Data protection within an unsecured storage environment

    公开(公告)号:US11443061B2

    公开(公告)日:2022-09-13

    申请号:US16704350

    申请日:2019-12-05

    Abstract: A backup or storage management system is provided that can secure data within a primary storage environment that stores data in an unsecured format. The storage management system can automatically analyze data received for backup from the primary storage environment and determine whether the data includes information that has been identified as sensitive and/or information that is determined within a threshold degree of probability to be sensitive. The storage management system can then modify the storage of the data that includes sensitive information at the primary storage environment, thereby enabling the data to be secured within the unsecured, or partially secured, primary storage environment. Advantageously, in certain embodiments, by securing data with sensitive information within an unsecured storage environment, embodiments disclosed herein can reduce the occurrences of a data breach or data leak.

    Data protection within an unsecured storage environment

    公开(公告)号:US10540516B2

    公开(公告)日:2020-01-21

    申请号:US15292606

    申请日:2016-10-13

    Abstract: A backup or storage management system is provided that can secure data within a primary storage environment that stores data in an unsecured format. The storage management system can automatically analyze data received for backup from the primary storage environment and determine whether the data includes information that has been identified as sensitive and/or information that is determined within a threshold degree of probability to be sensitive. The storage management system can then modify the storage of the data that includes sensitive information at the primary storage environment, thereby enabling the data to be secured within the unsecured, or partially secured, primary storage environment. Advantageously, in certain embodiments, by securing data with sensitive information within an unsecured storage environment, embodiments disclosed herein can reduce the occurrences of a data breach or data leak.

    Automated, tiered data retention
    17.
    发明授权
    Automated, tiered data retention 有权
    自动分层数据保留

    公开(公告)号:US08805806B2

    公开(公告)日:2014-08-12

    申请号:US13787407

    申请日:2013-03-06

    CPC classification number: G06F17/30289 G06F17/30221

    Abstract: The automatic, tiered retention storage system according to certain aspects can automatically classify data items based on content, such as based on the inclusion of search terms in the data items, or based on metadata or other characteristics associated with the data. Based on the classification, the system can assign the data items to corresponding user-defined “buckets.” In some embodiments, each bucket is associated with a particular tier in the storage system having a specific retention period.

    Abstract translation: 根据某些方面的自动分层保留存储系统可以基于内容自动地对数据项进行分类,例如基于在数据项中包括搜索项,或者基于与数据相关联的元数据或其他特征。 基于分类,系统可以将数据项分配给相应的用户定义的“桶”。在一些实施例中,每个桶与具有特定保留期的存储系统中的特定层相关联。

    Remote commands framework to control clients

    公开(公告)号:US11032350B2

    公开(公告)日:2021-06-08

    申请号:US15920396

    申请日:2018-03-13

    Abstract: A method and system for remotely executing commands at a client computing device. The method comprises receiving a selection of commands to transmit to a group of client computing devices via a webserver. The group of client computing devices, as well as the selected commands, are associated with a group identifier. The method validates access privileges of the administrator to transmit the selected commands to the group of client computing devices. Upon receipt of the selected commands, the webserver transmits the selected commands to at least one registered proxy server. The registered proxy server then determines one or more client identifiers associated with the group identifier. Each client identifier is assigned to a client computing device. Upon receipt of the selected commands, the registered proxy server transmits the selected commands to client computing devices in the group of client computing devices matching the determined client identifiers.

    Deriving encryption rules based on file content
    20.
    发明授权
    Deriving encryption rules based on file content 有权
    根据文件内容导出加密规则

    公开(公告)号:US09405928B2

    公开(公告)日:2016-08-02

    申请号:US14489222

    申请日:2014-09-17

    Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.

    Abstract translation: 公开了用于基于已知包括敏感信息的一组训练文件来自动生成加密规则的数据存储系统。 该系统可以使用多个启发式算法来生成用于确定文件是否包括敏感信息的一个或多个加密规则。 此外,系统可以将启发式算法应用于通过使用自然语言处理算法确定的文件内容以生成加密规则。 此外,公开了能够基于生成的加密规则自动确定是否加密文件的系统。 可以使用自然语言处理算法来确定文件的内容,然后可以将加密规则应用于文件的内容以确定是否加密该文件。

Patent Agency Ranking