CAPTURING POST-SNAPSHOT QUIESCENCE WRITES IN A LINEAR IMAGE BACKUP CHAIN
    3.
    发明申请
    CAPTURING POST-SNAPSHOT QUIESCENCE WRITES IN A LINEAR IMAGE BACKUP CHAIN 审中-公开
    在线性图像备份链中捕获POST-SNAPSHOT QUIESCENCE写入

    公开(公告)号:US20160357640A1

    公开(公告)日:2016-12-08

    申请号:US14965724

    申请日:2015-12-10

    Abstract: Capturing post-snapshot quiescence writes in a linear image backup chain. In one example embodiment, a method for capturing post-snapshot quiescence writes in a linear image backup chain may include taking a first snapshot of a source storage at a first point in time using a Volume Shadow Copy Service (VSS), identifying a first set of block positions of blocks that are allocated in the source storage at the first point in time, identifying a second set of block positions of blocks that are written to the first snapshot during post-snapshot quiescence of the first snapshot by the VSS or by one or more VSS writers, resulting in a first quiesced snapshot, copying the blocks in the first set from the first snapshot to a full image backup, and copying the blocks in the second set from the first quiesced snapshot to a first incremental image backup.

    Abstract translation: 捕获快照静态后,在线性映像备份链中写入。 在一个示例实施例中,用于捕获在线性图像备份链中的快照后静默写入的方法可以包括使用卷影复制服务(VSS)在第一时间点获取源存储器的第一快照,所述卷影复制服务(VSS)识别第一集合 在第一时间点在源存储器中分配的块的块位置,识别在VSS的第一快照的后快照静止期间写入第一快照的块的第二组块位置,或者通过一个 或多个VSS写入程序,导致第一个静默快照,将第一组中的块从第一个快照复制到完整映像备份,并将第二组中的块从第一个静默快照复制到第一个增量映像备份。

    DETECTING MODIFICATIONS TO A STORAGE THAT OCCUR IN AN ALTERNATE OPERATING ENVIRONMENT
    4.
    发明申请
    DETECTING MODIFICATIONS TO A STORAGE THAT OCCUR IN AN ALTERNATE OPERATING ENVIRONMENT 审中-公开
    检测修改为在备用操作环境中的存储

    公开(公告)号:US20160328165A1

    公开(公告)日:2016-11-10

    申请号:US15048749

    申请日:2016-02-19

    Abstract: Detecting modifications to a storage that occur in an alternate operating environment. In one example embodiment, a method for detecting modifications to a storage that occur in an alternate operating environment may include tracking, in a modify map, modifications to a storage that occur during operation of a primary operating environment, identifying a first most recent transaction identifier in a journal of a file system of the storage prior to closing of the storage by the primary operating environment, upon opening of the storage by the primary operating environment, identifying a second most recent transaction identifier in the journal, determining that the second most recent transaction identifier does not match the first most recent transaction identifier, concluding that the storage was modified in an alternate operating environment between the closing and the opening of the storage by the primary operating environment, and invalidating the modify map.

    Abstract translation: 检测在备用操作环境中发生的存储的修改。 在一个示例实施例中,用于检测在替代操作环境中发生的对存储器的修改的方法可以包括在修改映射中跟踪在主操作环境的操作期间发生的存储器的修改,识别第一最近的事务标识符 在由主操作环境关闭存储之前的存储器的文件系统的日志中,在由主操作环境打开存储时,识别日志中的第二最新事务标识符,确定第二最新 事务标识符与第一个最近的事务标识符不匹配,认定存储在主操作环境的存储关闭和打开之间的备用操作环境中被修改,并且使修改映射失效。

    Client-side encryption in a deduplication backup system
    5.
    发明授权
    Client-side encryption in a deduplication backup system 有权
    重复数据删除备份系统中的客户端加密

    公开(公告)号:US09372998B2

    公开(公告)日:2016-06-21

    申请号:US14508654

    申请日:2014-10-07

    Abstract: Client-side encryption in a deduplication backup system. In one example embodiment, a method includes a backup phase in which various steps are performed for each allocated plain text block stored in a source storage. One step includes hashing, using a first cryptographic hash function, the plain text block to generate a first hash. Another step includes hashing, using a second cryptographic hash function, the first hash to generate a second hash. Another step includes searching a key-value table of a deduplication storage to determine whether the second hash matches any key in the key-value table. Another step includes, upon determining that the second hash does not match any key in the key-value table, encrypting, using an encrypt/decrypt function, the plain text block using the first hash as an encryption password and inserting a key-value pair into the key-value table with the key being the second hash and the value being the encrypted block.

    Abstract translation: 重复数据删除备份系统中的客户端加密。 在一个示例实施例中,一种方法包括备份阶段,其中对于存储在源存储器中的每个分配的纯文本块执行各种步骤。 一步包括散列,使用第一加密散列函数,明文块生成第一散列。 另一步骤包括使用第二密码散列函数的散列哈希生成第二散列。 另一步骤包括搜索重复数据消除存储的键值表以确定第二个散列是否匹配键值表中的任何键。 另一步骤包括,在确定第二散列与密钥值表中的任何密钥不匹配时,使用加密/解密功能将明文块使用第一散列作为加密密码加密,并插入密钥值对 进入键值表,其中该键是第二个散列,该值是加密块。

    Head start population of an image backup
    6.
    发明授权
    Head start population of an image backup 有权
    头像开始人口的图像备份

    公开(公告)号:US09317376B1

    公开(公告)日:2016-04-19

    申请号:US14743486

    申请日:2015-06-18

    Abstract: Head start population of an image backup. In one example embodiment, a method for head start population of an image backup may include tracking blocks that are modified in a source storage between a first point in time and a second point in time, head start copying a first portion of the modified blocks into the image backup prior to the second point in time, activating a snapshot on the source storage at the second point in time where the snapshot represents a state of the source storage at the second point in time, and copying, subsequent to the second point in time, from the snapshot and into the image backup, a second portion of the modified blocks that were not yet copied into the image backup by the second point in time.

    Abstract translation: 头像开始人口的图像备份。 在一个示例实施例中,图像备份的头开始人口的方法可以包括在第一时间点和第二时间点之间在源存储器中修改的跟踪块,头开始将修改的块的第一部分复制到 在第二时间点之前的图像备份,在第二时间点激活源存储上的快照,其中快照表示在第二时间点的源存储器的状态,并且在第二点之后复制 时间,从快照和图像备份,修改的块的第二部分尚未被第二时间点复制到图像备份。

    Capturing post-snapshot quiescence writes in an image backup
    7.
    发明授权
    Capturing post-snapshot quiescence writes in an image backup 有权
    在映像备份中捕获快照后静态写入

    公开(公告)号:US09304864B1

    公开(公告)日:2016-04-05

    申请号:US14733505

    申请日:2015-06-08

    Abstract: Capturing post-snapshot quiescence writes in an image backup. In one example embodiment, a method for capturing post-snapshot quiescence writes in an image backup may include taking a first snapshot of a source storage at a first point in time, identifying a first set of block positions of blocks that are allocated in the source storage at the first point in time, identifying a second set of block positions of blocks that are written to the first snapshot during post-snapshot quiescence of the first snapshot, resulting in a first quiesced snapshot, calculating a third set of block positions by performing a Boolean OR operation on the first set of block positions and the second set of block positions, and copying blocks in the third set of block positions from the first snapshot to a full image backup.

    Abstract translation: 在映像备份中捕获快照后静态写入。 在一个示例实施例中,用于捕获图像备份中的快照后静止写入的方法可以包括在第一时间点获取源存储器的第一快照,识别在源中分配的块的第一组块位置 存储在第一时间点,识别在第一快照的后快照静止期间被写入第一快照的块的第二组块位置,导致第一静默快照,通过执行来计算第三组块位置 在第一组块位置和第二组块位置上的布尔OR运算,以及将第三组块位置中的块从第一快照复制到完整图像备份。

    VIRTUAL DEFRAGMENTATION OF A STORAGE
    8.
    发明申请
    VIRTUAL DEFRAGMENTATION OF A STORAGE 审中-公开
    存储的虚拟缺陷

    公开(公告)号:US20160048348A1

    公开(公告)日:2016-02-18

    申请号:US14600874

    申请日:2015-01-20

    Abstract: Virtual defragmentation of a storage. In one example embodiment, a method for virtual defragmentation of a storage includes various steps. For example, the method includes intercepting a move command directed to a storage during a defragmentation of the storage. The move command specifies an actual location of a block and a defrag location for the block in the storage. The method also includes updating a virtual defragmentation map to record the actual location of the block and the defrag location for the block. The method further includes preventing the block from being moved to the defrag location. The method also includes allowing file system metadata of the storage to be updated to falsely reflect that the block has been moved to the defrag location.

    Abstract translation: 存储虚拟碎片整理。 在一个示例实施例中,用于存储器的虚拟碎片整理的方法包括各种步骤。 例如,该方法包括在存储器的碎片整理期间拦截定向到存储器的移动命令。 move命令指定存储块中块的实际位置和碎片整理位置。 该方法还包括更新虚拟碎片整理图以记录块的实际位置和块的碎片整理位置。 该方法还包括防止块被移动到碎片整理位置。 该方法还包括允许更新存储器的文件系统元数据以错误地反映该块已被移动到碎片整理位置。

    HASH VALUE COMPARISON DURING CRASH-TOLERANT INCREMENTAL CHANGE TRACKING BETWEEN BACKUPS OF A SOURCE STORAGE
    9.
    发明申请
    HASH VALUE COMPARISON DURING CRASH-TOLERANT INCREMENTAL CHANGE TRACKING BETWEEN BACKUPS OF A SOURCE STORAGE 审中-公开
    在源存储的备份之间的缓存变化跟踪期间的哈希值比较

    公开(公告)号:US20150317211A1

    公开(公告)日:2015-11-05

    申请号:US14619330

    申请日:2015-02-11

    CPC classification number: G06F11/1451 G06F11/1458 G06F2201/83

    Abstract: Hash value comparison during crash-tolerant incremental change tracking between backups of a source storage. In one example embodiment, a method includes assigning each block in a source storage into one of multiple zones, creating a nonvolatile zone map, tracking each of the zones that is changed between a first point in time and a second point in time, identifying, as potentially changed zone blocks, the blocks in the source storage assigned to any zone marked as changed in the nonvolatile zone map, identifying, as potentially outdated backup blocks, the most recently backed-up blocks in one or more prior backups that correspond to the potentially changed zone blocks, calculating source hash values of the potentially changed zone blocks, calculating backup hash values of the potentially outdated backup blocks, and comparing the source hash values to the backup hash values to determine which blocks in the source storage actually changed.

    Abstract translation: 源存储备份之间的容错增量更改跟踪期间的哈希值比较。 在一个示例实施例中,一种方法包括将源存储器中的每个块分配到多个区域中的一个区域,创建非易失性区域映射,跟踪在第一时间点和第二时间点之间改变的每个区域, 作为潜在更改的区块,分配给在非易失性区域映射中被标记为改变的任何区域的源存储器中的块,将作为可能过时的备份块的最近备份的块识别为对应于 计算潜在更改的区块的源哈希值,计算潜在过时的备份块的备份哈希值,以及将源哈希值与备份散列值进行比较,以确定源存储器中的哪些块实际上已更改。

    Software activation and revalidation
    10.
    发明授权
    Software activation and revalidation 有权
    软件激活和重新验证

    公开(公告)号:US09171138B1

    公开(公告)日:2015-10-27

    申请号:US14611504

    申请日:2015-02-02

    Abstract: Software activation and revalidation. For example, a method for software activation and revalidation may include collecting machine configuration information from a machine on which a software application has been at least partially installed, sending the machine configuration information and a product key to an activation server, applying activation rules to determine whether the product key is valid for the machine configuration information, if the product key is valid for the machine configuration information, activating the software application by sending, from the activation server to the machine, license data that authorizes access to the software application and that contains the activation rules, periodically applying, at the machine, the activation rules to newly-collected machine configuration information to determine whether the product key remains valid for the newly-collected machine configuration information, and if the product key remains valid, revalidating, at the machine, the license data to authorize continued access to the software application.

    Abstract translation: 软件激活和重新验证。 例如,用于软件激活和重新验证的方法可以包括从已经至少部分地安装了软件应用的机器收集机器配置信息,将机器配置信息和产品密钥发送到激活服务器,应用激活规则来确定 产品密钥对机器配置信息是否有效,如果产品密钥对机器配置信息有效,则通过从激活服务器向机器发送授权访问软件应用程序的许可证数据激活软件应用程序, 包含激活规则,在机器周期性地将激活规则应用于新收集的机器配置信息,以确定产品密钥对于新收集的机器配置信息是否保持有效,并且如果产品密钥保持有效,则重新验证 机器,许可证数据授权给 可以访问软件应用程序。

Patent Agency Ranking