摘要:
A cipher method for verifying a decryption of an encrypted user data key used to encrypt user data prior to an encryption of the user data key with an encryption key. The cipher method involves a decryption of the encrypted user data key with a decryption key in response to an initiation of a decryption of the encrypted user data with the user data key as decrypted with the description key, a decryption of the verification text with the user data key as decrypted with the decryption key, and a validation/invalidation of a use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a matched/unmatched comparison of the verification text as decrypted with the user data key and an intermixing of a known text and a random text.
摘要:
A method for efficiently restoring data from a sequential-access backup archive includes receiving a candidate list identifying data sets that are potentially contained within a sequential-access backup archive. The method further receives a filter list identifying data sets that are desired to be restored from the backup archive. Using the candidate list and filter list, the method generates a search list identifying data sets that are to be ignored when searching the backup archive. The method then sequentially performs multiple searches of the backup archive such that the multiple searches collectively perform a single pass through the backup archive. When performing these searches, each search begins from the last accessed portion of the backup archive and stops upon encountering a data set not explicitly ignored by the search list. A corresponding system, apparatus, and computer program product are also disclosed herein.
摘要:
A method for using a change-recording feature to perform more effective backups includes generating an initial point-in-time copy of source data residing in a storage device. The method may then perform an initial backup of the initial point-in-time copy. As changes are made to the source data, the method may record changes made to the source data after the initial point-in-time copy is generated. These changes may be stored as incremental change data. At some point, the initial point-in-time copy may be updated using the incremental change data. In order to perform an incremental backup of the updated point-in-time copy, the method may query the incremental change data to determine which changes were used to update the point-in-time copy. The method may then perform an incremental backup of the updated point-in-time copy by backing up the changes designated in the incremental change data.