Scanning a backup for vulnerabilities

    公开(公告)号:US11841953B2

    公开(公告)日:2023-12-12

    申请号:US17573483

    申请日:2022-01-11

    Applicant: Cohesity, Inc.

    CPC classification number: G06F21/577 G06F11/1446 G06F2201/84 G06F2221/033

    Abstract: A plurality of scanned backup snapshots are generated. A backup snapshot among a plurality of backup snapshots is selected. At least a portion of the selected backup snapshot is restored in a temporary environment to create a restored instance of at least the portion of the selected backup snapshot. A vulnerability scan of the restored instance of at least the portion of the selected backup snapshot is performed. One or more vulnerabilities of the scanned portion of the selected backup snapshot are tracked. A request associated with identifying a scanned backup snapshot to restore from the plurality of scanned backup snapshots is received. In response to the request, at least a predetermined identification of the one or more vulnerabilities of the selected backup snapshot is provided.

    Method and system for protecting data during data migration

    公开(公告)号:US11836051B2

    公开(公告)日:2023-12-05

    申请号:US17725690

    申请日:2022-04-21

    Abstract: A method for managing data backup includes: making a determination that an asset source is a first type of asset source, in which a source client device comprises the asset source; generating, based on the determination, a data transfer path for a plurality of snapshots associated with the asset source between the source client device and a data protection system; initiating a backup for user data associated with the asset source to a target client device; obtaining the plurality of snapshots to the data protection system using the data transfer path, in which the user data is backed up in the target client device while at least a portion of the plurality of snapshots is obtained by the data protection system; and deleting the plurality of snapshots from the source client device, upon receipt of confirmation that the plurality of snapshots is successfully stored in the data protection system.

    Tagging writers for incremental backups of system objects

    公开(公告)号:US11836046B1

    公开(公告)日:2023-12-05

    申请号:US17842584

    申请日:2022-06-16

    CPC classification number: G06F11/1451 G06F2201/84

    Abstract: Writers participating in a backup are identified. A mapping is generated between the writers and associated files. The mapping includes file properties. The mapping is initialized by tagging the writers with a full backup tag. A base backup copy of the writers is created by conducting a full backup of each writer tagged with the full backup tag. At a current backup operation after creating the base backup, a list of current files that will participate in the current backup operation is generated. The list of current files is compared against the files in the mapping to determine whether a particular writer associated with a current file should be tagged with the full backup tag or an incremental backup tag. The particular writer is tagged with the incremental backup tag when file properties associated with the current file have changed.

    PORTABILITY OF CHECKPOINTS OF AN APPLICATION USING CENTRAL PROCESSING UNIT (CPU)-SPECIFIC FUNCTIONS

    公开(公告)号:US20230385162A1

    公开(公告)日:2023-11-30

    申请号:US17804230

    申请日:2022-05-26

    Applicant: Red Hat, Inc.

    CPC classification number: G06F11/1469 G06F2201/84

    Abstract: Systems and methods are described for improving portability of checkpoints of an application using central processing unit (CPU)-specific features. In an example, a system includes a source computing system and a destination computing system. The source computing system may be configured to: cause a first execution of an application that includes a function associated with a plurality of implementations; receive a request to resolve an implementation decision for the function; select, based on a set of source CPU-specific features, a source-specific implementation for the first execution of the function; patch, by rendering a resolved callsite table, a call site associated with the function with an address of the source-specific implementation; and send, to a destination computing system, a checkpoint of the application that includes the resolved callsite table. The destination computing system is configured to restore the application by changing the implementation decision based on a set of destination CPU-specific features.

    SYSTEMS AND METHODS FOR PREVENTING DATA LOSS
    118.
    发明公开

    公开(公告)号:US20230385159A1

    公开(公告)日:2023-11-30

    申请号:US17751964

    申请日:2022-05-24

    Applicant: TESSELL, INC.

    CPC classification number: G06F11/1464 G06F11/1469 G06F11/1448 G06F2201/84

    Abstract: Systems, methods, and computer readable media for preventing data loss at ephemeral and/or volatile storage of a local storage system are provided. These techniques may include synchronizing that state of the ephemeral storage system to a cloud-based storage system and capturing a cloud snapshot of the cloud-based storage system. In the event of a failure at the volatile storage, the cloud-based snapshot can be used as a restore point for the cloud-based storage system, the state of which can then be synchronized back to the volatile storage. Additionally, the local storage system includes durable storage for storing transaction logs. After synchronizing the state of the cloud-based storage system to the volatile storage, the local storage system can playback transactions in the transaction log to restore the volatile segment to the state at the time of the failure.

    SNAPSHOT COMPARISON WITH METADATA COMPACTION
    119.
    发明公开

    公开(公告)号:US20230385157A1

    公开(公告)日:2023-11-30

    申请号:US18325853

    申请日:2023-05-30

    Applicant: Cloudera, Inc.

    Abstract: Snapshot or point-in-time image functionality improves the use of object-based datastores. An example system includes an object-based datastore and a metadata datastore associated with the object-based datastore. Instances of the metadata datastore are created as snapshot images of the object-based datastore. Comparison of snapshot images is important for database analytics, disaster recovery, data protection, and more. Example techniques provide comparison of snapshot images (as metadata datastore instances) and remain robust and accurate in view of compactions performed by the metadata datastore. An example technique includes generating and updating a graph-based data structure that captures relationships between metadata files in the metadata datastore, particularly between pre-compaction files and post-compaction files. The example technique further includes referencing the graph-based data structure to accelerate snapshot image comparison based on determining whether files of a source snapshot image were compacted into files of a destination snapshot image, and/or vice versa.

Patent Agency Ranking