CAPTURING POST-SNAPSHOT QUIESCENCE WRITES IN A LINEAR IMAGE BACKUP CHAIN
    25.
    发明申请
    CAPTURING POST-SNAPSHOT QUIESCENCE WRITES IN A LINEAR IMAGE BACKUP CHAIN 审中-公开
    在线性图像备份链中捕获POST-SNAPSHOT QUIESCENCE写入

    公开(公告)号:US20160357640A1

    公开(公告)日:2016-12-08

    申请号:US14965724

    申请日:2015-12-10

    Abstract: Capturing post-snapshot quiescence writes in a linear image backup chain. In one example embodiment, a method for capturing post-snapshot quiescence writes in a linear image backup chain may include taking a first snapshot of a source storage at a first point in time using a Volume Shadow Copy Service (VSS), identifying a first set of block positions of blocks that are allocated in the source storage at the first point in time, identifying a second set of block positions of blocks that are written to the first snapshot during post-snapshot quiescence of the first snapshot by the VSS or by one or more VSS writers, resulting in a first quiesced snapshot, copying the blocks in the first set from the first snapshot to a full image backup, and copying the blocks in the second set from the first quiesced snapshot to a first incremental image backup.

    Abstract translation: 捕获快照静态后,在线性映像备份链中写入。 在一个示例实施例中,用于捕获在线性图像备份链中的快照后静默写入的方法可以包括使用卷影复制服务(VSS)在第一时间点获取源存储器的第一快照,所述卷影复制服务(VSS)识别第一集合 在第一时间点在源存储器中分配的块的块位置,识别在VSS的第一快照的后快照静止期间写入第一快照的块的第二组块位置,或者通过一个 或多个VSS写入程序,导致第一个静默快照,将第一组中的块从第一个快照复制到完整映像备份,并将第二组中的块从第一个静默快照复制到第一个增量映像备份。

    DETECTING MODIFICATIONS TO A STORAGE THAT OCCUR IN AN ALTERNATE OPERATING ENVIRONMENT
    26.
    发明申请
    DETECTING MODIFICATIONS TO A STORAGE THAT OCCUR IN AN ALTERNATE OPERATING ENVIRONMENT 审中-公开
    检测修改为在备用操作环境中的存储

    公开(公告)号:US20160328165A1

    公开(公告)日:2016-11-10

    申请号:US15048749

    申请日:2016-02-19

    Abstract: Detecting modifications to a storage that occur in an alternate operating environment. In one example embodiment, a method for detecting modifications to a storage that occur in an alternate operating environment may include tracking, in a modify map, modifications to a storage that occur during operation of a primary operating environment, identifying a first most recent transaction identifier in a journal of a file system of the storage prior to closing of the storage by the primary operating environment, upon opening of the storage by the primary operating environment, identifying a second most recent transaction identifier in the journal, determining that the second most recent transaction identifier does not match the first most recent transaction identifier, concluding that the storage was modified in an alternate operating environment between the closing and the opening of the storage by the primary operating environment, and invalidating the modify map.

    Abstract translation: 检测在备用操作环境中发生的存储的修改。 在一个示例实施例中,用于检测在替代操作环境中发生的对存储器的修改的方法可以包括在修改映射中跟踪在主操作环境的操作期间发生的存储器的修改,识别第一最近的事务标识符 在由主操作环境关闭存储之前的存储器的文件系统的日志中,在由主操作环境打开存储时,识别日志中的第二最新事务标识符,确定第二最新 事务标识符与第一个最近的事务标识符不匹配,认定存储在主操作环境的存储关闭和打开之间的备用操作环境中被修改,并且使修改映射失效。

    VIRTUALIZING MULTIPLE NETWORKED MACHINES USING A PREDETERMINED NETWORK RECOVERY POLICY
    27.
    发明申请
    VIRTUALIZING MULTIPLE NETWORKED MACHINES USING A PREDETERMINED NETWORK RECOVERY POLICY 审中-公开
    使用预定网络恢复策略虚拟化多台网络机器

    公开(公告)号:US20160210199A1

    公开(公告)日:2016-07-21

    申请号:US14717133

    申请日:2015-05-20

    Abstract: Virtualizing multiple networked machines using a predetermined network recovery policy. In one example embodiment, a method for virtualizing multiple networked machines using a predetermined network recovery policy may include identifying multiple image backups of the multiple networked machines, determining an order for booting the multiple networked machines as multiple networked virtual machines, determining network settings for the multiple networked machines when booted as the multiple networked virtual machines, storing the order and the network settings in the predetermined network recovery policy prior to booting the multiple networked machines as the multiple networked virtual machines, booting the multiple networked machines as the multiple networked virtual machines from the multiple image backups in the order stored in the predetermined network recovery policy and with the network settings stored in the predetermined network recovery policy subsequent to the storing and in response to receiving a command to implement the predetermined network recovery policy.

    Abstract translation: 使用预定的网络恢复策略虚拟化多个联网计算机。 在一个示例实施例中,使用预定网络恢复策略来虚拟化多个联网机器的方法可以包括识别多个联网机器的多个映像备份,确定将多个联网机器引导为多个联网虚拟机的顺序,确定用于 在作为多个联网的虚拟机引导时,将多个联网机器引导为多个联网的虚拟机,在将多个联网的机器引导为多个联网的虚拟机之前,将订单和网络设置存储在预定的网络恢复策略中,引导多个联网的机器作为多个联网的虚拟机 从存储在预定网络恢复策略中的顺序的多个映像备份和存储在存储之后的预定网络恢复策略中的网络设置以及响应于接收到执行预定网络恢复策略的命令。

    Client-side encryption in a deduplication backup system
    28.
    发明授权
    Client-side encryption in a deduplication backup system 有权
    重复数据删除备份系统中的客户端加密

    公开(公告)号:US09372998B2

    公开(公告)日:2016-06-21

    申请号:US14508654

    申请日:2014-10-07

    Abstract: Client-side encryption in a deduplication backup system. In one example embodiment, a method includes a backup phase in which various steps are performed for each allocated plain text block stored in a source storage. One step includes hashing, using a first cryptographic hash function, the plain text block to generate a first hash. Another step includes hashing, using a second cryptographic hash function, the first hash to generate a second hash. Another step includes searching a key-value table of a deduplication storage to determine whether the second hash matches any key in the key-value table. Another step includes, upon determining that the second hash does not match any key in the key-value table, encrypting, using an encrypt/decrypt function, the plain text block using the first hash as an encryption password and inserting a key-value pair into the key-value table with the key being the second hash and the value being the encrypted block.

    Abstract translation: 重复数据删除备份系统中的客户端加密。 在一个示例实施例中,一种方法包括备份阶段,其中对于存储在源存储器中的每个分配的纯文本块执行各种步骤。 一步包括散列,使用第一加密散列函数,明文块生成第一散列。 另一步骤包括使用第二密码散列函数的散列哈希生成第二散列。 另一步骤包括搜索重复数据消除存储的键值表以确定第二个散列是否匹配键值表中的任何键。 另一步骤包括,在确定第二散列与密钥值表中的任何密钥不匹配时,使用加密/解密功能将明文块使用第一散列作为加密密码加密,并插入密钥值对 进入键值表,其中该键是第二个散列,该值是加密块。

    Head start population of an image backup
    29.
    发明授权
    Head start population of an image backup 有权
    头像开始人口的图像备份

    公开(公告)号:US09317376B1

    公开(公告)日:2016-04-19

    申请号:US14743486

    申请日:2015-06-18

    Abstract: Head start population of an image backup. In one example embodiment, a method for head start population of an image backup may include tracking blocks that are modified in a source storage between a first point in time and a second point in time, head start copying a first portion of the modified blocks into the image backup prior to the second point in time, activating a snapshot on the source storage at the second point in time where the snapshot represents a state of the source storage at the second point in time, and copying, subsequent to the second point in time, from the snapshot and into the image backup, a second portion of the modified blocks that were not yet copied into the image backup by the second point in time.

    Abstract translation: 头像开始人口的图像备份。 在一个示例实施例中,图像备份的头开始人口的方法可以包括在第一时间点和第二时间点之间在源存储器中修改的跟踪块,头开始将修改的块的第一部分复制到 在第二时间点之前的图像备份,在第二时间点激活源存储上的快照,其中快照表示在第二时间点的源存储器的状态,并且在第二点之后复制 时间,从快照和图像备份,修改的块的第二部分尚未被第二时间点复制到图像备份。

    AVOIDING ENCRYPTION IN A DEDUPLICATION STORAGE
    30.
    发明申请
    AVOIDING ENCRYPTION IN A DEDUPLICATION STORAGE 有权
    避免存储在加密存储器中

    公开(公告)号:US20160098569A1

    公开(公告)日:2016-04-07

    申请号:US14966406

    申请日:2015-12-11

    Abstract: Avoiding encryption in a deduplication vault. In one example embodiment, a method may include analyzing an allocated plain text block stored in the source storage to determine if the block is already stored in the deduplication storage, in response to the block not being stored, encrypting the allocated plain text block and analyzing the encrypted block to determine if the encrypted block is already stored in the deduplication storage, analyzing a second allocated plain text block stored in the source storage to determine if the block is already stored in the deduplication storage, in response to the block already being stored, avoiding encryption of the second allocated plain text block by not encrypting the second allocated plain text block and instead associating the location of the second allocated plain text block in the source storage with the location of the duplicate block already stored.

    Abstract translation: 避免重复数据删除库中的加密。 在一个示例实施例中,方法可以包括分析存储在源存储器中的分配的明文块,以响应于该块未被存储,加密所分配的明文块并分析其中的块,以确定块是否已经存储在重复数据删除存储器中 加密块以确定加密块是否已经存储在重复数据删除存储器中,分析存储在源存储器中的第二分配明文块以响应于已经存储的块来确定块是否已经存储在重复数据删除存储器中 通过不加密第二分配的纯文本块来避免对第二分配的明文块的加密,并且将源存储器中的第二分配的明文块的位置与已经存储的重复块的位置相关联。

Patent Agency Ranking