TECHNIQUES FOR SECURE HOST CONNECTIVITY IN DISASTER RECOVERY SCENARIOS

    公开(公告)号:US20240031353A1

    公开(公告)日:2024-01-25

    申请号:US17871308

    申请日:2022-07-22

    Applicant: Rubrik, Inc.

    CPC classification number: H04L63/0823

    Abstract: A method for establishing secure connectivity is described. The method may include transmitting, to one or more host nodes of a data management system (DMS), an indication of a backup service configuration that includes a public key certificate associated with a first cluster of storage nodes in the DMS and a root certificate associated with a certificate authority. The method may further include establishing a primary connection between the first cluster and the host nodes using the public key certificate. The method may further include obtaining, by a second cluster of storage nodes in the DMS, a certificate chain signed by the certificate authority. The method may further include establishing a secondary connection between the second cluster and the host nodes in response to the first cluster becoming disconnected from the host nodes, where the secondary connection is established using the certificate chain.

    TECHNIQUES FOR DATA RETRIEVAL USING CRYPTOGRAPHIC SIGNATURES

    公开(公告)号:US20230145634A1

    公开(公告)日:2023-05-11

    申请号:US17521661

    申请日:2021-11-08

    Applicant: Rubrik, Inc.

    Abstract: A second data source may retrieve metadata for one or more versions of a set of versions of a file stored at the first data source. In some examples, the metadata for the one or more versions of the file may include at least an identifier of the file, a timestamp, and a cryptographic signature. In some examples, generation of the cryptographic signature may be based on the identifier of the file, the timestamp, and a cryptographic key. The second data source may identify a set of versions of the file that were uploaded from a trusted data source to the first data source based on a comparison of the cryptographic signature to a computed cryptographic signature. The second data source may then determine a targeted version of the file and retrieve the targeted version of the file from the first data source.

Patent Agency Ranking