BLOCK-LEVEL DATA REPLICATION
    11.
    发明申请

    公开(公告)号:US20210034244A1

    公开(公告)日:2021-02-04

    申请号:US16525283

    申请日:2019-07-29

    Abstract: Certain embodiments described herein relate to an improved block-level replication system. One or more components in an information management system may receive a request to perform a block-level replication between a source storage device and a destination storage device, and depending on the specific replication mode requested, (i) store block-level changes directly to the destination storage device or (ii) first to a recovery point store and then later to the destination storage device.

    BLOCK-LEVEL DATA REPLICATION
    14.
    发明申请

    公开(公告)号:US20220083228A1

    公开(公告)日:2022-03-17

    申请号:US17411583

    申请日:2021-08-25

    Abstract: Certain embodiments described herein relate to an improved block-level replication system. One or more components in an information management system may receive a request to perform a block-level replication between a source storage device and a destination storage device, and depending on the specific replication mode requested, (i) store block-level changes directly to the destination storage device or (ii) first to a recovery point store and then later to the destination storage device.

    RANSOMWARE DETECTION AND DATA PRUNING MANAGEMENT

    公开(公告)号:US20210271758A1

    公开(公告)日:2021-09-02

    申请号:US17173816

    申请日:2021-02-11

    Abstract: This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.

    TIME-BASED VIRTUAL MACHINE REVERSION

    公开(公告)号:US20210255937A1

    公开(公告)日:2021-08-19

    申请号:US17203579

    申请日:2021-03-16

    Abstract: Recovery points can be used for replicating a virtual machine and reverting the virtual machine to a different state. A filter driver can monitor and capture input/output commands between a virtual machine and a virtual machine disk. The captured input/output commands can be used to create a recovery point. The recovery point can be associated with a bitmap that may be used to identify data blocks that have been modified between two versions of the virtual machine. Using this bitmap, a virtual machine may be reverted or restored to a different state by replacing modified data blocks and without replacing the entire virtual machine disk.

    BUFFERED VIRTUAL MACHINE REPLICATION

    公开(公告)号:US20210117294A1

    公开(公告)日:2021-04-22

    申请号:US17112860

    申请日:2020-12-04

    Abstract: Recovery points can be used for replicating a virtual machine and reverting the virtual machine to a different state. A filter driver can monitor and capture input/output commands between a virtual machine and a virtual machine disk. The captured input/output commands can be used to create a recovery point. The recovery point can be associated with a bitmap that may be used to identify data blocks that have been modified between two versions of the virtual machine. Using this bitmap, a virtual machine may be reverted or restored to a different state by replacing modified data blocks and without replacing the entire virtual machine disk.

Patent Agency Ranking