Systems and methods for data migration in a clustered file system

    公开(公告)号:US11068187B2

    公开(公告)日:2021-07-20

    申请号:US16452358

    申请日:2019-06-25

    Inventor: Andrei Erofeev

    Abstract: Systems and methods for providing more efficient handling of I/O requests for clustered file system data subject to data migration. For instance, exemplary systems can more quickly determine if certain files on primary storage represent actual file data or stub data for recalling file data from secondary storage. Certain embodiments utilize a driver cache on each cluster node to maintain a record of recently accessed files that represent regular files (as opposed to stubs). A dual-locking process, using both strict locking and relaxed locking, maintains consistency between driver caches on different nodes and the data of the underlying clustered file system, while providing improved access to the data by the different nodes. Moreover, a signaling process can be used, such as with zero-length files, for alerting drivers on different nodes that data migration is to be performed and/or that the driver caches should be flushed.

    AUTOMATIC FILE ENCRYPTION
    24.
    发明申请
    AUTOMATIC FILE ENCRYPTION 有权
    自动文件加密

    公开(公告)号:US20170004320A1

    公开(公告)日:2017-01-05

    申请号:US15175534

    申请日:2016-06-07

    Abstract: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.

    Abstract translation: 公开了一种自动加密文件的方法。 在一些情况下,该方法可以由包括一个或多个处理器的计算机硬件来执行。 该方法可以包括检测对可存储在主存储系统中的第一文件的访问。 此外,该方法可以包括确定该访问是否包括写访问。 响应于确定访问包括写访问,该方法可以包括访问与第一文件相关联的文件元数据并访问一组加密规则。 此外,该方法可以包括确定文件元数据是否满足一组加密规则。 响应于确定文件元数据满足一组加密规则,该方法可以包括加密第一文件以获得第一加密文件并修改第一加密文件的扩展以包括加密扩展。

    Automatic file encryption
    25.
    发明授权
    Automatic file encryption 有权
    自动文件加密

    公开(公告)号:US09367702B2

    公开(公告)日:2016-06-14

    申请号:US14042061

    申请日:2013-09-30

    Abstract: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.

    Abstract translation: 公开了一种自动加密文件的方法。 在一些情况下,该方法可以由包括一个或多个处理器的计算机硬件来执行。 该方法可以包括检测对可存储在主存储系统中的第一文件的访问。 此外,该方法可以包括确定该访问是否包括写访问。 响应于确定访问包括写访问,该方法可以包括访问与第一文件相关联的文件元数据并访问一组加密规则。 此外,该方法可以包括确定文件元数据是否满足一组加密规则。 响应于确定文件元数据满足一组加密规则,该方法可以包括加密第一文件以获得第一加密文件并修改第一加密文件的扩展以包括加密扩展。

    Generic file level restore from a block-level secondary copy
    26.
    发明授权
    Generic file level restore from a block-level secondary copy 有权
    从一级程序级副本复制一般文件级还原

    公开(公告)号:US08938481B2

    公开(公告)日:2015-01-20

    申请号:US13794357

    申请日:2013-03-11

    Abstract: Systems and methods are provided which perform a file level restore by utilizing existing operating system components (e.g., file system drivers) that are natively installed on the target computing device. These components can be used to mount and/or interpret a secondary copy of the file system. For instance, the system can instantiate an interface object (e.g., a device node such as a pseudo device, device file or special file) on the target client which includes file system metadata corresponding to the backed up version of the file system. The interface provides a mechanism for the operating system to mount the secondary copy and perform file level access on the secondary copy, e.g., to restore one or more selected files.

    Abstract translation: 提供了通过利用本地安装在目标计算设备上的现有操作系统组件(例如,文件系统驱动程序)执行文件级还原的系统和方法。 这些组件可用于安装和/或解释文件系统的辅助副本。 例如,系统可以在目标客户端上实例化包括与文件系统的备份版本对应的文件系统元数据的接口对象(例如,伪设备,设备文件或特殊文件的设备节点)。 该界面提供了一种机制,用于操作系统装载辅助副本并在次要副本上执行文件级别访问,例如恢复一个或多个所选文件。

    MULTI-LAYER EMBEDDED ENCRYPTION
    27.
    发明申请
    MULTI-LAYER EMBEDDED ENCRYPTION 审中-公开
    多层嵌入式加密

    公开(公告)号:US20140281545A1

    公开(公告)日:2014-09-18

    申请号:US14042216

    申请日:2013-09-30

    Abstract: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.

    Abstract translation: 公开了一种自动加密文件的方法。 在一些情况下,该方法可以由包括一个或多个处理器的计算机硬件来执行。 该方法可以包括检测对可存储在主存储系统中的第一文件的访问。 此外,该方法可以包括确定该访问是否包括写访问。 响应于确定访问包括写访问,该方法可以包括访问与第一文件相关联的文件元数据并访问一组加密规则。 此外,该方法可以包括确定文件元数据是否满足一组加密规则。 响应于确定文件元数据满足一组加密规则,该方法可以包括加密第一文件以获得第一加密文件并修改第一加密文件的扩展以包括加密扩展。

    MULTI-TIER FILE RESTORATION
    28.
    发明申请
    MULTI-TIER FILE RESTORATION 审中-公开
    多级文件恢复

    公开(公告)号:US20140281518A1

    公开(公告)日:2014-09-18

    申请号:US14042106

    申请日:2013-09-30

    Abstract: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.

    Abstract translation: 公开了一种自动加密文件的方法。 在一些情况下,该方法可以由包括一个或多个处理器的计算机硬件来执行。 该方法可以包括检测对可存储在主存储系统中的第一文件的访问。 此外,该方法可以包括确定该访问是否包括写访问。 响应于确定访问包括写访问,该方法可以包括访问与第一文件相关联的文件元数据并访问一组加密规则。 此外,该方法可以包括确定文件元数据是否满足一组加密规则。 响应于确定文件元数据满足一组加密规则,该方法可以包括加密第一文件以获得第一加密文件并修改第一加密文件的扩展以包括加密扩展。

    Smart network topology systems and methods

    公开(公告)号:US11223535B2

    公开(公告)日:2022-01-11

    申请号:US17129581

    申请日:2020-12-21

    Abstract: The smart network topology systems and methods of the present disclosure are aimed at easing network administrator efforts in configuring network configurations to suit their network environment. For instance, the smart network topology system may provide predefined network topology types that an administrator can use when setting up network connectivity between client devices and other network devices such as media agents, storage servers, and the like. Further, the smart network topology system provides the user with a way to customize the routes created between the client computing devices and storage computing devices such that each client computing device is configured to communicate with only those storage computing devices that the client computing device needs to communicate with to perform one or more data protection operations.

    Automatic file encryption
    30.
    发明授权

    公开(公告)号:US11042663B2

    公开(公告)日:2021-06-22

    申请号:US16444355

    申请日:2019-06-18

    Abstract: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.

Patent Agency Ranking