-
公开(公告)号:US12130708B2
公开(公告)日:2024-10-29
申请号:US17120555
申请日:2020-12-14
CPC分类号: G06F11/1464 , G06F11/1451 , G06F11/1456 , G06F21/565 , G06F21/6245 , G06F2201/80
摘要: An illustrative cloud-based air-gapped data storage management (destination) system obtains authorized access to other (source) systems' backup copies, replicates those copies within the destination system, parses supplemental metadata included in the source backup copies, and integrates the replica copies into the destination system as though natively created there. Replica copies are integrated as backup copies without first restoring the source backup copies to a native data format. The source system lacks knowledge of or connectivity with the destination system, thus maintaining an “air gap” between the systems. The destination system preferably operates in a cloud computing environment. The destination system uses supplemental metadata from the replica copies to re-create or mimic the source's computing environment and to restore backed up data from the replica copies. The destination system also operates as an autonomous analytics engine, applying value-added services to backed up data pulled from source system(s).
-
2.
公开(公告)号:US20240320105A1
公开(公告)日:2024-09-26
申请号:US18672466
申请日:2024-05-23
IPC分类号: G06F11/14
CPC分类号: G06F11/1469 , G06F11/1474 , G06F2201/87
摘要: An illustrative data storage management system comprises a management database that stores administrative preferences and system configurations, as well as results and/or statistics of completed secondary storage operations, i.e., information needed by the system to protect customers' data and to track and recover the protected data, including secondary copies such as backup copies, archive copies, etc. The disclosed data storage management system is configured to protect its own system data subject to a very aggressive (short) Recovery Point Objective (RPO), by using an innovative infrastructure that enables the system's storage manager to fail over to any number of other failover destination storage managers, each one comprising a destination management database. An illustrative database granularly tracks whether each and every transaction log file has been successfully applied to each and every destination management database to synchronize with the source management database.
-
公开(公告)号:US12099414B2
公开(公告)日:2024-09-24
申请号:US17709205
申请日:2022-03-30
CPC分类号: G06F11/1451 , G06F11/2038 , G06F11/2048 , G06F11/2094 , G06F11/2097 , G06F11/1453 , G06F2201/815 , G06F2201/84
摘要: Container images may be generated from a backup system that includes a backup of one or more applications from a computing system of an entity. During a backup process, an application can be identified and its storage location in a secondary storage can be tracked or saved in a backup index. Configuration information and data or files created by user interaction with the application can be backed up and the location of the backed up data or files may be stored in the backup index along with the location of the configuration information. Using the backup index, a container image can be created that includes a selected application, its configuration information, and data, if any, created by the application. The container image can be generated from the backup stored in the secondary storage.
-
公开(公告)号:US12093386B2
公开(公告)日:2024-09-17
申请号:US17173816
申请日:2021-02-11
发明人: PurnaChandra Sekhar Bedhapudi , Sri Karthik Bhagi , Deepak Raghunath Attarde , Arun Prasad Amarendran , Amit Bhaskar Ausarkar , Mrityunjay Upadhyay
IPC分类号: G06F21/56 , G06F16/17 , G06F16/174
CPC分类号: G06F21/566 , G06F16/1734 , G06F16/1752 , G06F2221/034 , G06F2221/2101
摘要: This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.
-
公开(公告)号:US20240302960A1
公开(公告)日:2024-09-12
申请号:US18431590
申请日:2024-02-02
发明人: Anand Vibhor , Bhavyan Bharatkumar Mehta , Mrityunjay Upadhyay , Rohit Iyer , Balamurugan Avudaiappan , Jagadeesh Narayanan Kallidaikurichi Swaminathan
IPC分类号: G06F3/06
CPC分类号: G06F3/0605 , G06F3/0629 , G06F3/067
摘要: Distributed architecture for executing information management services using shared platform microservices, containerization techniques, and regional core services. This architecture decentralizes the traditional model by segmenting the various functions of the centralized control and information manager into modular cloud microservices. This modularization not only enhances system flexibility but also allows for a more dynamic configuration, with certain elements being deployable as containers. The resilient architecture leverages the inherent scalability and adaptability of cloud technology.
-
公开(公告)号:US20240296099A1
公开(公告)日:2024-09-05
申请号:US18582910
申请日:2024-02-21
IPC分类号: G06F11/14
CPC分类号: G06F11/1461 , G06F2201/80
摘要: An improved system architecture for scaling deployments of data management-as-a-service (DMaaS) distributes “job manager” functionality so that a large-scale data storage management system may be deployed in a cloud computing environment as DMaaS without experiencing performance bottlenecks that slow down core data protection operations at scale. The disclosed solution creates an infrastructure where job manager features run on any number of distinct machines or compute resources that act as local job managers. In the illustrative DMaaS, any number of components that scale horizontally (“the distributed components”) carry job management responsibility for storage management operations such as backup jobs, auxiliary copy jobs, archive jobs, etc. These distributed components are configured to perform locally as job managers and to see each storage management job through from beginning to end without centralized control. These distributed components or local job managers also maintain, collect, and locally store job metadata.
-
公开(公告)号:US20240275849A1
公开(公告)日:2024-08-15
申请号:US18646043
申请日:2024-04-25
IPC分类号: H04L67/1097 , G06F3/06 , H04L67/1095
CPC分类号: H04L67/1097 , G06F3/0604 , G06F3/0638 , G06F3/067 , H04L67/1095
摘要: An illustrative storage management appliance is interposed between client computing devices and one or more cloud storage resources. The appliance uses cloud storage resources in conjunction with a network attached storage device configured within the appliance to provide to the client computing devices seemingly unlimited network attached storage on respective network shares. The storage management appliance monitors data objects on the network shares and when a data object meets one or more criteria for archiving, the storage management appliance archives the data object to a cloud storage resource and replaces it with a stub and preview image on the network share. When access to the stub and/or preview image is detected, the storage management appliance restores the data object from the cloud storage resource. The criteria for archiving flexibly allow individual data objects to be archived to cloud storage without archiving frequently-accessed “neighboring” data objects on the same network share.
-
公开(公告)号:US12056014B2
公开(公告)日:2024-08-06
申请号:US16857616
申请日:2020-04-24
CPC分类号: G06F11/1451 , G06F8/60 , G06F9/445 , G06F9/45504 , G06F9/45558 , G06F11/1448 , G06F11/1456 , G06F11/1458 , G06F16/128 , G06F2009/45583 , G06F11/1469 , G06F2201/82 , G06F2201/84
摘要: An information management system according to certain aspects may be configured to generate a snapshot of data relating to a plurality of applications. The system may include a plurality of data agents, wherein each data agent is associated with at least one of a plurality of applications, and data generated by the plurality of applications is stored in a logical volume in primary storage. The system may also include a snapshot manager configured to detect the plurality of applications; check with the plurality of data agents whether the associated applications are in consistent states; obtain a snapshot of the logical volume in response to receiving notifications from the plurality of data agents that the associated applications are in consistent states; and generate mapping information between a particular one of the plurality of applications and a portion of the snapshot relating to the particular one of the plurality of applications.
-
公开(公告)号:US20240256661A1
公开(公告)日:2024-08-01
申请号:US18443896
申请日:2024-02-16
发明人: Sri Karthik BHAGI , Pratima Laxman GADHAVE , Marcelo dos REIS MANSANO , Mrityunjay UPADHYAY , PurnaChandra Sekhar BEDHAPUDI , Shyam Sundar RAMKUMAR
IPC分类号: G06F21/55 , G06F9/455 , G06F11/14 , G06F21/54 , G06F21/56 , G06F21/62 , G06F21/78 , G06N5/04 , G06N20/00
CPC分类号: G06F21/554 , G06F9/45533 , G06F11/1451 , G06F21/54 , G06F21/561 , G06F21/566 , G06F21/567 , G06F21/568 , G06F21/6218 , G06F21/78 , G06N5/04 , G06N20/00 , G06F2201/815 , G06F2221/034
摘要: An information management system includes one or more client computing devices in communication with a storage manager and a secondary storage computing device. The storage manager manages the primary data of the one or more client computing devices and the secondary storage computing device manages secondary copies of the primary data of the one or more client computing devices. Each client computing device may be configured with a ransomware protection monitoring application that monitors for changes in their primary data. The ransomware protection monitoring application may input the changes detected in the primary data into a machine-learning classifier, where the classifier generates an output indicative of whether a client computing device has been affected by malware and/or ransomware. Using a virtual machine host, a virtual machine copy of an affected client computing device may be instantiated using a secondary copy of primary data of the affected client computing device.
-
公开(公告)号:US20240256484A1
公开(公告)日:2024-08-01
申请号:US18408075
申请日:2024-01-09
发明人: Tanmay GARG , Rishabh SINGH , Richa Dilip KULKARNI
CPC分类号: G06F16/113 , G06F16/13
摘要: The disclosed data storage management system enables data owners to model the costs and attributes of archiving their data and to readily capture and implement one or more resultant archiving plans. Modeling enables data owners to make informed choices about cost profiles before data is actually archived. Archiving plans devised according to these choices are intended to save on data storage costs and provide a compliance-ready data archive in cloud storage repository(ies). Armed with archiving simulations supplied by the illustrative data storage management system, a data owner may control data placement to predict costs, free up primary storage, and move inactive data to less expensive archive storage. Preferably, the disclosed system is implemented as a software-as-a-service (SaaS) solution, and the accompanying archive storage is implemented as a cloud storage service, but the invention is not limited to SaaS or to cloud-based data archives.
-
-
-
-
-
-
-
-
-