会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Restoring deduplicated data objects from sequential backup devices
    • 从顺序备份设备恢复重复数据删除的数据对象
    • US08892603B2
    • 2014-11-18
    • US13479003
    • 2012-05-23
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergMark L. Yakushev
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergMark L. Yakushev
    • G06F17/30G06F11/14
    • G06F17/3015G06F11/1453G06F11/1469
    • Provided are computer program product, system, and method for restoring deduplicated data objects from sequential backup devices. A server stores data objects of extents having deduplicated data in the at least one sequential backup device. The server receives from a client a request for data objects. The server determines extents stored in the at least one sequential backup device for the requested data objects. The server or client sorts the extents according to an order in which they are stored in the at least one sequential backup device to generate a sort list. The server retrieves the extents from the at least one sequential backup device according to the order in the sort list to access the extents sequentially from the sequential backup device in the order in which they were stored. The server returns the retrieved extents to the client and the client reconstructs the requested data objects from the received extents.
    • 提供的是用于从顺序备份设备恢复重复数据删除的数据对象的计算机程序产品,系统和方法。 服务器将具有重复数据删除数据的盘区的数据对象存储在所述至少一个顺序备份设备中。 服务器从客户端接收对数据对象的请求。 服务器确定存储在所请求的数据对象的至少一个顺序备份设备中的区段。 服务器或客户端根据它们存储在至少一个顺序备份设备中的顺序对扩展区进行排序以生成排序列表。 服务器根据排序列表中的顺序从至少一个顺序备份设备中检索扩展数据块,以顺序备份设备按顺序从存储顺序访问扩展数据块。 服务器将检索到的扩展区返回到客户端,客户机从接收到的扩展区重新构建所请求的数据对象。
    • 3. 发明授权
    • Restoring a restore set of files from backup objects stored in sequential backup devices
    • 从存储在顺序备份设备中的备份对象恢复一组还原文件
    • US08209298B1
    • 2012-06-26
    • US12972291
    • 2010-12-17
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergDavid G. Van HiseMark L. Yakushev
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergDavid G. Van HiseMark L. Yakushev
    • G06F17/30
    • G06F11/1469G06F11/1453G06F11/1466
    • Provided are a computer program product, system, and method for restoring a restore set of files from backup objects stored in sequential backup devices. Backup objects are stored in at least one sequential backup device. A client initiates a restore request to restore a restore set of data in a volume as of a restore point-in-time. A determination is made of backup objects stored in at least one sequential backup device including the restore set of data for the restore point-in-time, wherein the determined backup objects are determined from a set of backup objects including a full volume backup and delta backups providing data in the volume at different points-in-time, and wherein extents in different backup objects providing data for blocks in the volume at different points-in-time are not stored contiguously in the sequential backup device. A determination is made of extents stored in the at least one sequential backup device for the determined backup objects. The determined extents are sorted according to an order in which they are stored in the at least one sequential backup device to generate a sort list. The extents are retrieved from the at least one sequential backup device according to the order in the sort list to access the extents sequentially from the sequential backup device in the order in which they were stored. The retrieved extents are returned to the client and the client reconstructs the restore data set from the received extents.
    • 提供了一种计算机程序产品,系统和方法,用于从存储在顺序备份设备中的备份对象恢复恢复文件集。 备份对象存储在至少一个顺序备份设备中。 客户端启动还原请求,以恢复卷中恢复的还原数据集。 确定存储在至少一个顺序备份设备中的备份对象,包括用于恢复时间点的还原数据集,其中所确定的备份对象由一组备份对象确定,包括全卷备份和增量 在不同时间点在卷中提供数据的备份,并且其中不同备份对象中的不同备份对象中的盘区在不同时间点为块中的块提供数据不会连续存储在顺序备份设备中。 确定存储在所确定的备份对象的至少一个顺序备份设备中的范围。 确定的区段根据它们存储在至少一个顺序备份设备中的顺序进行排序以生成排序列表。 根据排序列表中的顺序从至少一个顺序备份设备检索扩展数据块,以顺序备份设备按顺序从存储顺序访问区段。 检索到的盘区返回到客户端,客户机从收到的盘区重构恢复数据集。
    • 6. 发明申请
    • APPROACH FOR OPTIMIZING RESTORES OF DEDUPLICATED DATA
    • 优化复制数据恢复的方法
    • US20110218969A1
    • 2011-09-08
    • US12719108
    • 2010-03-08
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergMark L. Yakushev
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergMark L. Yakushev
    • G06F17/30
    • G06F11/1453G06F11/1402G06F11/1469G06F11/2089
    • Various techniques for improving the performance of restoring deduplicated data files from a server to a client within a storage management system are disclosed. In one embodiment, a chunk index is maintained on the client that tracks the chunks remaining on the client for each data file that is stored to and restored from the storage server. When a specific file is selected for restore from the storage server to the client, the client determines if any local copies of this specific file's chunks are stored in files already existing on the client data store. The file is then reconstructed from a combination of these local copies of the file chunks and chunks retrieved from the storage server. Therefore, only chunks that are not stored or are inaccessible to the client are retrieved from the server, reducing server-side processing requirements and the bandwidth required for data restore operations.
    • 公开了用于提高从存储管理系统中的服务器向客户端恢复重复数据消除的数据文件的性能的各种技术。 在一个实施例中,在客户机上维护块索引,其跟踪存储在存储服务器中并从存储服务器恢复的每个数据文件的客户端上剩余的块。 当选择特定文件从存储服务器恢复到客户端时,客户端确定该特定文件块的任何本地副本是否存储在客户端数据存储上已存在的文件中。 然后从文件块的这些本地副本和从存储服务器检索的块的组合重建文件。 因此,仅从服务器检索不存储或无法访问客户端的块,从而减少了数据恢复操作所需的服务器端处理要求和带宽。
    • 7. 发明申请
    • APPROACH FOR SECURING DISTRIBUTED DEDUPLICATION SOFTWARE
    • 分发分发软件的保护方法
    • US20110040732A1
    • 2011-02-17
    • US12541191
    • 2009-08-14
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergAlexei KojenovJames P. SmithMark L. Yakushev
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergAlexei KojenovJames P. SmithMark L. Yakushev
    • G06F12/00G06F12/16G06F7/00
    • G06F11/1453G06F21/55G06F21/64
    • The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.
    • 本发明的各种实施例包括用于确保在源 - 重复数据删除存储管理系统中发生的重复数据删除活动的使用的技术。 这些技术旨在防止由源发起的假数据备份,目标数据污染和数据欺骗攻击。 在一个实施例中,一种技术包括限制对授权用户的块查询。 另一种技术提供对目标系统内的攻击和未授权访问密钥的检测。 附加技术包括通过验证数据块来验证来自源的数据的存在,验证数据块的数据样本或验证数据块的哈希值的组合。 进一步的实施例涉及使用策略来为目标内的块共享和链接提供授权级别。 这些技术分开并组合提供了一种全面的策略,以避免未经授权的访问目标存储系统中的数据。
    • 9. 发明申请
    • OPTIMIZATION OF FINGERPRINT-BASED DEDUPLICATION
    • 指纹识别优化
    • US20130138620A1
    • 2013-05-30
    • US13305218
    • 2011-11-28
    • Mark L. YakushevMark A. Smith
    • Mark L. YakushevMark A. Smith
    • G06F17/30
    • G06F17/30159G06F17/30156
    • Described are embodiments of an invention for identifying chunk boundaries for optimization of fingerprint-based deduplication in a computing environment. Storage objects that are backed up in a computing environment are often compound storage objects which include many individual storage objects. The computing device of the computing environment breaks the storage objects into chunks of data by determining a hash value on a range of data. The computing device creates an artificial chunk boundary when the end of data of the storage object is reached. When an artificial chunk boundary is created for the end of data of a storage object, the computing device stores a pseudo fingerprint for the artificial chunk boundary. If a hash value matches a fingerprint or a pseudo fingerprint, then the computing device determines that the range of data corresponds to a chunk and the computing system defines the chunk boundaries.
    • 描述了用于识别用于在计算环境中优化基于指纹的重复数据删除的块边界的发明的实施例。 在计算环境中备份的存储对象通常是复合存储对象,包括许多单独的存储对象。 计算环境的计算设备通过确定数据范围上的哈希值来将存储对象分解成数据块。 当到达存储对象的数据结束时,计算设备创建一个人造块边界。 当为存储对象的数据结束创建人造块边界时,计算装置存储用于人造块边界的伪指纹。 如果哈希值与指纹或伪指纹匹配,则计算设备确定数据范围对应于块,并且计算系统定义块边界。
    • 10. 发明授权
    • Approach for securing distributed deduplication software
    • 保护分发重复数据删除软件的方法
    • US08453257B2
    • 2013-05-28
    • US12541191
    • 2009-08-14
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergAlexei KojenovJames P. SmithMark L. Yakushev
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergAlexei KojenovJames P. SmithMark L. Yakushev
    • H04L29/06
    • G06F11/1453G06F21/55G06F21/64
    • The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.
    • 本发明的各种实施例包括用于确保在源 - 重复数据删除存储管理系统中发生的重复数据删除活动的使用的技术。 这些技术旨在防止由源发起的假数据备份,目标数据污染和数据欺骗攻击。 在一个实施例中,一种技术包括限制对授权用户的块查询。 另一种技术提供对目标系统内的攻击和未授权访问密钥的检测。 附加技术包括通过验证数据块来验证来自源的数据的存在,验证数据块的数据样本或验证数据块的哈希值的组合。 进一步的实施例涉及使用策略来为目标内的块共享和链接提供授权级别。 这些技术分开并组合提供了一种全面的策略,以避免未经授权的访问目标存储系统中的数据。