each of the groups is assigned one or a plurality of logical units, and a management table is provided which correlates the assigned logical units and storage regions of the storage devices in such a manner that they can overlap each other.
On the other hand, the increasing storage capacity of a storage system has prompted large-scale storage consolidation. With storage consolidation, in a subsystem, there exist in a mixed manner a plurality of data belonging to a plurality of systems/applications. However, a security function in an aspect of storage management involved in storage consolidation has not sufficiently been provided by a GUI-level masking technology or conventional technology that provides security functions for data access itself.
That is, according to the conventional GUI-level masking etc., resources of upper storage management software are not partitioned on an interface which is adapted to instruct an actual storage to change a configuration. This is a problem. Therefore, such an issue is left unsolved that by using this interface, the configuration can be changed arbitrarily irrespective of a partitioning unit on a GUI etc.
Further, conventionally, partitioning of resources to such an extent that the upper storage management software can recognize (at a logical-volume level) is possible, whereas partitioning of physical resources that cannot be recognized by the management software (e.g., at an HDD level) has been impossible. Furthermore, even in the case of this partitioning at the logical-volume level, it cannot be known to which physical resources the logical volumes are allocated, so that some of the resources, even if partitioned as described above, may be common physically in some cases, which remains as a problem in performance or security.
Therefore, in a case where partitioning of logics of a subsystem in which storage consolidation has been performed is managed according to the conventional method, there is a possibility that an administrator may mistakenly perform an operation such as addition/deletion even to a region of other users, administrators and companies in relation to processing such as addition/deletion because such processing can be performed on an LU by configuration changing functions of an RAID. This may lead to system panic or user data destruction.
Therefore, to accommodate storage consolidation and allow some of the configuration changing functions of an RAID for multiple administrators, in view of the above problems, the storage system and the storage management software need to have a function to guard against configuration changing of unauthorized area system area from an administrator other than the system area which is assigned for the administrator.
In view of such a background, the present invention has been made and it is an object of the present invention to provide a subsystem logics partitioning and managing apparatus, method, and program for enabling configuration changing functions of an RAID within a predetermined limit, and a recording medium for recording the program.
For this end, a subsystem logics partitioning and managing apparatus according to one feature of the present invention comprises:
means for recognizing logical resources and physical resources that constitute a subsystem;
a partition definition table in which logical and physical resources in said subsystem are assigned for each user at an interface level at which a storage configuration can be referenced by a storage management program;
an account table in which a partition-specific account is set for each user defined in said partition definition table;
means for receiving a user account transmitted from an information processing unit and collating the received user account to said account table to thereby recognize a partition corresponding to said user; and
means for outputting logical resources and physical resources that are included in said recognized partition to an output interface as a resource configuration in said subsystem.
The subsystem logics partitioning and managing apparatus comprises means for outputting, at a GUI level, logical resources and physical resources that are contained in said partition to an output interface as a resource configuration in said subsystem.
The subsystem logics partitioning and managing apparatus comprises means for accepting from the information processing unit a request for changing a configuration of said output logical resources or physical resources and changing said configuration of said logical resources or said physical resources in said partition definition table.
Resources to be assigned for each user in said partition definition table include a port, a logical unit, a logical device indicative of a logical storage region assigned to said logical unit, and a disk unit group having a disk unit and a parity bit-use disk unit which stores data recovery information of said disk unit.
The subsystem logics partitioning and managing apparatus comprises means for collating a requested specification of a logical unit accepted from an information processing unit to an assignment policy for said logical device and said disk unit group that are defined for each user, to perform assignment of a logical device and a disk unit group in accordance with said policy, thereby generating a logical unit.
The assignment policy comprises:
a first policy for selecting said logical device from a disk unit group to which no other partitions are assigned and in which no such disk unit group is present that control on input/output operations to disk units is conducted via the same adapter, to generate a logical unit;
a second policy for selecting said logical device from a disk unit group to which no other partitions are assigned, to generate a logical unit; and
a third policy for selecting said logical device from a disk unit group to which no other partitions that correspond to said first and second policies are assigned, to generate a logical unit.
Furthermore, resources to be assigned for each user include a cache.
According to another feature of the present invention there is provided a method for partitioning and managing logics in a subsystem which comprises a partition definition table in which logical resources and physical resources in said subsystem are assigned for each user at an interface level at which a computer can reference a storage configuration by using a storage management program and an account table in which a partition-specific account is set for each user that is defined in said partition definition table, said method comprising the steps of:
recognizing said logical and physical resources that constitute said subsystem;
receiving an account of a user transmitted from an information-processing device and collating the received user account to said account table, to recognize a partition corresponding to said user; and
outputting logical and physical resources contained in said recognized partition to an output interface as a resource configuration in said subsystem.
According to a further feature of the present invention there is provided a subsystem logics partitioning and managing program for causing a computer capable of utilizing a partition definition table in which logical resources and physical resources in a subsystem are assigned for each user at an interface level at which a storage configuration can be referenced by using a storage management program and an account table in which a partition-specific account is set for each user that is defined in said partition definition table to perform a method for partitioning and managing logics of said subsystem, said program comprising the steps of:
recognizing said logical and physical resources that constitute said subsystem;
receiving an account of a user transmitted from an information-processing device and collating the received user account to against said account table, to recognize a partition corresponding to said user; and
outputting logical and physical resources contained in said recognized partition to an output interface as a resource configuration in said subsystem. This program is comprised of codes for performing said steps.
According to a still further feature of the present invention there is provided a computer-readable recording medium for recording said subsystem logics partitioning and managing program.
The other problems and the corresponding solutions disclosed in the present application will be made clear by description of embodiments of the present invention and drawings.
According to the present invention, the configuration changing functions of the RAID can be released within a predetermined range.
Other objects, features and advantages of the present invention will now become apparent from the description of the embodiments of the invention in conjunction with the accompanying drawings.
<System Configuration>
Further, as described above, not in a physical configuration but in a logical configuration, the subsystem 10 comprises the ports 11, a host group 18 (here referred to as Host Group) assigned to the port 11, a logical unit 19 (hereinafter referred to as LU), a logical device 20 (hereinafter referred to as LDEV), and a disk unit group 21 (here referred to as ECC Group).
It is to be noted that a storage region of the storage system which is provided to the LU19 is managed in units of the LDEV20 (Logical Device). The LDEV20 is a logical volume includes a part of some disk units that compose a disk unit group of the disk array. The host 25 specifies storage regions to be provided by the LDEV20, in units of said LU19. The LUs19 are each given a Logical Unit Number (LUN), which is a unique identifier. At the host 25, the LUN can be, for example, a drive name or a device file name.
Further, said disk unit group 21 is comprised of a disk unit and a parity bit-use disk unit for storing data recovery information of this disk unit, which disk unit group 21 itself constitutes the LDEV20.
A management client 40 performs input/output operations to this subsystem 10 through a network 35 such as an LAN and performs management processing. This management client 40 may be referred to as an input interface that permits an administrator (hereinafter referred to as user) of logical/physical resources in the subsystem 10 which are partitioned and managed by a method according to the present invention to reference a configuration of these resources or request for changing the configuration. This management client 40 can have access through the network 35 to a managing configuration information (partition definition table) 17 of the service processor 13, and reference only a configuration region of predetermined resources defined for the user and change it.
That is, in contrast to, for example, a conventional GUI-level masking technique etc., resources of storage management software are partitioned on an interface provided for instructing an actual storage to change a configuration (which interface is supposed to be an application program interface (API)). Therefore, even if this interface is utilized to place access from the management client 40 to a partition 50 in the subsystem 10, no contradiction occurs between a partitioning unit returned from the service processor 13 to this management client 40 and a range within which the configuration can be changed.
For example, even if certain access to the partition 50 through the management client 40 is normal, access to any one of the other partitions 51-53 is not permitted. Further, GUI display about the other partitions is not output. Alternatively, even if GUI display is given also about other partitions, changing etc. of the resource configuration is not accepted. In this case, a relationship among a display, the API, and the GUI is such as shown in
A storage manager managing the subsystem 10 integrally assigns the disk unit group 21 (in a logical configuration) that constitutes a partition for each of said users from the disk unit group 21 (in a physical configuration) included in the subsystem 10. In this case, the service processor 13 can perform this processing by applying an internal hierarchy control function (hereafter referred to as HIHSM) for moving/rearranging data to an optimal disk drive in accordance with access properties in the subsystem in which there are in a mixed manner a plurality of disk drives having different properties such as performance and a capacity.
Further, by applying a function (hereafter referred to as CVS) for creating a logical unit having an arbitrary size, a disk capacity can be utilized efficiently. Furthermore, by applying a function (hereafter referred to as LUSE) for combining a plurality of standard logical units to create a mass-capacity LU, it is possible to provide the logical unit 19 having a huge size to the host, thus accommodating a large-scale application.
It is to be noted that by further applying a method according to the present invention to a subsystem to which conventionally proposed LUN security has been applied, in addition to a LUN security function for enabling setting an accessible host for each logical unit, such a function can also be provided as to correlate resource configuration display and a configuration changing permission/rejection scope for each of the users in the subsystem, which is preferable. Moreover, it is possible also to place access restrictions on a request for referencing/changing of the resource configuration at an API level, thus further improving the security.
<Description of Processing>
Description will be made of an actual procedure for performing subsystem logics partitioning and managing method according to an embodiment of the present invention. It is to be noted that various operations corresponding to the subsystem logics partitioning and managing method described below are realized by a program which is utilized by the service processor 14, which program is comprised of codes which are used to perform the various operations described below.
In a partition definition table in
When having received a user account transmitted as involved in access from an information processing unit such as said host 25 (s401), said service processor 14 collates the received user account to an account table (
The service processor 14 can recognize or identify the partition 50 that corresponds to this user, based on said collation. For example, if the user name is “odawara”, a configuration of accessible resources will be such that ports “1A” and “2A” correspond to host groups “00” and “00” respectively, with the LDEVs being “00.00” through “00.03”, and the disk unit group being “1-1”.
On the other hand, when having received a partition creation instruction containing instruction information such as a port, a host group, an LVOL, or a policy from the user (s402), it collates a required specification of the logical unit 19 accepted from the information processing unit such as the host 25, with respect to an assignment policy for said logical device 19 and said disk unit group 21 that are defined for each of the users.
Therefore, the managing configuration information 17 in the present embodiment has such a data configuration that using “User” as a key, the assignment policy, the port, the host group, the LVOL (virtual unit that corresponds to the required specification request), the LDEV, and the disk unit group are related with the columns 500-506. However, until the LVOL that corresponds to said use request is defined, said LDEV and said disk unit groups remain undefined.
The service processor 14 recognizes this policy based on said managing configuration information 17 (s403). If the user is, for example, “odawara”, the relevant assignment policy is “independent” (written as “independent”). This “independent” policy provides a first policy that gives a provision to the effect that “a logical unit should be generated by selecting a logical device from a disk unit group to which no other partitions are assigned and in which no such disk unit group is present that control on input/output operations to disk units is conducted via the same adapter”.
Further, as an example of the other policies, there is a second policy, that is, “partially shared” policy (hereafter referred to as “partial”) that gives a provision to the effect that “a logical unit should be generated by selecting said logical device from a disk unit group to which no other partitions are assigned”.
Furthermore, there is a third policy, that is, “shared use” policy (hereafter referred to as “shared”) that gives a provision to the effect that “a logical unit should be generated by selecting said logical device from a disk unit group to which no other partitions corresponding to said first and second policies are assigned”.
The service processor 14, which has recognized the assignment policy as described above, performs assignment of a logical device and a disk unit group that correspond to this policy (s404). Based on these selected logical device and disk unit group, it generates a logical unit (s405). Now that the logical unit has been thus generated and so the resource configuration of this user's partition has been updated, of course said managing configuration information 17 is also updated. That is, the process registers the resources in the partition definition table (s406) and ends the processing.
In a partition definition table in
When having received a user account transmitted as involved in access from an information processing unit such as said host 25 (s501), said service processor 14 collates the received user account against the account table (see
The service processor 14 can recognize the partition 50 that corresponds to this user, based on said collation. For example, if the user name is “odawara”, a configuration of accessible resources will be such that ports “1A” and “2A” correspond to host groups “00” and “00” respectively, with the LDEVs being “00.00” through “00.03”, and the disk unit group being “1-1”.
On the other hand, when having received a partition creation instruction containing instruction information such as a port, a host group, or an LVOL from the user (s502), it collates a required specification of the logical unit 19 accepted from the information processing unit such as the host 25 against a situation, contained in the managing configuration information 17, in which said logical device 19 and said disk unit group 21 are assigned to the other users. As shown in
Said service processor 14, which has recognized the resources that can be assigned to said user based on said managing configuration information 17, assigns a logical device and a disk unit group (s503). Based on these selected logical device and disk unit group, it generates a logical unit (s504). Now that the logical unit has been thus generated and so the resource configuration of this user's partition has been updated, of course said managing configuration information 17 is also updated.
That is, the process registers the resources in the partition definition table (s505) and ends the processing.
Next, resource configuration referencing/updating to be performed in response to a request from the user is described.
The service processor 14 accepts from an information processing unit such as said host 25 a user's login request involving a specification of a user ID and a password and goes through appropriate authentication processing, to perform login processing (s601). When having received a user account transmitted as involved in the login (s602), the service processor 14 collates it against an account table shown in
The service processor 14 can recognize the partition 50 that corresponds to this user, based on said collation (s603). For example, if the user is “odawara”, a configuration of accessible resources will be such that ports “1A” and “2A” correspond to host groups “00” and “00” respectively, with the host group being “00”, the LDEVs being “00.00” through “00.03”, and the disk unit group being “1-1” (see
The service processor 14 outputs to said host 25 the logical resources and the physical resources that are contained in said recognized partition 50, as a resource configuration in the subsystem (s604). If, then, no changing request is sent from the host 25 (NO at s605), the processing ends. If a changing request is sent from the host 25 (YES at s605), on the other hand, it is accepted (s606). In this case, of course, the other partitions or changing requests from the other partitions are rejected.
The service processor 14, which has received said changing request, allows rewriting of the relevant logical resources or physical resources in said managing configuration information 17. Alternatively, it changes contents of the table in order to change the configuration in accordance with contents of the changing request (s607) and ends the processing.
It is to be noted that said service processor 14 can also output at a GUI level to said host 25 the logical resources and the physical resources that are contained in a partition 50 assigned for each user, as a resource configuration in the subsystem. It is to be noted that the resource configuration to be output at the GUI level is supposed to contain only such resources that a user's request for configuration changing/viewing can be accepted. Therefore, a request for changing/viewing about partitions of the other users or from the other partitions is rejected. Alternatively, such a configuration may be provided that only viewing is permitted but configuration changing is not accepted.
In said GUI output, such data may be assumed that a relationship among said resources is configured in a tree format. Further, a pattern of the GUI output may be any of a variety of applicable ones such as a pattern in which only the partition 50 of said user is displayed and the other partitions are masked, a pattern in which resources shared in the configuration, if any, are added to said partition 50 and displayed, and a pattern in which all the partitions are displayed but configuration changing of only the partition 50 is accepted.
Furthermore, displaying/masking of said configuration resources may be subject to output processing based on a policy in said managing configuration information 17, in such a manner that if, for example, the policy is “independent”, only the configuration resources of the relevant user are displayed, that if the policy is “shared use”, both the configuration resources of the relevant user and those of the other users are displayed, and that if it is “partially shared”, engagement between the configuration resources of the relevant user and those shared by him and the other users is also displayed.
As described above, the subsystem logics partitioning and managing method according to the present invention is performed for managing, at an API level, access to a partition of interest from an information processing unit and changing of a configuration.
It is thus possible to release (some of) the configuration changing functions of the RAID while keeping security, for each of the partitions 50, that is, for each system or each user of an application. That is, said user can perform addition/changing of settings of resources within a range of volumes assigned by a storage manager.
Such an effect becomes more significant especially in a situation that storages of a plurality of systems are present in a mixed manner in one subsystem owing to storage consolidation, thereby providing a merit of integrated management due to storage consolidation without deteriorating convenience of each user.
Therefore, it is possible to provide a subsystem logics partitioning and managing apparatus, method, and program for enabling releasing configuration changing functions of the RAID within a predetermined range, and a recording medium for recording the program.
Although the present invention has been described with reference to its embodiments, the present invention is not limited to them but may be modified variously without departing from its gist in scope.
Number | Date | Country | Kind |
---|---|---|---|
2003-300363 | Aug 2003 | JP | national |
This is a continuation application of U.S. Ser. No. 10/729,925, filed Dec. 9, 2003 now U.S. Pat. No. 7,069,408. Japanese Patent Application No. 2003-300363 on which the present application is based and which was applied on Aug. 25, 2003 is herein incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
5568629 | Gentry et al. | Oct 1996 | A |
5657470 | Fisherman et al. | Aug 1997 | A |
5829053 | Smith et al. | Oct 1998 | A |
5973690 | Ofer | Oct 1999 | A |
6021481 | Eickemeyer et al. | Feb 2000 | A |
6148368 | DeKoning | Nov 2000 | A |
6247109 | Kleinsorge et al. | Jun 2001 | B1 |
6260120 | Blumenau et al. | Jul 2001 | B1 |
6275824 | O'Flaherty et al. | Aug 2001 | B1 |
6275825 | Kobayashi et al. | Aug 2001 | B1 |
6275898 | DeKoning | Aug 2001 | B1 |
6279046 | Armstrong et al. | Aug 2001 | B1 |
6289398 | Stallmo et al. | Sep 2001 | B1 |
6330653 | Murray et al. | Dec 2001 | B1 |
6341331 | McNutt | Jan 2002 | B1 |
6343324 | Hubis et al. | Jan 2002 | B1 |
6347358 | Kuwata | Feb 2002 | B1 |
6425049 | Yamamoto et al. | Jul 2002 | B1 |
6438671 | Doing et al. | Aug 2002 | B1 |
6457102 | Lambright et al. | Sep 2002 | B1 |
6484173 | O'Hare et al. | Nov 2002 | B1 |
6484245 | Sanada | Nov 2002 | B1 |
6502162 | Blumenau et al. | Dec 2002 | B2 |
6502193 | Barber | Dec 2002 | B1 |
6507896 | Sanada | Jan 2003 | B2 |
6507905 | Hubacher et al. | Jan 2003 | B1 |
6519679 | Devireddy et al. | Feb 2003 | B2 |
6523096 | Sanada | Feb 2003 | B2 |
6542926 | Zalewski et al. | Apr 2003 | B2 |
6542961 | Matsunami | Apr 2003 | B1 |
6594775 | Fair | Jul 2003 | B1 |
6606695 | Kamano | Aug 2003 | B2 |
6609180 | Sanada | Aug 2003 | B2 |
6615324 | Fernald | Sep 2003 | B1 |
6665786 | McMichael et al. | Dec 2003 | B2 |
6671776 | DeKoning | Dec 2003 | B1 |
6684209 | Ito et al. | Jan 2004 | B1 |
6690400 | Moayyad et al. | Feb 2004 | B1 |
6691209 | O'Connell | Feb 2004 | B1 |
6701410 | Matsunami | Mar 2004 | B2 |
6701411 | Matsunami | Mar 2004 | B2 |
6715031 | Camble et al. | Mar 2004 | B2 |
6718481 | Fair | Apr 2004 | B1 |
6728836 | Lambright et al. | Apr 2004 | B1 |
6728844 | Sanada | Apr 2004 | B2 |
6742034 | Schubert et al. | May 2004 | B1 |
6742090 | Sanada | May 2004 | B2 |
6772287 | Uchiyama et al. | Aug 2004 | B2 |
6839796 | Dawson et al. | Jan 2005 | B2 |
6851022 | Ikeuchi et al. | Feb 2005 | B2 |
6851029 | Matsunami | Feb 2005 | B2 |
6865157 | Scott | Mar 2005 | B1 |
6877073 | Sanada | Apr 2005 | B2 |
6898672 | Lambright et al. | May 2005 | B2 |
6904470 | Ofer | Jun 2005 | B1 |
6910102 | Matsunami | Jun 2005 | B2 |
20010008010 | Sanada | Jul 2001 | A1 |
20010011332 | Sanada | Aug 2001 | A1 |
20010011333 | Sanada | Aug 2001 | A1 |
20010047463 | Kamano | Nov 2001 | A1 |
20010047487 | Harris et al. | Nov 2001 | A1 |
20020010843 | Sanada | Jan 2002 | A1 |
20020016812 | Uchishiba et al. | Feb 2002 | A1 |
20020035667 | Bruning et al. | Mar 2002 | A1 |
20020052914 | Zalewski et al. | May 2002 | A1 |
20020065982 | Colligan | May 2002 | A1 |
20020083285 | Sanada | Jun 2002 | A1 |
20020091898 | Matsunami | Jul 2002 | A1 |
20020095549 | Matsunami | Jul 2002 | A1 |
20020095602 | Pherson et al. | Jul 2002 | A1 |
20020099837 | Oe et al. | Jul 2002 | A1 |
20020099914 | Matsunami et al. | Jul 2002 | A1 |
20020103913 | Tawil et al. | Aug 2002 | A1 |
20020104008 | Cochran et al. | Aug 2002 | A1 |
20020107810 | Nishio et al. | Aug 2002 | A1 |
20020124040 | Foster et al. | Sep 2002 | A1 |
20020161891 | Higuchi et al. | Oct 2002 | A1 |
20030009648 | Doing et al. | Jan 2003 | A1 |
20030014600 | Ito et al. | Jan 2003 | A1 |
20030023868 | Parent | Jan 2003 | A1 |
20030055933 | Ishizaki et al. | Mar 2003 | A1 |
20030055972 | Fuller et al. | Mar 2003 | A1 |
20030084241 | Lubbers et al. | May 2003 | A1 |
20030097393 | Kawamoto et al. | May 2003 | A1 |
20030115218 | Bobbitt et al. | Jun 2003 | A1 |
20030115282 | Rose | Jun 2003 | A1 |
20030115434 | Mahalingam et al. | Jun 2003 | A1 |
20030115438 | Mahalingam et al. | Jun 2003 | A1 |
20030115447 | Pham et al. | Jun 2003 | A1 |
20030120743 | Coatney | Jun 2003 | A1 |
20030177176 | Hirschfeld et al. | Sep 2003 | A1 |
20030182501 | George et al. | Sep 2003 | A1 |
20030191910 | Matsunami | Oct 2003 | A1 |
20030196055 | Kamano et al. | Oct 2003 | A1 |
20030212864 | Hicken et al. | Nov 2003 | A1 |
20030225934 | Kaji | Dec 2003 | A1 |
20030229698 | Furahashi | Dec 2003 | A1 |
20040003063 | Ashok et al. | Jan 2004 | A1 |
20040010563 | Forte et al. | Jan 2004 | A1 |
20040049564 | Ng et al. | Mar 2004 | A1 |
20040064729 | Yellepeddy | Apr 2004 | A1 |
20040088417 | Bober et al. | May 2004 | A1 |
20040111557 | Nakatani et al. | Jun 2004 | A1 |
20040111596 | Rawson, III | Jun 2004 | A1 |
20040139168 | Tanaka et al. | Jul 2004 | A1 |
20040153605 | Nakamura | Aug 2004 | A1 |
20040153710 | Fair | Aug 2004 | A1 |
20040158673 | Matsunami | Aug 2004 | A1 |
20040163028 | Olarig | Aug 2004 | A1 |
20040168033 | Sanada | Aug 2004 | A1 |
20040181589 | Suleiman | Sep 2004 | A1 |
20040193803 | Mogi et al. | Sep 2004 | A1 |
20040199736 | Kamano | Oct 2004 | A1 |
20040210591 | Hirschfeld et al. | Oct 2004 | A1 |
20040212511 | Ahrens et al. | Oct 2004 | A1 |
20040215859 | Armstrong et al. | Oct 2004 | A1 |
20040215860 | Armstrong et al. | Oct 2004 | A1 |
20040215915 | Block et al. | Oct 2004 | A1 |
20050005064 | Ito et al. | Jan 2005 | A1 |
20050010722 | Chen | Jan 2005 | A1 |
20050015546 | Zohar et al. | Jan 2005 | A1 |
20050021727 | Matsunami et al. | Jan 2005 | A1 |
20050033914 | Matsunami | Feb 2005 | A1 |
20050050085 | Shimada et al. | Mar 2005 | A1 |
20050071446 | Graham et al. | Mar 2005 | A1 |
20050166074 | Hack | Jul 2005 | A1 |
20050172052 | Sanada | Aug 2005 | A1 |
Number | Date | Country |
---|---|---|
1321848 | Dec 2002 | EP |
1276034 | Jan 2003 | EP |
2002-149599 | May 1992 | JP |
5-128002 | May 1993 | JP |
2002-230189 | Aug 2002 | JP |
2003-30053 | Jan 2003 | JP |
2003-157177 | May 2003 | JP |
0133328 | May 2001 | WO |
0225870 | Mar 2002 | WO |
Number | Date | Country | |
---|---|---|---|
20050149675 A1 | Jul 2005 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10729925 | Dec 2003 | US |
Child | 11057754 | US |