Transaction log index generation in an enterprise backup system

    公开(公告)号:US11263173B2

    公开(公告)日:2022-03-01

    申请号:US16526699

    申请日:2019-07-30

    Abstract: Certain embodiments disclosed herein reduce or eliminate a communication bottleneck at the storage manager by reducing communication with the storage manager while maintaining functionality of an information management system. In some implementations, operations performed as part of a backup process may be stored in transaction logs. These transaction logs may include information about a transaction performed between the client computing system and the network storage that hosts the backup of the client computing system. The transaction logs may be provided to a secondary storage system that can be used to form a backup index. The backup index may be used to facilitate accessing the data stored at the network storage. Advantageously, generating the transaction logs and separating the generation of the backup index from the backup process can reduce resource usage during performance of the backup and speed up the backup process while further reducing interaction with the storage manager.

    Platform-agnostic containerized application data protection

    公开(公告)号:US11321188B2

    公开(公告)日:2022-05-03

    申请号:US16868964

    申请日:2020-05-07

    Abstract: Certain embodiments described herein relate to an improved information management system that can perform provider-specific data protection methods for cloud-stored data. In one embodiment, the information management system accesses a pod specification that indicates information usable to execute a containerized application on behalf of a user, and determines the cloud provider system configured to provide one or more computing resources for execution the containerized application. Using a provider-specific interface that is specific to the determined cloud provider system, the information management system creates a snapshot of a cloud storage volume associated with the containerized application and accesses the data inside the snapshot. The accessed data is stored onto a secondary storage device, and the snapshot is removed from the cloud provider system, thereby providing an efficient backup solution for the data used for executing the containerized application on the container orchestrator system.

    Analysis of backup copies to identify malware-encrypted primary data

    公开(公告)号:US12292974B2

    公开(公告)日:2025-05-06

    申请号:US17975409

    申请日:2022-10-27

    Abstract: Backup data is leveraged to determine whether primary data has been encrypted by malware. The disclosed approach does not rely on recognizing particular malware instances or malware provenance, and thus can be applied to any body of data. Even a novel and previously unknown malware attack can be detected in this way. An illustrative data storage management system analyzes secondary copies it created over time, applies a multi-factor analysis to data recovered from the secondary copies and, based on the analysis, infers whether the primary data from which the secondary copies were created may be encrypted. The present approach uses successive versions of backup copies to find indicia of malware encryption, rather than trying to trace or identify the malware itself. Indicia of entropy correlate highly with encryption, such as encryption performed by malware attacks. Conversely, indicia of similarity correlate highly with lack of encryption of successive versions of documents.

Patent Agency Ranking