Data protection method, electronic device and computer program product

    公开(公告)号:US11940879B2

    公开(公告)日:2024-03-26

    申请号:US17060040

    申请日:2020-09-30

    CPC classification number: G06F11/1451 G06N20/00 G06F2201/84

    Abstract: Embodiments of the present disclosure provide a data protection method, an electronic device, and a computer program product. The method includes determining an object feature for each protection object in a set of protection objects that generate protected data, the set of protection objects including at least one protection object configured with a predetermined data protection strategy. The method further includes determining a set of candidate objects belonging to the same class as the at least one protection object from the set of protection objects according to the determined object features. The method further includes configuring the predetermined data protection strategy to at least one candidate object in the set of candidate objects.

    Incident-responsive, computing system snapshot generation

    公开(公告)号:US11928033B2

    公开(公告)日:2024-03-12

    申请号:US17809628

    申请日:2022-06-29

    Applicant: Ivanti, Inc.

    Inventor: Liam Hughes

    CPC classification number: G06F11/1464 G06F11/3495 G06F2201/84

    Abstract: A method of remote device diagnosis and mitigation includes receiving a signal indicative of an intermittent technical state of a first device. Immediately responsive thereto, the method includes interrogating the first device for parameters. The method includes interrogating the first device for the parameters at a third time outside receipt of the signal. The parameters include a transient parameter present at a first time of the intermittent technical state and not present a second time following the first time. The method includes recording the parameters from the first time in a first data file and the parameters for the third time in an additional data file. The first data file is compared with the additional data file to identify a difference in a parameter indicative of a cause of the intermittent technical state. The method includes remotely implementing a change on the first device to mitigate the cause.

    Ensuring data integrity of executed transactions

    公开(公告)号:US11907204B2

    公开(公告)日:2024-02-20

    申请号:US17886080

    申请日:2022-08-11

    Abstract: A central service provider manages a blockchain network that writes the cryptographic hash of each executed transaction in a block to the blockchain network. For each executed transaction, the central service provider generates and transmits a transaction receipt such that a party can verify that the transaction was appropriately executed. Additionally, a party can check that the party's records are correct by providing transaction data describing details of transactions recorded in the party's records to the central service provider. The central service provider verifies the party's records by comparing the transaction data in the party's records to the blocks of transaction records in the blockchain network. In some scenarios, the central service provider may identify or receive an identification of a discrepancy arising from one or more transactions. The central service provider can reconcile the identified discrepancy.

    Portability of checkpoints of an application using central processing unit (CPU)-specific functions

    公开(公告)号:US11899546B2

    公开(公告)日:2024-02-13

    申请号:US17804230

    申请日:2022-05-26

    Applicant: Red Hat, Inc.

    CPC classification number: G06F11/1469 G06F2201/84

    Abstract: Systems and methods are described for improving portability of checkpoints of an application using central processing unit (CPU)-specific features. In an example, a system includes a source computing system and a destination computing system. The source computing system may be configured to: cause a first execution of an application that includes a function associated with a plurality of implementations; receive a request to resolve an implementation decision for the function; select, based on a set of source CPU-specific features, a source-specific implementation for the first execution of the function; patch, by rendering a resolved callsite table, a call site associated with the function with an address of the source-specific implementation; and send, to a destination computing system, a checkpoint of the application that includes the resolved callsite table. The destination computing system is configured to restore the application by changing the implementation decision based on a set of destination CPU-specific features.

    Efficient synchronization of cloud enabled file system database during snapshot restore operation

    公开(公告)号:US11899544B2

    公开(公告)日:2024-02-13

    申请号:US16878256

    申请日:2020-05-19

    Abstract: Methods, apparatus, and processor-readable storage media for efficient synchronization of a cloud enabled file system database during a snapshot restore operation are provided herein. An example computer-implemented method includes intercepting a user request to initiate a snapshot restore operation on a file system associated with a local storage system, wherein the file system comprises one or more stub files that are indicative of locations of cloud objects comprising files that were previously sent from the local storage system to a cloud storage platform; prior to the snapshot restore operation being performed, creating a current snapshot of the file system; obtaining an indication that the file system was successfully restored on the local storage system; and using the current snapshot to perform a synchronization operation, wherein the synchronization operation deletes one or more orphan cloud objects in the cloud storage platform that resulted from the snapshot restore operation.

    High-frequency virtual machine restore points

    公开(公告)号:US11899543B2

    公开(公告)日:2024-02-13

    申请号:US16201838

    申请日:2018-11-27

    Applicant: Nutanix, Inc.

    Abstract: Systems for application configuration backup and restore. Techniques establish high frequency restore points of application configuration metadata. Processing commences upon receiving instructions to periodically take snapshots of application configuration metadata. To avoid incurring unnecessary costs to process snapshots of application configuration metadata when the application configuration metadata is slow-changing, the method performs a low-cost check to get the latest update time of the application configuration metadata. That time is compared to the time of the most recent snapshot of the application configuration metadata. When the time of the latest update time of the application configuration metadata is equal to the time of the most recent snapshot of the application configuration metadata, then rather than incurring the cost of generating a duplicate snapshot, the method waits for a duration without generating a new snapshot. High frequency restore points for application configuration metadata are emulated by pointing to corresponding lower frequency snapshots.

Patent Agency Ranking