Systems and methods for consistent backup of distributed, transactional databases

    公开(公告)号:US11500731B2

    公开(公告)日:2022-11-15

    申请号:US17006109

    申请日:2020-08-28

    Inventor: James Baker

    Abstract: A distributed, transactional database uses timestamps, such as logical clock values, for entry versioning and transaction management in the database. To write to the database, a service requests a timestamp to be inserted into the database with a new version of data. During a backup procedure, a cleanup process is paused, issuing new timestamps is paused, and a backup timestamp is generated, which results in an effective backup copy. During a restore of a backup, a snapshot of the database is loaded and any entries older than the backup timestamp are deleted, which ensures that a consistent restore has occurred.

    DATA STORAGE METHOD AND SYSTEM
    12.
    发明申请

    公开(公告)号:US20220207025A1

    公开(公告)日:2022-06-30

    申请号:US17521481

    申请日:2021-11-08

    Abstract: An apparatus and method are disclosed. The method, which may be performed by one or more processors, may comprise receiving timestamp data representing a plurality of database transactions and dividing the timestamp data into a plurality of partitioning quanta (nPQ), each partitioning quantum (PQ) of the plurality of partitioning quanta representing a range of timestamps. Further, for each partitioning quantum (PQ) of the plurality of partitioning quanta (nPQ), the method may comprise allocating the timestamp data, such that sequentially adjacent timestamps are allocated to different partitions of a physical storage system for subsequent storage at the allocated partitions.

    SYSTEMS AND METHODS FOR PROVIDING NETWORK-BASED PERMISSIONING USING SECURITY NODE HASH IDENTIFIERS

    公开(公告)号:US20220147643A1

    公开(公告)日:2022-05-12

    申请号:US17582139

    申请日:2022-01-24

    Abstract: Systems and methods generate a first security node hash identifier by performing a first hash operation, such as a one-way hash, on a first data resource identifier associated with a first data resource, such as a data set, produced by a data resource platform. The systems and methods generate a dependent second security node hash identifier by performing a second hash operation on a second data resource identifier associated with a dependent second data resource produced by the data resource platform and on the first security node hash identifier, receive an access request for access to the dependent second data resource; and in response to the access request, grant permission to access the dependent second data resource to a user associated with the access request based on the dependent second security node hash identifier.

    Data storage method and system
    14.
    发明授权

    公开(公告)号:US11169987B2

    公开(公告)日:2021-11-09

    申请号:US16402700

    申请日:2019-05-03

    Abstract: An apparatus and method are disclosed. The method, which may be performed by one or more processors, may comprise receiving timestamp data representing a plurality of database transactions and dividing the timestamp data into a plurality of partitioning quanta (nPQ), each partitioning quantum (PQ) of the plurality of partitioning quanta representing a range of timestamps. Further, for each partitioning quantum (PQ) of the plurality of partitioning quanta (nPQ), the method may comprise allocating the timestamp data, such that sequentially adjacent timestamps are allocated to different partitions of a physical storage system for subsequent storage at the allocated partitions.

    TARGETED SWEEP METHOD FOR KEY-VALUE DATA STORAGE

    公开(公告)号:US20210286804A1

    公开(公告)日:2021-09-16

    申请号:US17334286

    申请日:2021-05-28

    Abstract: A computer-implemented method for targeted sweep of a key-value data storage is provided. The method comprises before a write transaction to a database having a key value store commits, and before each of one or more write commands of the write transaction are persisted to the key value store, writing an entry for each of the one or more write commands to an end of a targeted sweep queue, the entry comprising metadata including: data identifying a cell to which the write command relates, a start timestamp of the write transaction, and information identifying a type of the write transaction.

    SYSTEMS AND METHODS FOR PROVIDING NETWORK-BASED PERMISSIONING USING SECURITY NODE HASH IDENTIFIERS

    公开(公告)号:US20210124835A1

    公开(公告)日:2021-04-29

    申请号:US16733415

    申请日:2020-01-03

    Abstract: Systems and methods generate a first security node hash identifier by performing a first hash operation, such as a one-way hash, on a first data resource identifier associated with a first data resource, such as a data set, produced by a data resource platform. The systems and methods generate a dependent second security node hash identifier by performing a second hash operation on a second data resource identifier associated with a dependent second data resource produced by the data resource platform and on the first security node hash identifier, receive an access request for access to the dependent second data resource; and in response to the access request, grant permission to access the dependent second data resource to a user associated with the access request based on the dependent second security node hash identifier.

    SYSTEMS AND METHODS FOR CONSISTENT BACKUP OF DISTRIBUTED, TRANSACTIONAL DATABASES

    公开(公告)号:US20230031243A1

    公开(公告)日:2023-02-02

    申请号:US17962726

    申请日:2022-10-10

    Inventor: James Baker

    Abstract: A distributed, transactional database uses timestamps, such as logical clock values, for entry versioning and transaction management in the database. To write to the database, a service requests a timestamp to be inserted into the database with a new version of data. During a backup procedure, a cleanup process is paused, issuing new timestamps is paused, and a backup timestamp is generated, which results in an effective backup copy. During a restore of a backup, a snapshot of the database is loaded and any entries older than the backup timestamp are deleted, which ensures that a consistent restore has occurred.

    NESTED DISCOVERY AND DELETION OF RESOURCES

    公开(公告)号:US20230017799A1

    公开(公告)日:2023-01-19

    申请号:US17949965

    申请日:2022-09-21

    Abstract: Systems, methods, and non-transitory computer readable media are provided for recursively searching a plurality of workspaces of the system for linked data associated with the seed data, initiating an endpoint process for each the seed data and the linked data, and, upon completion of the search, delete the seed data and the linked data identified based at least in part on the endpoint process. The process may be automatically repeated at a predetermined time interval to identify and remove future data that is stored in the plurality of datasets.

Patent Agency Ranking