This application is related to commonly-owned applications:
Ser. No. 10/842,286, filed May 10, 2004, and titled “METHOD AND SYSTEM FOR REAL-TIME EVENT JOURNALING TO PROVIDE ENTERPRISE DATA SERVICES.”
Ser. No. 10,841,398, filed May 7, 2004, and titled “METHOD AND SYSTEM FOR AUTOMATED, NO DOWNTIME, REAL-TIME, CONTINUOUS DATA PROTECTION.”
1. Technical Field
The present invention relates generally to enterprise data protection.
2. Background of the Related Art
A critical information technology (IT) problem is how to cost-effectively deliver network wide data protection and rapid data recovery. In 2002, for example, companies spent an estimated $50B worldwide managing data backup/restore and an estimated $30B in system downtime costs. The “code red” virus alone cost an estimated $2.8B in downtime, data loss, and recovery. The reason for these staggering costs is simple—traditional schedule based tape and in-storage data protection and recovery approaches can no longer keep pace with rapid data growth, geographically distributed operations, and the real time requirements of 24×7×265 enterprise data centers.
Traditionally, system managers have use tape backup devices to store system data on a periodic basis. For example, the backup device may acquire a “snapshot” of the contents of an entire hard disk at a particular time and then store this for later use, e.g., reintroduction onto the disk (or onto a new disk) should the computer fail. The problems with the snapshot approaches are well known and appreciated. First, critical data can change as the snapshot is taken, which results in incomplete updates (e.g., half a transaction) being captured so that, when reintroduced, the data is not fully consistent. Second, changes in data occurring after a snapshot is taken are always at risk. Third, as storage device size grows, the bandwidth required to repeatedly offload and store the complete snapshot can become impractical. Most importantly, storage based snapshot does not capture fine grain application data and, therefore, it cannot recover fine grain application data objects without reintroducing (i.e. recovering) the entire backup volume to a new application computer server to extract the fine grain data object.
Data recovery on a conventional data protection system is a tedious and time consuming operation. It involves first shutting down a host server, and then selecting a version of the data history. That selected version of the data history must then be copied back to the host server, and then the host server must be re-started. All of these steps are manually driven. After a period of time, the conventional data protection system must then perform a backup on the changed data. As these separate and distinct processes and systems are carried out, there are significant periods of application downtime. Stated another way, with the current state of the art, the processes of initial data upload, scheduled or continuous backup, data resynchronization, and data recovery, are separate and distinct, include many manual steps, and involve different and uncoordinated systems, processes and operations.
A data management system or “DMS” provides an automated, continuous, real-time, substantially no downtime data protection service to one or more data sources associated with a set of application host servers. The data management system typically comprises one or more regions, with each region having one or more clusters. A given cluster has one or more nodes that share storage. To facilitate the data protection service, a host driver embedded in an application server captures real-time data transactions, preferably in the form of an event journal that is provided to a DMS cluster. The driver functions to translate traditional file/database/block I/O and the like into a continuous, application-aware, output data stream. According to the invention, the host driver includes an event processor that provides the data protection service. In particular, the data protection is provided to a given data source in the host server by taking advantage of the continuous, real-time data that the host driver is capturing and providing to other DMS components.
When a given data protection command for a given data source is forwarded to a host driver, the event processor enters into an initial upload state. During this state, the event processor gathers a list of data items of the data source to be protected and creates a data list. The data list is sometimes referred to as a sorted source tree. Then, the event processor moves the data (as an upload, preferably one data element at a time) to a DMS core to create initial baseline data. In an illustrative embodiment, the upload is a stream of granular application-aware data chunks that are attached to upload events. During this upload phase, the application does not have to be shutdown. Simultaneously, while the baseline is uploading and as the application updates the data on the host, checkpoint granular data, metadata, and data events are continuously streamed into the DMS core, in real-time. Preferably, the update events for the data that are not already uploaded are dropped so that only the update events for data already uploaded are streamed to the DMS. The DMS core receives the real time event journal stream that includes the baseline upload events and the change events. It processes these events and organizes the data to maintain their history in a persistent storage of the DMS. If DMS fails while processing an upload or an update data event, preferably a failure event is forwarded back to the host driver and entered into an event queue as a protocol specific event. The event processor then marks the target item associated with the failure “dirty” (or out-of-sync) and then performs data synchronization with the DMS on that target item. This operation is also referred to as an “upward resynchronization.”
In particular, the resynchronization state is entered when there is a suspicion that the state of the data in the host is out-of-sync with the state of the most current data in the DMS, and it is also known that the data in the host server is not corrupted. Thus, for example, this state is entered after a blackout when data in the host is changed; or, the state is entered after a host server is rebooted and the state of the most current data at the DMS is unknown. During this state, it is assumed that the host server data is good and is more current then the latest data in the DMS. If the event processor is keeping track of the updated (dirty) data at the host server during a blackout, preferably it only compares that data with the corresponding copy in the DMS; it then sends to the DMS the deltas (e.g., as checkpoint delta events). If, during the case of a host server reboot, the “dirty” data is not known, preferably the event processor goes over the entire data source, re-creates a sorted source tree, and then compares each individual data item, sending delta events to the DMS as necessary. The application does not have to be shutdown during resynchronization. Also, preferably upward-resynchronization occurs simultaneously while the application is accessing and updating the data in the primary storage. The update events for the data objects that are dirty and are not yet re-synchronized preferably are dropped, while other events are processed. The event processor tracks both the resynchronization and update activities accordingly and outputs to the DMS core a real time event journal stream.
The DMS core receives the real time event journal stream, which includes requests for data checkpoints, resynchronization delta events, and the change events. The DMS core processes these events and organizes the data in the DMS persistent storage to maintain their history.
The foregoing has outlined some of the more pertinent features of the invention. These features should be construed to be merely illustrative. Many other beneficial results can be attained by applying the disclosed invention in a different manner or by modifying the invention as will be described
For a more complete understanding of the present invention and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
As illustrated, a “host driver” 128 is associated with one or more of the application(s) running in the application servers 116 to transparently and efficiently capture the real-time, continuous history of all (or substantially all) transactions and changes to data associated with such application(s) across the enterprise network. As will be described below, the present invention facilitates real-time, so-called “application aware” protection, with substantially no data loss, to provide continuous data protection and other data services including, without limitation, data distribution, data replication, data copy, data access, and the like. In operation, a given host driver 128 intercepts data events between an application and its primary data storage, and it may also receive data and application events directly from the application and database. In a representative embodiment, the host driver 128 is embedded in the host application server 116 where the application resides; alternatively, the host driver is embedded in the network on the application data path. By intercepting data through the application, fine grain (but opaque) data is captured to facilitate the data service(s). To this end, and as also illustrated in
Referring now to
The DMS provides these and other data services in real-time with data and application awareness to ensure continuous application data consistency and to allow for fine grain data access and recovery. To offer such application and data aware services, the DMS has the capability to capture fine grain and consistent data. As will be illustrated and described, a given DMS host driver uses an I/O filter to intercept data events between an application and its primary data storage. The host driver also receives data and application events directly from the application and database.
Referring now to
In this embodiment, a host server embedded host driver is used for illustrating the driver behavior. In particular, the host driver 500 in a host server connects to one of the DMS nodes in a DMS cluster (in a DMS region) to perform or facilitate a data service. The host driver preferably includes two logical subsystems, namely, an I/O filter 502, and at least one data agent 504. An illustrative data agent 504 preferably includes one or more modules, namely, an application module 506, a database module 508, an I/O module 510, and an event processor or event processing engine 512. The application module 506 is configured with an application 514, one or more network devices and/or the host system itself to receive application level events 516. These events include, without limitation, entry or deletion of some critical data, installation or upgrade of application software or the operating system, a system alert, detecting of a virus, an administrator generated checkpoint, and so on. One or more application events are queued for processing into an event queue 518 inside or otherwise associated with the data agent. The event processor 512 over time may instruct the application module 506 to re-configure with its event source to capture different application level events.
If an application saves its data into a database, then a database module 508 is available for use. The database module 508 preferably registers with a database 520 to obtain notifications from a database. The module 508 also may integrate with the database 520 through one or more database triggers, or it may also instruct the database 520 to generate a checkpoint 522. The database module 508 also may lock the database 520 (or issue a specific API) to force a database manager (not shown) to flush out its data from memory to disk, thereby generating a consistent disk image (a binary table checkpoint). This process of locking a database is also known as “quiescing” the database. An alternative to quiescing a database is to set the database into a warm backup mode. After a consistent image is generated, the database module 508 then lifts a lock to release the database from its quiescent state. The database events preferably are also queued for processing into the event queue 518. Generalizing, database events include, without limitation, a database checkpoint, specific database requests (such as schema changes or other requests), access failure, and so on. As with application module, the event processor 512 may be used to re-configure the events that will be captured by the database module.
The I/O module 510 instructs the I/O filter 502 to capture a set of one or more I/O events that are of interest to the data agent. For example, a given I/O module 510 may control the filter to capture I/O events synchronously, or the module 510 may control the filter to only capture several successful post I/O events. When the I/O module 510 receives I/O events 524, it forwards the I/O events to the event queue 518 for processing. The event processor 512 may also be used to re-configure the I/O module 510 and, thus, the I/O filter 502.
The event processor 512 functions to generate an application aware, real-time event journal (in effect, a continuous stream) for use by one or more DMS nodes to provide one or more data services. Application aware event journaling is a technique to create real-time data capture so that, among other things, consistent data checkpoints of an application can be identified and metadata can be extracted. For example, application awareness is the ability to distinguish a file from a directory, a journal file from a control or binary raw data file, or to know how a file or a directory object is modified by a given application. Thus, when protecting a general purpose file server, an application aware solution is capable of distinguishing a file from a directory, and of identifying a consistent file checkpoint (e.g., zero-buffered write, flush or close events), and of interpreting and capturing file system object attributes such as an access control list. By interpreting file system attributes, an application aware data protection may ignore activities applied to a temporary file. Another example of application awareness is the ability to identify a group of related files, directories or raw volumes that belong to a given application. Thus, when protecting a database with an application aware solution, the solution is capable of identifying the group of volumes or directories and files that make up a given database, of extracting the name of the database, and of distinguishing journal files from binary table files and control files. It also knows, for example, that the state of the database journal may be more current than the state of the binary tables of the database in primary storage during runtime. These are just representative examples, of course. In general, application aware event journaling tracks granular application consistent checkpoints; thus, when used in conjunction with data protection, the event journal is useful in reconstructing an application data state to a consistent point-in-time in the past, and it also capable of retrieving a granular object in the past without having to recover an entire data volume. Further details of the event journaling technique are described in commonly-owned, co-pending application Ser. No. 10/842,286, filed May 10, 2004. The subject matter of that application is incorporated herein by reference.
Referring now to
As also indicated in
With reference now to
When upload is completed and all the data is in synchronized with the data in the DMS, the event processor generates a “Done-upload” incident, which causes the event processor to move to a new state 706. This new state is called “Regular-backup” for illustrative purposes. During the regular backup state 706, the event processor processes all the raw events from the event queue, and it generates a meaningful checkpoint real time event journal stream to the DMS for maintaining the data history. This operation has been described above. As illustrated in the state transition diagram, the event processor exits its regular backup state 706 under one of three (3) conditions: a blackout incident, a reboot incident, or a begin recovery incident. Thus, if during regular backup a “Blackout” incident occurs, the state of the event processor transitions from state 706 to a new state 708, which is called “PBlackout” for illustration purposes. This is a blackout state that occurs during regular backup. If, however, during regular backup, a “Reboot” incident occurs, the event processor transitions to a different state 710, which is called “Upward-Resync” for illustrative purposes. The upward resynchronization state 710 is also reached from state 708 upon a Reconnected incident during the latter state. Upward resynchronization is a state that is entered when there is a suspicion that the state of the data in the host is out-of-sync with the state of the most current data in the DMS. For this transition, it should also be known that the data in the host server is not corrupted. Thus, a transition from state 706 to state 710 occurs because, after “Reboot,” the event processor does not know if the data state of the host is identical with the state of the data in DMS. During the “Upward-Resync” 710 state, whether the state is reached from state 706 or state 708, the event processor synchronizes the state of the host data to the state of the DMS data (in other words, to bring the DMS data to the same state as the host data). During this time, update events (to the already synchronized data items) are continuously forwarded to the DMS as a real time event stream. When the resynchronization is completed, the data state at both the host and the DMS are identical, and thus a “Done-Resync” incident is generated. This incident transitions the event processor back to the “Regular-backup” state 706. Alternatively, with the event processor in the Upward-Resync state 710, a “Begin-Recovery” incident transitions the event processor to yet another new state 712, which is referred to “Recovering-frame” for illustration purposes.
In particular, once a baseline data is uploaded to the DMS, data history is streamed into the DMS continuously, preferably as a real time event journal. An authorized user can invoke a recovery at any of the states when the host server is connected to the DMS core, namely, during the “Regular-backup” and “Upward-resync” states 706 and 710. If the authorized user does so, a “Begin-recovery” incident occurs, which drives the event processor state to the “Recovering-frame” state 712.
During the “Recovering-frame” state 712, the event processor reconstructs the sorted source tree, which (as noted above) contains structural information of the data to be recovered. During state 712, and depending on the underlying data, the application may or may not be able to access the data. Once the data structure is recovered, a “Done-Recovering-Frame” incident is generated, which then transitions the event processor to a new state 714, referred to as “Recovering” for illustration purposes. Before the data structure is recovered, incidents such as “Blackout,” “Reconnected,” and “Reboot” do not change the state of the event processor. During the “Recovering” state 714, the event processor recovers the actual data from the DMS, preferably a data point at a time. It also recovers data as an application access request arrives to enable the application to continuing running. During state 714, application update events are streamed to the DMS so that history is continued to be maintained, even as the event processor is recovering the data in the host. When data recovery is completed, once again the state of the data (at both ends of the stream) is synchronized, and the corruption at the host is fixed. Thus, a so-called “Done-recovered” incident is generated, and the event processor transitions back to the “Regular-backup” state 706.
During the “UBlackout” or the “PBlackout” states (704 or 708), the event processor marks the updated data item as dirty or out-of-sync in its sorted source tree.
Processing continues in a cycle (theoretically without end), with the event processor transitioning from state-to-state as given incidents (as described above) occur. The above described incidents, of course, are merely representative.
Although not indicated in the state transition diagram (
Further Details of the Initial Upload and Upward-Resync States
As illustrated, the event processor 800 includes the event processor logic 802 that has been previously described. Processor 800 also has associated therewith a given data structure 804, preferably a sorted source tree. A sorted source tree is a list, which may be sorted using any convenient sorting technique, and it is used to manage the handling of data during the upload and/or upward-resync states. In an illustrated embodiment, the sorted source tree is a directory sort list, with directories and their associated files sorted in a depth-first manner as illustrated schematically at reference numeral 805. Preferably, the list includes one or more one attributes per data item. A given attribute may have an associated flag, which indicates a setting for the attribute. Thus, for example, representative attributes include: data path, data state, dirty, sent count, to be uploaded, to be recovered, and data bitmap. The “data path” attribute typically identifies the path name (e.g., c:\mydirectory\foo.txt) of a file or directory where the data item originated, the “data state” attribute identifies a state of the data file (e.g., closed, opened for read, opened for write, the accumulated changes since a last checkpoint, or the like), and the “dirty” attribute identifies whether the item is “out-of-sync” with the data in the DMS (which means that the file or directory in the host is more up-to-date than the corresponding file or directory in DMS). In the latter case, upward resynchronization with respect to DMS is required. For example, a file can be “dirty” if it is updated during a blackout, or if the delta events for the file fail to be applied at the DMS core. When a host server is rebooted, all items are assumed to be dirty. The “to be uploaded” attribute means that the item is not yet uploaded but needs to be, the “to be recovered” attribute means that the item, although previously, uploaded, must be recovered, the “sent count” attribute refers to a number of message(s) that are forwarded to the DMS host during the upload and/or upward resynchronization, and the “data bitmap” attribute is used for virtual recovery of a large file. In particular, virtual recovery may involve the following process. A large file is divided into blocks, and the bitmap is used to indicate if a block is recovered or not. If a block has a value 0, it is not recovered; if the block has a value 1, it is recovered. Preferably, the system recovers a large file in sequential block order, although this is not a requirement. In the event an application request arrives for a data block that is not yet recovered, preferably the system moves in the block from DMS immediately so that the application does not have to wait for it.
Raw events are available on the event queue 806, as described above. A set of illustrative events are shown in the drawing and they include, in this example: Open (object ID), Write (object ID, data range), Write (object ID, data range), System upgrade (timestamp), Write (object ID, data range), Trigger (ID, data, timestamp), Network events, and so on. Of course, this list is merely for illustration purposes.
In another illustrated embodiment, the protected data source may be a database, in which case the sorted source tree may be a list of files or volumes the database uses. In this embodiment, the sorting order may be in ascending order of the database transaction log, the binary table files or volumes, and the configuration files or volumes. If a volume-based database is to be protected, each volume can be treated like a file.
As will be described, a cursor 808 is set at the beginning of the sorted source tree 804 and is incremented. Typically, events that occur “above” the cursor are processed immediately by the event processor logic 802 and sent to the DMS node. Events that occur at or below the cursor typically may be subject to further processing, as will be described. Referring now to
As illustrated in
Summarizing, when a given data protection command for a given data source is forwarded to a host driver, the event processor enters into the initial upload state. During this state, the event processor gathers a list of data items of the data source to be protected and creates a data list, e.g., the sorted source tree. Then, the event processor moves the data (as an upload, preferably one data element at a time) to a DMS core to create initial baseline data. In an illustrative embodiment, as has been described, the upload is a stream of granular application-aware data chunks that are attached to upload events. During this upload phase, the application does not have to be shutdown. Simultaneously, while the baseline is uploading and as the application updates the data on the host, checkpoint granular data, metadata, and data events are continuously streamed into the DMS core, in real-time. Preferably, the update events for the data that are not already uploaded are dropped so that only the update events for data already uploaded are streamed to the DMS. The DMS core receives the real time event journal stream that includes the baseline upload events and the change events. It processes these events and organizes the data to maintain their history in a persistent storage of the DMS. If DMS fails while processing an upload or an update data event, preferably a failure event is forwarded back to the host driver and entered into an event queue as a protocol specific event. The event processor then marks the target item associated with the failure “dirty” (or out-of-sync) and then performs data synchronization with the DMS on that target item.
DMS provides significant advantages over the prior art. Unlike a conventional data protection system the data protection service provided by DMS is automated, real-time, and continuous, and it exhibits no or substantially no downtime. This is because DMS is keeping track of the real-time data history, and because preferably the state of the most current data in a DMS region, cluster or node (as the case may be) must match the state of the data in the original host server at all times. In contrast, data recovery on a conventional data protection system means shutting down a host server, selecting a version of the data history, copying the data history back to the host server, and then turning on the host server. All of these steps are manually driven. After a period of time, the conventional data protection system then performs a backup on the changed data. In the present invention, as has been described above, the otherwise separate processes (initial data upload, continuous backup, blackout and data resynchronization, and recovery) are simply phases of the overall data protection cycle. This is highly advantageous, and it is enabled because DMS keeps a continuous data history. Stated another way, there is no gap in the data. The data protection cycle described above preferably loops around indefinitely until, for example, a user terminates the service. A given data protection phase (the state) changes as the state of the data and the environment change (the incident). Preferably, as has been described, all of the phases (states) are interconnected to form a finite state machine that provides the data protection service.
The data protection service provided by the DMS has no effective downtime because the data upload, data resynchronization, data recovery and data backup are simply integrated phases of a data protection cycle. There is no application downtime.
The present invention has numerous advantages over the prior art such as tape backup, disk backup, volume replication, storage snapshots, application replication, remote replication, and manual recovery. Indeed, existing fragmented approaches are complex, resource inefficient, expensive to operate, and often unreliable. From an architectural standpoint, they are not well suited to scaling to support heterogeneous, enterprise-wide data management. The present invention overcomes these and other problems of the prior art by providing real-time data management services. As has been described, the invention transparently and efficiently captures the real-time continuous history of all or substantially all transactions and data changes in the enterprise. The solution operates over local and wide area IP networks to form a coherent data management, protection and recovery infrastructure. It eliminates data loss, reduces downtime, and ensures application consistent recovery to any point in time. These and other advantages are provided through the use of an application aware I/O driver that captures and outputs a continuous data stream—in the form of an event journal—to other data management nodes in the system.
As one of ordinary skill in the art will appreciate, the present invention addresses enterprise data protection and data management problems by continuously protecting all data changes and transactions in real time across local and wide area networks. Preferably, and as illustrated in
While the present invention has been described in the context of a method or process, the present invention also relates to apparatus for performing the operations herein. In an illustrated embodiment, the apparatus is implemented as a processor and associated program code that implements a finite state machine with a plurality of states and to effect transitions between the states. As described above, this apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
While the above written description also describes a particular order of operations performed by certain embodiments of the invention, it should be understood that such order is exemplary, as alternative embodiments may perform the operations in a different order, combine certain operations, overlap certain operations, or the like. References in the specification to a given embodiment indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic.
While the above has been described in the context of an “upload” between a local data store and a remote data store, this nomenclature should not be construed as limiting. Generalizing, the method and system involves monitoring events (e.g., as a given application interfaces to a local data store in a first processing environment), and then transferring to a second data store (remote from the first processing environment) a continuous, application-aware data stream while maintaining execution of the given application in the first processing environment. This enables the transfer of a baseline version. In addition, as the application-aware data stream is being transferred (e.g., by uploading), one or more application update events can be processed into the data stream.
Having described my invention, what I now claim is as follows.
Number | Name | Date | Kind |
---|---|---|---|
3555184 | Townley | Jan 1971 | A |
3555195 | Rester et al. | Jan 1971 | A |
3555204 | Braun | Jan 1971 | A |
3555251 | Shavit | Jan 1971 | A |
3648250 | Low et al. | Mar 1972 | A |
4162536 | Morley | Jul 1979 | A |
4402045 | Krol | Aug 1983 | A |
4415792 | Jordan | Nov 1983 | A |
4450556 | Boleda et al. | May 1984 | A |
4451108 | Skidmore | May 1984 | A |
4455483 | Schonhuber | Jun 1984 | A |
4502082 | Ragle et al. | Feb 1985 | A |
4512020 | Krol et al. | Apr 1985 | A |
4796260 | Schilling et al. | Jan 1989 | A |
4882737 | Dzung | Nov 1989 | A |
4916450 | Davis | Apr 1990 | A |
4972474 | Sabin | Nov 1990 | A |
5005197 | Parsons et al. | Apr 1991 | A |
5148479 | Bird et al. | Sep 1992 | A |
5177796 | Feig et al. | Jan 1993 | A |
5224212 | Rosenthal et al. | Jun 1993 | A |
5274508 | Tan et al. | Dec 1993 | A |
5280584 | Caesar et al. | Jan 1994 | A |
5303393 | Noreen et al. | Apr 1994 | A |
5305326 | Solomon et al. | Apr 1994 | A |
5311197 | Sorden et al. | May 1994 | A |
5319395 | Larky et al. | Jun 1994 | A |
5321699 | Endoh et al. | Jun 1994 | A |
5363371 | Roy et al. | Nov 1994 | A |
5365516 | Jandrell | Nov 1994 | A |
5373372 | Loewen | Dec 1994 | A |
5377102 | Nishiishigaki | Dec 1994 | A |
5382508 | Ikenoue | Jan 1995 | A |
5386422 | Endoh et al. | Jan 1995 | A |
5387994 | McCormack et al. | Feb 1995 | A |
5388074 | Buckenmaier | Feb 1995 | A |
5392209 | Eason et al. | Feb 1995 | A |
5396600 | Thompson et al. | Mar 1995 | A |
5416831 | Chewning, III et al. | May 1995 | A |
5424778 | Sugiyama et al. | Jun 1995 | A |
5430830 | Frank et al. | Jul 1995 | A |
5440686 | Dahman et al. | Aug 1995 | A |
5469444 | Endoh et al. | Nov 1995 | A |
5477492 | Ohsaki et al. | Dec 1995 | A |
5479654 | Squibb | Dec 1995 | A |
5481531 | Yamamuro | Jan 1996 | A |
5499512 | Jurewicz et al. | Mar 1996 | A |
5502491 | Sugiyama et al. | Mar 1996 | A |
5506965 | Naoe | Apr 1996 | A |
5507024 | Richards, Jr. | Apr 1996 | A |
5511212 | Rockoff | Apr 1996 | A |
5526357 | Jandrell | Jun 1996 | A |
5537945 | Sugihara et al. | Jul 1996 | A |
5560033 | Doherty et al. | Sep 1996 | A |
5561671 | Akiyama | Oct 1996 | A |
5583975 | Naka et al. | Dec 1996 | A |
5602638 | Boulware | Feb 1997 | A |
5606601 | Witzman et al. | Feb 1997 | A |
5640159 | Furlan et al. | Jun 1997 | A |
5644763 | Roy | Jul 1997 | A |
5651129 | Yokote et al. | Jul 1997 | A |
5657398 | Guilak | Aug 1997 | A |
5678042 | Pisello et al. | Oct 1997 | A |
5684536 | Sugiyama et al. | Nov 1997 | A |
5684693 | Li | Nov 1997 | A |
5684774 | Yamamuro | Nov 1997 | A |
5724241 | Wood et al. | Mar 1998 | A |
5729743 | Squibb | Mar 1998 | A |
5737399 | Witzman et al. | Apr 1998 | A |
5742509 | Goldberg et al. | Apr 1998 | A |
5742915 | Stafford | Apr 1998 | A |
5754772 | Leaf | May 1998 | A |
5764691 | Hennedy et al. | Jun 1998 | A |
5768159 | Belkadi et al. | Jun 1998 | A |
5778370 | Emerson | Jul 1998 | A |
5781612 | Choi et al. | Jul 1998 | A |
5784366 | Apelewicz | Jul 1998 | A |
5794252 | Bailey et al. | Aug 1998 | A |
5805155 | Allibhoy et al. | Sep 1998 | A |
5812130 | Van Huben et al. | Sep 1998 | A |
RE35920 | Sorden et al. | Oct 1998 | E |
5819020 | Beeler, Jr. | Oct 1998 | A |
5822749 | Agarwal | Oct 1998 | A |
5826265 | Van Huben et al. | Oct 1998 | A |
5831903 | Ohuchi et al. | Nov 1998 | A |
5841717 | Yamaguchi | Nov 1998 | A |
5841771 | Irwin et al. | Nov 1998 | A |
5848072 | Prill et al. | Dec 1998 | A |
5854834 | Gottlieb et al. | Dec 1998 | A |
5862136 | Irwin | Jan 1999 | A |
5864875 | Van Huben et al. | Jan 1999 | A |
5877742 | Klink | Mar 1999 | A |
5878408 | Van Huben et al. | Mar 1999 | A |
5893119 | Squibb | Apr 1999 | A |
5894494 | Davidovici | Apr 1999 | A |
5909435 | Apelewicz | Jun 1999 | A |
5917429 | Otis, Jr. et al. | Jun 1999 | A |
5918248 | Newell et al. | Jun 1999 | A |
5920867 | Van Huben et al. | Jul 1999 | A |
5920873 | Van Huben et al. | Jul 1999 | A |
5928327 | Wang et al. | Jul 1999 | A |
5930732 | Domanik et al. | Jul 1999 | A |
5930762 | Masch | Jul 1999 | A |
5931928 | Brennan et al. | Aug 1999 | A |
5937168 | Anderson et al. | Aug 1999 | A |
5940823 | Schreiber et al. | Aug 1999 | A |
5950201 | Van Huben et al. | Sep 1999 | A |
5953729 | Cabrera et al. | Sep 1999 | A |
5958010 | Agarwal et al. | Sep 1999 | A |
5966707 | Van Huben et al. | Oct 1999 | A |
5974563 | Beeler, Jr. | Oct 1999 | A |
5980096 | Thalhammer-Reyero | Nov 1999 | A |
5999562 | Hennedy et al. | Dec 1999 | A |
6005846 | Best et al. | Dec 1999 | A |
6005860 | Anderson et al. | Dec 1999 | A |
6031848 | Brennan | Feb 2000 | A |
6035297 | Van Huben et al. | Mar 2000 | A |
6047323 | Krause | Apr 2000 | A |
6072185 | Arai et al. | Jun 2000 | A |
6088693 | Van Huben et al. | Jul 2000 | A |
6094654 | Van Huben et al. | Jul 2000 | A |
6108318 | Kolev et al. | Aug 2000 | A |
6108410 | Reding et al. | Aug 2000 | A |
6154847 | Schofield et al. | Nov 2000 | A |
6158019 | Squibb | Dec 2000 | A |
6163856 | Dion et al. | Dec 2000 | A |
6178121 | Maruyama | Jan 2001 | B1 |
6181609 | Muraoka | Jan 2001 | B1 |
6189016 | Cabrera et al. | Feb 2001 | B1 |
6237122 | Maki | May 2001 | B1 |
6243348 | Goodberlet | Jun 2001 | B1 |
6249824 | Henrichs | Jun 2001 | B1 |
6366926 | Pohlmann et al. | Apr 2002 | B1 |
6366988 | Skiba et al. | Apr 2002 | B1 |
6389427 | Faulkner | May 2002 | B1 |
6393582 | Klecka et al. | May 2002 | B1 |
6397242 | Devine et al. | May 2002 | B1 |
6446136 | Pohlmann et al. | Sep 2002 | B1 |
6460055 | Midgley et al. | Oct 2002 | B1 |
6463565 | Kelly et al. | Oct 2002 | B1 |
6487561 | Ofek et al. | Nov 2002 | B1 |
6487581 | Ofek et al. | Nov 2002 | B1 |
6502133 | Baulier et al. | Dec 2002 | B1 |
6526418 | Midgley et al. | Feb 2003 | B1 |
6611867 | Bowman-Amuah | Aug 2003 | B1 |
6625623 | Midgley et al. | Sep 2003 | B1 |
RE38410 | Hersch et al. | Jan 2004 | E |
6751753 | Nguyen et al. | Jun 2004 | B2 |
6779003 | Midgley et al. | Aug 2004 | B1 |
6785786 | Gold et al. | Aug 2004 | B1 |
6816872 | Squibb | Nov 2004 | B1 |
6823336 | Srinivasan et al. | Nov 2004 | B1 |
6826711 | Moulton et al. | Nov 2004 | B2 |
6836756 | Gruber | Dec 2004 | B1 |
6839721 | Schwols | Jan 2005 | B2 |
6839740 | Kiselev | Jan 2005 | B1 |
6847984 | Midgley et al. | Jan 2005 | B1 |
6907551 | Katagiri et al. | Jun 2005 | B2 |
6993706 | Cook | Jan 2006 | B2 |
7028078 | Sharma et al. | Apr 2006 | B1 |
7039663 | Federwisch et al. | May 2006 | B1 |
7054913 | Kiselev | May 2006 | B1 |
7080081 | Agarwal et al. | Jul 2006 | B2 |
7092396 | Lee et al. | Aug 2006 | B2 |
7096392 | Sim-Tang | Aug 2006 | B2 |
7200233 | Keller et al. | Apr 2007 | B1 |
7206805 | McLaughlin, Jr. | Apr 2007 | B1 |
7207224 | Rutt et al. | Apr 2007 | B2 |
7272613 | Sim et al. | Sep 2007 | B2 |
7290056 | McLaughlin, Jr. | Oct 2007 | B1 |
7325159 | Stager et al. | Jan 2008 | B2 |
7363549 | Sim-Tang | Apr 2008 | B2 |
7519870 | Sim-Tang | Apr 2009 | B1 |
7565661 | Sim-Tang | Jul 2009 | B2 |
20010029520 | Miyazaki et al. | Oct 2001 | A1 |
20010043522 | Park | Nov 2001 | A1 |
20020091722 | Gupta et al. | Jul 2002 | A1 |
20020107860 | Gobeille et al. | Aug 2002 | A1 |
20020144177 | Kondo et al. | Oct 2002 | A1 |
20020147807 | Raguseo | Oct 2002 | A1 |
20020172222 | Ullmann et al. | Nov 2002 | A1 |
20020178397 | Ueno et al. | Nov 2002 | A1 |
20020199152 | Garney et al. | Dec 2002 | A1 |
20030009552 | Benfield et al. | Jan 2003 | A1 |
20030051026 | Carter et al. | Mar 2003 | A1 |
20030088372 | Caulfield | May 2003 | A1 |
20030117916 | Makela et al. | Jun 2003 | A1 |
20030200098 | Geipel et al. | Oct 2003 | A1 |
20030204515 | Shadmon et al. | Oct 2003 | A1 |
20040010544 | Slater et al. | Jan 2004 | A1 |
20040036716 | Jordahl | Feb 2004 | A1 |
20040047354 | Slater et al. | Mar 2004 | A1 |
20040080504 | Salesky et al. | Apr 2004 | A1 |
20040117715 | Ha et al. | Jun 2004 | A1 |
20040193594 | Moore et al. | Sep 2004 | A1 |
20040199486 | Gopinath et al. | Oct 2004 | A1 |
20050001911 | Suzuki | Jan 2005 | A1 |
20050021690 | Peddada | Jan 2005 | A1 |
20050076066 | Stakutis et al. | Apr 2005 | A1 |
20050251540 | Sim-Tang | Nov 2005 | A1 |
20050262097 | Sim-Tang et al. | Nov 2005 | A1 |
20050286440 | Strutt et al. | Dec 2005 | A1 |
20060020586 | Prompt et al. | Jan 2006 | A1 |
20060026220 | Margolus | Feb 2006 | A1 |
20060050970 | Gunatilake | Mar 2006 | A1 |
20060064416 | Sim-Tang | Mar 2006 | A1 |
20060101384 | Sim-Tang et al. | May 2006 | A1 |
20060130002 | Hirayama et al. | Jun 2006 | A1 |
20060137024 | Kim et al. | Jun 2006 | A1 |
20060236149 | Nguyen et al. | Oct 2006 | A1 |
20060259820 | Swoboda | Nov 2006 | A1 |
20060278004 | Rutt et al. | Dec 2006 | A1 |
20070067278 | Borodziewicz et al. | Mar 2007 | A1 |
20070094312 | Sim-Tang | Apr 2007 | A1 |
20070168692 | Quintiliano | Jul 2007 | A1 |
20080256138 | Sim-Tang | Oct 2008 | A1 |
Number | Date | Country |
---|---|---|
WO-9819262 | May 1998 | WO |
WO-0225443 | Mar 2002 | WO |