APPROACH FOR SECURING DISTRIBUTED DEDUPLICATION SOFTWARE
    1.
    发明申请
    APPROACH FOR SECURING DISTRIBUTED DEDUPLICATION SOFTWARE 有权
    分发分发软件的保护方法

    公开(公告)号:US20110040732A1

    公开(公告)日:2011-02-17

    申请号:US12541191

    申请日:2009-08-14

    IPC分类号: G06F12/00 G06F12/16 G06F7/00

    摘要: The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.

    摘要翻译: 本发明的各种实施例包括用于确保在源 - 重复数据删除存储管理系统中发生的重复数据删除活动的使用的技术。 这些技术旨在防止由源发起的假数据备份,目标数据污染和数据欺骗攻击。 在一个实施例中,一种技术包括限制对授权用户的块查询。 另一种技术提供对目标系统内的攻击和未授权访问密钥的检测。 附加技术包括通过验证数据块来验证来自源的数据的存在,验证数据块的数据样本或验证数据块的哈希值的组合。 进一步的实施例涉及使用策略来为目标内的块共享和链接提供授权级别。 这些技术分开并组合提供了一种全面的策略,以避免未经授权的访问目标存储系统中的数据。

    Approach for securing distributed deduplication software
    2.
    发明授权
    Approach for securing distributed deduplication software 有权
    保护分发重复数据删除软件的方法

    公开(公告)号:US08453257B2

    公开(公告)日:2013-05-28

    申请号:US12541191

    申请日:2009-08-14

    IPC分类号: H04L29/06

    摘要: The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.

    摘要翻译: 本发明的各种实施例包括用于确保在源 - 重复数据删除存储管理系统中发生的重复数据删除活动的使用的技术。 这些技术旨在防止由源发起的假数据备份,目标数据污染和数据欺骗攻击。 在一个实施例中,一种技术包括限制对授权用户的块查询。 另一种技术提供对目标系统内的攻击和未授权访问密钥的检测。 附加技术包括通过验证数据块来验证来自源的数据的存在,验证数据块的数据样本或验证数据块的哈希值的组合。 进一步的实施例涉及使用策略来为目标内的块共享和链接提供授权级别。 这些技术分开并组合提供了一种全面的策略,以避免未经授权的访问目标存储系统中的数据。

    Backup and restore of file system objects of unknown type
    3.
    发明授权
    Backup and restore of file system objects of unknown type 有权
    备份和还原未知类型的文件系统对象

    公开(公告)号:US08041676B2

    公开(公告)日:2011-10-18

    申请号:US11293650

    申请日:2005-12-02

    CPC分类号: G06F11/1435 G06F11/1448

    摘要: File system objects of unknown type are backed up and restored. A list of file system objects is received from a file system. The file system objects are to be backed up. For each file system object that has a file type that is unknown, the following is performed. First, the file system is queried to obtain information regarding the file system object that is sufficient for the file system to later recreate the file system object if necessary. Second, the file system object and the information regarding the file system object are stored. Examples of file system object types of the file system that may be unknown to an application running on a Microsoft Windows® operating system include symbolic links, named pipes, and special device files.

    摘要翻译: 备份和恢复未知类型的文件系统对象。 从文件系统接收文件系统对象的列表。 要备份文件系统对象。 对于具有未知的文件类型的每个文件系统对象,执行以下操作。 首先,查询文件系统以获取有关文件系统对象的信息,该文件系统对象足以使文件系统稍后在必要时重新创建文件系统对象。 其次,存储文件系统对象和有关文件系统对象的信息。 可能在MicrosoftWindows®操作系统上运行的应用程序可能未知的文件系统的文件系统对象类型的示例包括符号链接,命名管道和特殊设备文件。

    Method, system, and program for restoring data to a file
    5.
    发明授权
    Method, system, and program for restoring data to a file 失效
    用于将数据还原到文件的方法,系统和程序

    公开(公告)号:US08086572B2

    公开(公告)日:2011-12-27

    申请号:US10814431

    申请日:2004-03-30

    IPC分类号: G06F7/00 G06F17/00 G06F15/173

    CPC分类号: G06F11/1469 G06F11/1464

    摘要: Provided is a method, system and program for backing up the contents of a source storage device as an object in a data storage subsystem wherein the object contains image data representing the contents of the source storage device, and restoring the contents of the source storage device from the object to a file such as a flat file. The contents of the file may be copied to a target storage device to restore the contents of the source storage device from the file to the target storage device which may be the source storage device or another target storage device.

    摘要翻译: 提供了一种用于备份作为数据存储子系统中的对象的源存储设备的内容的方法,系统和程序,其中对象包含表示源存储设备的内容的图像数据,并且还原源存储设备的内容 从对象到一个文件,如平面文件。 可以将文件的内容复制到目标存储装置,以将源存储装置的内容从文件恢复到可以是源存储装置或另一目标存储装置的目标存储装置。

    METHOD AND APPARATUS FOR RESTORING ENCRYPTED FILES TO AN ENCRYPTING FILE SYSTEM BASED ON DEPRECATED KEYSTORES
    6.
    发明申请
    METHOD AND APPARATUS FOR RESTORING ENCRYPTED FILES TO AN ENCRYPTING FILE SYSTEM BASED ON DEPRECATED KEYSTORES 失效
    将加密文件恢复到基于删除键盘的加密文件系统的方法和装置

    公开(公告)号:US20090110198A1

    公开(公告)日:2009-04-30

    申请号:US11929103

    申请日:2007-10-30

    IPC分类号: H04L9/00

    CPC分类号: G06F21/6218 G06F21/6209

    摘要: The present invention provides a computer implemented method, data processing system, and computer program product to restore an encrypted file. A computer receives a command to restore an encrypted file, wherein the encrypted file was previously backed up. The computer identifies a user associated with the encrypted file. The computer looks up a first keystore of the user based on the user, the first keystore having an active private key. The computer determines that a public key of the encrypted file fails to match an active public key of the first keystore. The computer restores a second keystore of the user to form a restored private key, wherein the second keystore was previously backed up. The computer responsive to a determination that the public key of the encrypted file fails to match the active public key of the first keystore, decrypts the encrypted file encryption key based on the restored private key to form a file encryption key. The computer encrypts the file encryption key with the active private key of the first keystore.

    摘要翻译: 本发明提供了一种计算机实现的方法,数据处理系统和用于恢复加密文件的计算机程序产品。 计算机接收恢复加密文件的命令,其中先前备份了加密文件。 计算机识别与加密文件相关联的用户。 计算机基于用户查找用户的第一密钥库,第一密钥库具有活动的私钥。 计算机确定加密文件的公钥不能匹配第一密钥库的活动公钥。 计算机恢复用户的第二密钥库以形成恢复的私钥,其中先前备份了第二密钥库。 该计算机响应于确定加密文件的公开密钥与第一密钥库的活动公钥匹配的确定,基于恢复的私钥对加密的文件加密密钥进行解密以形成文件加密密钥。 计算机使用第一个密钥库的活动私钥对文件加密密钥进行加密。

    Method and apparatus for restoring encrypted files to an encrypting file system based on deprecated keystores
    7.
    发明授权
    Method and apparatus for restoring encrypted files to an encrypting file system based on deprecated keystores 失效
    基于不推荐的密钥库将加密文件恢复到加密文件系统的方法和装置

    公开(公告)号:US08494167B2

    公开(公告)日:2013-07-23

    申请号:US11929103

    申请日:2007-10-30

    IPC分类号: H04K1/04 H04K1/10

    CPC分类号: G06F21/6218 G06F21/6209

    摘要: The present invention provides a computer implemented method, data processing system, and computer program product to restore an encrypted file. A computer receives a command to restore an encrypted file, wherein the encrypted file was previously backed up. The computer identifies a user associated with the encrypted file. The computer looks up a first keystore of the user based on the user, the first keystore having an active private key. The computer determines that a public key of the encrypted file fails to match an active public key of the first keystore. The computer restores a second keystore of the user to form a restored private key, wherein the second keystore was previously backed up. The computer responsive to a determination that the public key of the encrypted file fails to match the active public key of the first keystore, decrypts the encrypted file encryption key based on the restored private key to form a file encryption key. The computer encrypts the file encryption key with the active private key of the first keystore.

    摘要翻译: 本发明提供了一种计算机实现的方法,数据处理系统和用于恢复加密文件的计算机程序产品。 计算机接收恢复加密文件的命令,其中先前备份了加密文件。 计算机识别与加密文件相关联的用户。 计算机基于用户查找用户的第一密钥库,第一密钥库具有活动的私钥。 计算机确定加密文件的公钥不能匹配第一密钥库的活动公钥。 计算机恢复用户的第二密钥库以形成恢复的私钥,其中先前备份了第二密钥库。 该计算机响应于确定加密文件的公开密钥与第一密钥库的活动公钥匹配的确定,基于恢复的私钥对加密的文件加密密钥进行解密以形成文件加密密钥。 计算机使用第一个密钥库的活动私钥对文件加密密钥进行加密。

    Individual object restore
    8.
    发明授权
    Individual object restore 失效
    单个对象恢复

    公开(公告)号:US08285680B2

    公开(公告)日:2012-10-09

    申请号:US12350840

    申请日:2009-01-08

    IPC分类号: G06F17/30

    CPC分类号: G06F11/1435

    摘要: A method for restoring an object comprises receiving a request to restore an object. Also, the method includes outputting a representation of available backup files and receiving a selection of at least one of the available backup files. Further, the method comprises restoring at least one of the selected backup files into a temporary location and mounting at least one of the restored backup files as a server. In addition, the method includes outputting a representation of available objects from the server and receiving a selection of at least one of the available objects to be restored from the server. Also, the method includes copying one or more selected objects from the server into an Active Directory.

    摘要翻译: 用于恢复对象的方法包括接收恢复对象的请求。 此外,该方法包括输出可用备份文件的表示并接收至少一个可用备份文件的选择。 此外,该方法包括将所选择的备份文件中的至少一个恢复到临时位置,并将至少一个恢复的备份文件安装为服务器。 此外,该方法包括从服务器输出可用对象的表示,并从服务器接收要恢复的可用对象中的至少一个的选择。 而且,该方法包括将一个或多个所选择的对象从服务器复制到Active Directory中。

    Controlling incremental backups using opaque object attributes
    9.
    发明申请
    Controlling incremental backups using opaque object attributes 失效
    使用不透明对象属性控制增量备份

    公开(公告)号:US20070214197A1

    公开(公告)日:2007-09-13

    申请号:US11372816

    申请日:2006-03-09

    IPC分类号: G06F17/30

    CPC分类号: G06F11/1451

    摘要: Provided are techniques for determining whether content of an object has changed. Under control of a backup system, opaque object attributes and a data identifier are received, wherein the data identifier is generated based on one or more relevant object attributes of the opaque object attributes that indicate whether at least one of the content of the object and one or more of the relevant object attributes has changed. The received data identifier is compared with a previously stored data identifier. In response to determining that the received data identifier and the previously stored data identifier do not match, it is determined that the content of the object has changed.

    摘要翻译: 提供了用于确定对象的内容是否已经改变的技术。 在备份系统的控制下,接收不透明对象属性和数据标识符,其中基于不透明对象属性的一个或多个相关对象属性生成数据标识符,该对象属性指示对象的内容和一个对象的内容中的至少一个 或更多的相关对象属性已更改。 所接收的数据标识符与先前存储的数据标识符进行比较。 响应于确定接收到的数据标识符和先前存储的数据标识符不匹配,确定对象的内容已经改变。