ENCRYPTED FILE BACKUP
    6.
    发明申请
    ENCRYPTED FILE BACKUP 审中-公开
    加密文件备份

    公开(公告)号:US20140281519A1

    公开(公告)日:2014-09-18

    申请号:US14042173

    申请日:2013-09-30

    Abstract: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.

    Abstract translation: 公开了一种自动加密文件的方法。 在一些情况下,该方法可以由包括一个或多个处理器的计算机硬件来执行。 该方法可以包括检测对可存储在主存储系统中的第一文件的访问。 此外,该方法可以包括确定该访问是否包括写访问。 响应于确定访问包括写访问,该方法可以包括访问与第一文件相关联的文件元数据并访问一组加密规则。 此外,该方法可以包括确定文件元数据是否满足一组加密规则。 响应于确定文件元数据满足一组加密规则,该方法可以包括加密第一文件以获得第一加密文件并修改第一加密文件的扩展以包括加密扩展。

    FILE BACKUP WITH SELECTIVE ENCRYPTION
    7.
    发明申请
    FILE BACKUP WITH SELECTIVE ENCRYPTION 有权
    具有选择性加密的文件备份

    公开(公告)号:US20140281517A1

    公开(公告)日:2014-09-18

    申请号:US14042095

    申请日:2013-09-30

    Abstract: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.

    Abstract translation: 公开了一种自动加密文件的方法。 在一些情况下,该方法可以由包括一个或多个处理器的计算机硬件来执行。 该方法可以包括检测对可存储在主存储系统中的第一文件的访问。 此外,该方法可以包括确定该访问是否包括写访问。 响应于确定访问包括写访问,该方法可以包括访问与第一文件相关联的文件元数据并访问一组加密规则。 此外,该方法可以包括确定文件元数据是否满足一组加密规则。 响应于确定文件元数据满足一组加密规则,该方法可以包括加密第一文件以获得第一加密文件并修改第一加密文件的扩展以包括加密扩展。

    AUTOMATIC FILE DECRYPTION
    8.
    发明申请
    AUTOMATIC FILE DECRYPTION 审中-公开
    自动文件DECRYPTION

    公开(公告)号:US20140281516A1

    公开(公告)日:2014-09-18

    申请号:US14042076

    申请日:2013-09-30

    Abstract: A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.

    Abstract translation: 公开了一种自动加密文件的方法。 在一些情况下,该方法可以由包括一个或多个处理器的计算机硬件来执行。 该方法可以包括检测对可存储在主存储系统中的第一文件的访问。 此外,该方法可以包括确定该访问是否包括写访问。 响应于确定访问包括写访问,该方法可以包括访问与第一文件相关联的文件元数据并访问一组加密规则。 此外,该方法可以包括确定文件元数据是否满足一组加密规则。 响应于确定文件元数据满足一组加密规则,该方法可以包括加密第一文件以获得第一加密文件并修改第一加密文件的扩展以包括加密扩展。

    ROLLING CACHE CONFIGURATION FOR A DATA REPLICATION SYSTEM
    9.
    发明申请
    ROLLING CACHE CONFIGURATION FOR A DATA REPLICATION SYSTEM 有权
    滚动高速缓存配置数据复制系统

    公开(公告)号:US20140181029A1

    公开(公告)日:2014-06-26

    申请号:US14138666

    申请日:2013-12-23

    Inventor: Andrei Erofeev

    Abstract: Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state.

    Abstract translation: 对计算机网络中的复制数据执行数据管理操作。 生成用于在源系统上执行的应用程序的数据管理操作的日志条目。 一致性点条目用于指示应用程序的已知良好或可恢复状态的时间。 目标系统被配置为处理日志和一致性点条目的副本以复制复制卷中的数据,复制数据是源系统上应用程序数据的副本。 当复制数据表示应用程序的已知良好状态(由一致性点条目确定)时,目的地系统可以执行存储操作(例如快照,备份)以复制复制的数据,并将复制的数据逻辑关联 具有指示应用程序处于已知状态的源系统时间的时间信息(例如,时间戳)的数据。

Patent Agency Ranking