PERFORMING DATA BACKUPS USING SNAPSHOTS
    1.
    发明申请

    公开(公告)号:US20180089033A1

    公开(公告)日:2018-03-29

    申请号:US15275144

    申请日:2016-09-23

    Applicant: Apple Inc.

    Abstract: The embodiments set forth a technique for carrying out a backup of data managed at a computing device. According to some embodiments, the technique can include the steps of (1) receiving a request to carry out the backup of the data, (2) in response to the request, generating a current snapshot of the data, (3) identifying, in accordance with the current snapshot of the data, block data of at least one data block to be reflected in the backup of the data, wherein the at least one data block is tagged with an identifier of a file node to which the at least one data block corresponds, and (4) providing information to a storage to cause the block data to be reflected in the backup of the data.

    FILE SYSTEM SUPPORT FOR ROLLING KEYS
    2.
    发明申请
    FILE SYSTEM SUPPORT FOR ROLLING KEYS 审中-公开
    文件系统支持滚动条

    公开(公告)号:US20160321460A1

    公开(公告)日:2016-11-03

    申请号:US14700070

    申请日:2015-04-29

    Applicant: Apple Inc.

    CPC classification number: G06F21/6209 G06F21/602 H04L9/14

    Abstract: This application relates to a key rolling process for a file system of a computing device. The key rolling process allows for files to be transparently re-encrypted in a background process while still allowing applications to access files being re-encrypted. During re-encryption, a portion of the file is decrypted using a current key for the file and re-encrypted using a new key for the file. During re-encryption, the portion of the file can be relocated to another location in memory. Metadata associated with the file can be updated to include information pertaining to the location of the re-encrypted portion. The metadata can also be updated include information pertaining to how much of the file has been re-encrypted with the new key and how much of the file remains encrypted with the current key.

    Abstract translation: 本申请涉及计算设备的文件系统的关键滚动过程。 关键滚动过程允许在后台进程中透明地重新加密文件,同时仍允许应用程序访问要重新加密的文件。 在重新加密期间,文件的一部分将使用文件的当前密钥进行解密,并使用该文件的新密钥重新加密。 在重新加密期间,文件的一部分可以重定位到内存中的另一个位置。 可以更新与文件相关联的元数据,以包括与再加密部分的位置有关的信息。 还可以更新元数据,包括关于用新密钥重新加密了多少文件的信息以及使用当前密钥保存多少文件。

    TECHNIQUES FOR TRACKING FILE SYSTEM UTILIZATION BY SOFTWARE APPLICATIONS

    公开(公告)号:US20250086141A1

    公开(公告)日:2025-03-13

    申请号:US18540699

    申请日:2023-12-14

    Applicant: Apple Inc.

    Abstract: Disclosed herein are techniques for tracking file system (FS) utilization by a plurality of applications. According to some embodiments, a technique can be implemented by a computing device on which the FS is implemented, and includes the steps of (1) receiving, from an application among the plurality of applications, a request to perform an input/output (I/O) operation pertaining to a first FS object, where the request includes a unique identifier (ID) associated with the application, (2) creating or locating, within the FS, the first FS object, (3) performing the I/O operation against the first FS object, (4) creating or locating, within the FS, a second FS object associated with the unique ID, and (5) updating the second FS object to reflect the I/O operation. Other techniques include observing, analyzing, etc., FS utilization by the plurality of applications.

    FILE SYSTEM SUPPORT FOR ROLLING KEYS ON FILE EXTENTS

    公开(公告)号:US20170359174A1

    公开(公告)日:2017-12-14

    申请号:US15274706

    申请日:2016-09-23

    Applicant: Apple Inc.

    Abstract: This application sets forth a key rolling technique for a file system of a computing device. The key rolling technique allows for files to be transparently re-encrypted in a background process while still allowing applications to access the files being re-encrypted. During re-encryption, at least one file extent of a file is decrypted using a current key for the file extent and re-encrypted using a new key for the file extent. Moreover, the file extent can be relocated to another location in memory during re-encryption to enhance accessibility and crash protection features. Metadata associated with the file can be updated to include information pertaining to both the location of the re-encrypted file extent as well as the new key that can be used to decrypt the re-encrypted file extent. In this manner, the metadata can be used to properly construct a complete file when the file needs to be accessed.

    TECHNIQUES FOR MANAGING SOFTWARE APPLICATIONS

    公开(公告)号:US20230099057A1

    公开(公告)日:2023-03-30

    申请号:US17664206

    申请日:2022-05-19

    Applicant: Apple Inc.

    Abstract: Enclosed herein are techniques for securely executing an application. A method can be implemented by an operating system of a computing device, where the computing device includes a file system volume that includes a first data structure, and the method includes the steps of (1) receiving a request to launch the application, where the request references an application archive file that includes a second data structure that: (i) defines an organization of a plurality of files associated with the application, and (ii) includes cryptographic information for verifying the plurality of files and the second data structure; (2) in response to receiving the request: determining whether the second data structure, the plurality of files, or both, are valid using the cryptographic information; and (3) in response to determining that the second data structure, the plurality of files, or both, are valid: associating the second data structure with the first data structure.

    SYSTEMS AND METHODS FOR IMPLEMENTING IMPROVED LINKS BETWEEN PATHS OF ONE OR MORE FILE SYSTEMS

    公开(公告)号:US20200379662A1

    公开(公告)日:2020-12-03

    申请号:US16879432

    申请日:2020-05-20

    Applicant: Apple Inc.

    Abstract: Representative embodiments set forth herein disclose techniques for implementing improved links between paths of one or more file systems. According to some embodiments, techniques are disclosed for establishing a system volume and a data volume within a container. According to other embodiments, techniques are disclosed for establishing a link from a source path of a system volume within a container to a target path of a data volume within the container. According to yet other embodiments, techniques are disclosed for determining whether to allow a file system operation on a data volume of a container based on at least determining whether a target path is associated with a reference to a source path.

    DEFRAGMENTING METADATA OF A FILESYSTEM
    7.
    发明申请

    公开(公告)号:US20200233839A1

    公开(公告)日:2020-07-23

    申请号:US16673820

    申请日:2019-11-04

    Applicant: Apple Inc.

    Abstract: A device implementing a system for defragmenting metadata of a filesystem includes a processor configured to, in response to receiving a trigger from a server remote from the device, obtain the metadata from a first data structure, the first data structure comprising a first set of one or more nodes and a second set of one or more nodes, and insert the metadata obtained from the first data structure into a third set of one or more nodes of a second data structure, wherein the third set of one or more nodes omits one or more entries from the second set of nodes. The at least one processor is further configured to, in accordance with a determination that the metadata was successfully inserted into the second data structure, provide the second data structure as a replacement of the first data structure for the filesystem.

    FLEXIBLE OVER-PROVISIONING OF STORAGE SPACE WITHIN SOLID-STATE STORAGE DEVICES (SSDs)

    公开(公告)号:US20190196732A1

    公开(公告)日:2019-06-27

    申请号:US16124147

    申请日:2018-09-06

    Applicant: Apple Inc.

    Abstract: The embodiments set forth a technique for over-provisioning storage space within a solid-state storage device (SSD). In particular, a file system can (1) receive a first request to create a file, where the first request includes a size for the file, (2) identifying at least one extent that corresponds to storage space within the SSD that satisfies the size for the file, and associating the file with the at least one extent to indicate that the storage space is occupied, (3) receive a second request to cause (i) the file to remain established within the file system, and (ii) the storage space to be marked free within the SSD, and (4) carrying out the second request by causing the storage space to be marked free within the SSD.

    PERFORMING LIVE UPDATES TO FILE SYSTEM VOLUMES

    公开(公告)号:US20180089206A1

    公开(公告)日:2018-03-29

    申请号:US15275099

    申请日:2016-09-23

    Applicant: Apple Inc.

    Abstract: The described embodiments set forth techniques for performing live updates to file system volumes (e.g., operating system (OS) file system volumes) of computing devices through the utilization of snapshots. In particular, the techniques enable a computing device to remain active while a majority of an update process is performed, which eliminates the considerable functional downtime that is normally imposed when implementing conventional update techniques. Moreover, the overall robustness of the update process is enhanced as the techniques described herein reduce the amount of time that is required for the computing device to remain in the above-described specialized update mode.

    SUPPORT FOR CHANGING ENCRYPTION CLASSES OF FILES

    公开(公告)号:US20170359175A1

    公开(公告)日:2017-12-14

    申请号:US15274724

    申请日:2016-09-23

    Applicant: Apple Inc.

    CPC classification number: G06F21/6209 H04L9/088 H04L9/0891 H04L9/0894

    Abstract: Representative embodiments set forth herein disclose techniques for modifying encryption classes of files. According to some embodiments, a technique can include receiving a request to update an encryption configuration of a file from a current encryption class to an updated encryption class. In response, the technique involves obtaining (i) a first class key associated with the current encryption class, and (ii) a second class key associated with the updated encryption class. Next, the technique involves identifying file extents of the file, where each file extent is encrypted by a respective extent key that is encrypted by the first class key. Finally, the technique involves, for each file extent of the file: (i) decrypting the respective extent key using the first class key to produce a decrypted respective extent key, and (ii) encrypting the decrypted respective extent key using the second class key to produce an updated respective extent key.

Patent Agency Ranking