DATA CONTROL APPARATUS AND DATA CONTROL METHOD
    101.
    发明公开

    公开(公告)号:US20240020206A1

    公开(公告)日:2024-01-18

    申请号:US18115912

    申请日:2023-03-01

    Applicant: Hitachi, Ltd.

    CPC classification number: G06F11/1469 G06F11/1464 G06F11/1451 G06F2201/84

    Abstract: In a storage system that is connected via networks to a cloud system, which provides an object store, and backs up backup data of a predetermined volume as an object to the object store, the storage system includes a processor, and the processor is configured to determine whether the storage system stores a snapshot associated with a volume at a first point in time to be restored, and restore the volume at the first point in time using the snapshot when it is determined that the storage system stores the snapshot.

    Streaming slices out of order for efficient backup

    公开(公告)号:US11874749B1

    公开(公告)日:2024-01-16

    申请号:US17957415

    申请日:2022-09-30

    CPC classification number: G06F11/1469 G06F16/122 G06F2201/84

    Abstract: Embodiments of the invention relate to methods and systems for efficiently backing up and restoring assets such as files and folders in the form of slices and streams. In one or more embodiments, assets such as files and folders that are to be backed up are placed in appropriate network slice queues, which are then assigned to network streams. The slices/assets are assigned in such a way that each stream has a similar cost and throughput. The backup is performed, and the streams are stored in their own backup containers until a restoration is needed. Once a restoration is needed, the meta-data for the backup is used to restore the files and folders, forming the asset back to their appropriate locations in the target file-system. This results in efficient use of network resources, while minimizing the amount of work the hosts and/or clients must perform during a backup or restoration.

    PROTECTING CONFIGURATION DATA IN A CLUSTERED CONTAINER SYSTEM

    公开(公告)号:US20240012717A1

    公开(公告)日:2024-01-11

    申请号:US17881457

    申请日:2022-08-04

    CPC classification number: G06F11/1464 G06F11/1451 G06F21/6218 G06F2201/84

    Abstract: Protecting configuration data in a clustered container system may include, in some embodiments, protecting an ETCD data store in a Kubernetes cluster. A data storage management system addresses the unique needs of protecting an ETCD data store of a target Kubernetes cluster, as well as protecting non-ETCD data payloads. The illustrative data storage management system defines ETCD as a unique kind of workload. ETCD protection is integrated within the data storage management system, which automatically creates data structures and resources within the system for, and provides special-purpose features to protect, ETCD contents and associated security certificates. One of the special-purpose features deploys a temporary data transfer agent within the target Kubernetes cluster to safeguard an ETCD snapshot and transmit its contents, along with the security certificates, to a backup infrastructure that operates outside of the target Kubernetes cluster. The backup infrastructure comprises components deployed by the data storage management system.

    Continuous data protection
    106.
    发明授权

    公开(公告)号:US11860741B2

    公开(公告)日:2024-01-02

    申请号:US17687431

    申请日:2022-03-04

    Abstract: Changes made to a database table are accumulated, in durable storage, and snapshots of partitions of the table are obtained. For successive snapshots of a partition, the system accesses a previous snapshot, applies changes from the accumulated changes, and stores the updated snapshot to a durable data store. The accumulated changes and the successive partition snapshots are made available to restore the database to any point in time across a continuum between successive snapshots. Although each partition of the table may have a backup snapshot that was generated at a time different from when other partition snapshots were generated, changes from respective change logs may be selectively log-applied to distinct partitions of a table to generate an on-demand backup of the entire table at common point-in-time across partitions. Point-in-time restores of a table may rely upon a similar process to coalesce partition snapshots that are not aligned in time.

    Methods for managing snapshots in a distributed de-duplication system and devices thereof

    公开(公告)号:US11860739B2

    公开(公告)日:2024-01-02

    申请号:US17816457

    申请日:2022-08-01

    Applicant: NetApp, Inc.

    Inventor: David Slik

    Abstract: Methods, non-transitory computer readable media, and devices that more effectively manage snapshots by creating a namespace including files described by stored file recipe objects and each comprising fragments, directories described by metadata in the file recipe objects and each comprising one or more of the files, and snapshots described by stored snapshot request objects. Content of one of the directories are identified based on an identification of corresponding ones of the file recipe objects that existed within the namespace at a specified time. At least one of the files, included in the identified content and existing within the namespace at the specified time, is accessed in response to one or more received requests. A garbage collection operation is periodically performed to delete the recipe objects that are marked for deletion by tombstone objects and are unreferenced by any of the snapshots as determined based on the snapshot request objects.

    RANSOMWARE INFECTION DETECTION IN FILESYSTEMS
    110.
    发明公开

    公开(公告)号:US20230409713A1

    公开(公告)日:2023-12-21

    申请号:US18458466

    申请日:2023-08-30

    Applicant: Rubrik, Inc.

    Abstract: Described herein is a system that detects ransomware infection in filesystems. The system detects ransomware infection by using backup data of machines. The system detects ransomware infection in two stages. In the first stage, the system analyzes a filesystem's behavior. The filesystem's behavior can be obtained by loading the backup data and crawling the filesystem to create a filesystem metadata including information about file operations during a time interval. The filesystem determines a pattern of the file operations and compares the pattern to a normal patter to analyze the filesystem's behavior. If the filesystem's behavior is abnormal, the system proceeds to the second stage to analyze the content of the files to look for signs of encryption in the filesystem. The system combines the analysis of both stages to determine whether the filesystem is infected by ransomware.

Patent Agency Ranking