-
公开(公告)号:US20240031353A1
公开(公告)日:2024-01-25
申请号:US17871308
申请日:2022-07-22
Applicant: Rubrik, Inc.
Inventor: Anish Jhaveri , Anshul Mohan Gupta , Chak Fai Yuen , Hao Wu , Sandeep Kanyal , Seungyeop Han , Shivam Rajpal , Sriharshitha Velivelli
IPC: H04L9/40
CPC classification number: H04L63/0823
Abstract: A method for establishing secure connectivity is described. The method may include transmitting, to one or more host nodes of a data management system (DMS), an indication of a backup service configuration that includes a public key certificate associated with a first cluster of storage nodes in the DMS and a root certificate associated with a certificate authority. The method may further include establishing a primary connection between the first cluster and the host nodes using the public key certificate. The method may further include obtaining, by a second cluster of storage nodes in the DMS, a certificate chain signed by the certificate authority. The method may further include establishing a secondary connection between the second cluster and the host nodes in response to the first cluster becoming disconnected from the host nodes, where the secondary connection is established using the certificate chain.
-
公开(公告)号:US20230145634A1
公开(公告)日:2023-05-11
申请号:US17521661
申请日:2021-11-08
Applicant: Rubrik, Inc.
Inventor: Sean Lobo , Prasanta Ranjan Dash , Hao Wu
CPC classification number: H04L9/3247 , H04L9/3297 , H04L9/3242 , H04L9/0825 , H04L9/0863 , H04L67/06
Abstract: A second data source may retrieve metadata for one or more versions of a set of versions of a file stored at the first data source. In some examples, the metadata for the one or more versions of the file may include at least an identifier of the file, a timestamp, and a cryptographic signature. In some examples, generation of the cryptographic signature may be based on the identifier of the file, the timestamp, and a cryptographic key. The second data source may identify a set of versions of the file that were uploaded from a trusted data source to the first data source based on a comparison of the cryptographic signature to a computed cryptographic signature. The second data source may then determine a targeted version of the file and retrieve the targeted version of the file from the first data source.
-