Entropy-based ransomware detection

    公开(公告)号:US12259977B2

    公开(公告)日:2025-03-25

    申请号:US17526936

    申请日:2021-11-15

    Abstract: A client computing device includes an entropy driver and a volume driver for protecting the client computing device against potential ransomware. The entropy driver is configured to determine one or more entropy values for a file in response to a determination that the file has been modified or changed. The determined entropy value may then be compared with a known entropy value for a filetype of the changed or modified file. Where the known entropy value and the determined entropy value differ, the volume driver may engage one or more protection operations to secure the client computing device from further corruption and/or modifications by potential ransomware and/or malware. The protection operations may include revoking and/or restricting one or more permissions on one or more storage volumes of the client computing device and backing up one or more files of the client computing device to secondary storage.

    Faster browse of secondary copies of block-level data volumes

    公开(公告)号:US11442623B2

    公开(公告)日:2022-09-13

    申请号:US16402099

    申请日:2019-05-02

    Abstract: An information management system is described herein that performs either a pre-processing or a post-processing operation to increase browse and restore speeds when a user attempts to browse for and restore files from a secondary copy of a data volume. For example, the information management system can implement the pre-processing operation by parsing a master file table (MFT) when a secondary copy operation is initiated on the data volume. The information management system can implement the post-processing operation by parsing the MFT after a secondary copy operation is complete. The parsing can occur to identify records of the MFT that include information useful for enabling a user to browse a secondary copy of the data volume. The information management system can then store the secondary copy of these records for use later in constructing an interface for browsing a secondary copy of the data volume.

    Continuously run log backup with minimal configuration and resource usage from the source machine

    公开(公告)号:US11308034B2

    公开(公告)日:2022-04-19

    申请号:US16455509

    申请日:2019-06-27

    Abstract: A system for performing continuous transaction log backups with minimal resource usage of the client computing devices that are processing the transactions is disclosed. The system detects at least one input/output (I/O) activity at a client computing device. The I/O activity can be associated with at least one database operation performed via the client computing device. The system then executes one or more native commands to backup transactions log data associated with the detected I/O activity to a virtualized location. Backing-up the transactions log data comprises dynamically identifying a mount path location corresponding to the virtualized location, and transferring the transactions log data to the dynamically identified mount path using the one or more native commands. The system can then perform data processing operations (for example, data chunking and deduplicating) on the transactions log data after it is received at the dynamically identified mount path location.

    EXTERNAL DYNAMIC VIRTUAL MACHINE SYNCHRONIZATION

    公开(公告)号:US20190391742A1

    公开(公告)日:2019-12-26

    申请号:US16457684

    申请日:2019-06-28

    Abstract: Embodiments disclosed herein include systems and processes for replicating one or more user computing systems of an information management system at an external resource system to create a backup or fallback of the user computing systems. Replicating the user computing systems may include replicating data as well as the applications, operating systems and configuration of the user computing systems. This replicated or fallback user computing system may be implemented on a virtual machine at the external resource system. Thus, if a user computing system becomes inaccessible, a new user computing system can be generated based on the backup copy of the user computing system at the external resource system. Further, in some embodiments, the copy of the user computing system may be interacted with at the external resource system. Thus, certain embodiments disclosed herein can be used to transition an information management system to an external resource system.

    VIRTUAL SERVER AGENT LOAD BALANCING
    8.
    发明申请
    VIRTUAL SERVER AGENT LOAD BALANCING 有权
    虚拟服务器代理负载均衡

    公开(公告)号:US20140196056A1

    公开(公告)日:2014-07-10

    申请号:US14148507

    申请日:2014-01-06

    CPC classification number: G06F9/45533 G06F9/505 G06F9/5083 G06F2209/5022

    Abstract: Virtual machine (VM) proliferation may be reduced through the use of Virtual Server Agents (VSAs) assigned to a group of VM hosts that may determine the availability of a VM to perform a task. Tasks may be assigned to existing VMs instead of creating a new VM to perform the task. Furthermore, a VSA coordinator may determine a grouping of VMs or VM hosts based on one or more factors associated with the VMs or the VM hosts, such as VM type or geographical location of the VM hosts. The VSA coordinator may also assign one or more VSAs to facilitate managing the group of VM hosts. In some embodiments, the VSA coordinators may facilitate load balancing of VSAs during operation, such as during a backup operation, a restore operation, or any other operation between a primary storage system and a secondary storage system.

    Abstract translation: 可以通过使用分配给一组VM主机的虚拟服务器代理(VSA)来减少虚拟机(VM)的扩散,这些VM主机可能决定执行任务的可用性。 可以将任务分配给现有虚拟机,而不是创建新的VM来执行任务。 此外,VSA协调器可以基于与VM或VM主机相关联的一个或多个因素(例如VM主机的VM类型或地理位置)来确定VM或VM主机的分组。 VSA协调器还可以分配一个或多个VSA以便于管理VM主机组。 在一些实施例中,VSA协调器可以在操作期间(诸如在备份操作,恢复操作或主存储系统和辅助存储系统之间的任何其他操作)中促进VSA的负载平衡。

    Continuously run log backup with minimal configuration and resource usage from the source machine

    公开(公告)号:US12253977B2

    公开(公告)日:2025-03-18

    申请号:US18492556

    申请日:2023-10-23

    Abstract: A system for performing continuous transaction log backups with minimal resource usage of the client computing devices that are processing the transactions is disclosed. The system detects at least one input/output (I/O) activity at a client computing device. The I/O activity can be associated with at least one database operation performed via the client computing device. The system then executes one or more native commands to backup transactions log data associated with the detected I/O activity to a virtualized location. Backing-up the transactions log data comprises dynamically identifying a mount path location corresponding to the virtualized location, and transferring the transactions log data to the dynamically identified mount path using the one or more native commands. The system can then perform data processing operations (for example, data chunking and deduplicating) on the transactions log data after it is received at the dynamically identified mount path location.

    Resiliency of a data storage system by protecting its management database to meet a recovery point objective (RPO)

    公开(公告)号:US12248375B2

    公开(公告)日:2025-03-11

    申请号:US18672466

    申请日:2024-05-23

    Abstract: An illustrative data storage management system comprises a management database that stores administrative preferences and system configurations, as well as results and/or statistics of completed secondary storage operations, i.e., information needed by the system to protect customers' data and to track and recover the protected data, including secondary copies such as backup copies, archive copies, etc. The disclosed data storage management system is configured to protect its own system data subject to a very aggressive (short) Recovery Point Objective (RPO), by using an innovative infrastructure that enables the system's storage manager to fail over to any number of other failover destination storage managers, each one comprising a destination management database. An illustrative database granularly tracks whether each and every transaction log file has been successfully applied to each and every destination management database to synchronize with the source management database.

Patent Agency Ranking