-
公开(公告)号:US20210234872A1
公开(公告)日:2021-07-29
申请号:US16774627
申请日:2020-01-28
Applicant: Rubrik, Inc.
Inventor: Abhay Mitra , Vijay Karthik , Vivek Sanjay Jain , Avishek Ganguli , Arohi Kumar , Kushaagra Goyal , Christopher Wong
Abstract: A computer-implemented method at a data management system comprises receiving, at the system, a write made to a virtual machine from a virtual machine host; computing, at the system, a fingerprint of the transmitted write; comparing, at the system, the computed fingerprint to malware fingerprints in a malware catalog; repeating the computing and comparing; and disabling the virtual machine if a number of matches from the comparing breaches a predetermined threshold over a predetermined amount of time.
-
公开(公告)号:US20190384929A1
公开(公告)日:2019-12-19
申请号:US16453274
申请日:2019-06-26
Applicant: Rubrik, Inc.
Inventor: Matthew Edward Noe , Seungyeop Han , Arohi Kumar
Abstract: A data management and storage (DMS) cluster of peer DMS nodes manages resources of a multi-tenant environment. The DMS cluster provides an authorization framework that provides user access which is scoped to the resources within a tenant organization and the privileges of the user within the organization. To authorize an action on a resource by a user, the DMS cluster determines determine user authorizations associated with the user defining privileges of the user on the resources of the multi-tenant environment, and organization authorizations associated defining resources of the multi-tenant environment that belong to the organization. The DMS cluster authorizes the action when the user authorizations and organizations authorized indicate that the action on the resource is authorized.
-
公开(公告)号:US11616805B2
公开(公告)日:2023-03-28
申请号:US16774627
申请日:2020-01-28
Applicant: Rubrik, Inc.
Inventor: Abhay Mitra , Vijay Karthik , Vivek Sanjay Jain , Avishek Ganguli , Arohi Kumar , Kushaagra Goyal , Christopher Wong
Abstract: A computer-implemented method at a data management system comprises receiving, at the system, a write made to a virtual machine from a virtual machine host; computing, at the system, a fingerprint of the transmitted write; comparing, at the system, the computed fingerprint to malware fingerprints in a malware catalog; repeating the computing and comparing; and disabling the virtual machine if a number of matches from the comparing breaches a predetermined threshold over a predetermined amount of time.
-
公开(公告)号:US20210279108A1
公开(公告)日:2021-09-09
申请号:US16811013
申请日:2020-03-06
Applicant: Rubrik, Inc.
Inventor: Abhay Mitra , Vijay Karthik , Vivek Sanjay Jain , Avishek Ganguli , Arohi Kumar , Kushaagra Goyal , Christopher Wong
IPC: G06F9/50 , G06F9/455 , G06F9/54 , G06F16/245 , G06F11/14
Abstract: A computer-implemented method at a data management system comprises: generating, with one or more processors, a containerized runtime in a memory in communication with the one or more processors; instantiating, with the one or more processors, an app in the runtime; receiving, with the one or more processors, a request from the app for data; retrieving, with the one or more processors, a copy of the requested data from a data source; and transmitting, with the one or more processors, the data to the containerized runtime for the app to operate on.
-
公开(公告)号:US20210279087A1
公开(公告)日:2021-09-09
申请号:US16811071
申请日:2020-03-06
Applicant: Rubrik, Inc.
Inventor: Abhay Mitra , Vijay Karthik , Vivek Sanjay Jain , Avishek Ganguli , Arohi Kumar , Kushaagra Goyal , Christopher Wong
Abstract: A computer-implemented method at a data management system comprises: generating, with one or more processors, a containerized runtime in a memory in communication with the one or more processors; instantiating, with the one or more processors, an app in the runtime; receiving, with the one or more processors, a request from the app for data; retrieving, with the one or more processors, a copy of the requested data from a data source; and transmitting, with the one or more processors, the data to the containerized runtime for the app to operate on.
-
公开(公告)号:US11875187B2
公开(公告)日:2024-01-16
申请号:US16811013
申请日:2020-03-06
Applicant: Rubrik, Inc.
Inventor: Abhay Mitra , Vijay Karthik , Vivek Sanjay Jain , Avishek Ganguli , Arohi Kumar , Kushaagra Goyal , Christopher Wong
IPC: G06F9/50 , G06F9/455 , G06F9/54 , G06F11/14 , G06F16/245
CPC classification number: G06F9/5027 , G06F9/45558 , G06F9/541 , G06F11/1469 , G06F16/245 , G06F2009/45595 , G06F2201/84 , G06F2209/5013
Abstract: A computer-implemented method at a data management system comprises: generating, with one or more processors, a containerized runtime in a memory in communication with the one or more processors; instantiating, with the one or more processors, an app in the runtime; receiving, with the one or more processors, a request from the app for data; retrieving, with the one or more processors, a copy of the requested data from a data source; and transmitting, with the one or more processors, the data to the containerized runtime for the app to operate on.
-
公开(公告)号:US20210279330A1
公开(公告)日:2021-09-09
申请号:US16811109
申请日:2020-03-06
Applicant: Rubrik, Inc.
Inventor: Abhay Mitra , Vijay Karthik , Vivek Sanjay Jain , Avishek Ganguli , Arohi Kumar , Kushaagra Goyal , Christopher Wong
Abstract: A computer-implemented method at a data management system comprises: generating, with one or more processors, a containerized runtime in a memory in communication with the one or more processors; instantiating, with the one or more processors, an app in the runtime; receiving, with the one or more processors, a request from the app for data; retrieving, with the one or more processors, a copy of the requested data from a data source; and transmitting, with the one or more processors, the data to the containerized runtime for the app to operate on.
-
公开(公告)号:US20210232682A1
公开(公告)日:2021-07-29
申请号:US16774577
申请日:2020-01-28
Applicant: Rubrik, Inc.
Inventor: Abhay Mitra , Vijay Karthik , Vivek Sanjay Jain , Avishek Ganguli , Arohi Kumar , Kushaagra Goyal , Christopher Wong
Abstract: A computer-implemented method at a data management system comprises receiving a write made to a virtual machine; computing, outside of the virtual machine, a fingerprint of the write; comparing, outside of the virtual machine, the computed fingerprint to malware fingerprints in a malware catalog; repeating the computing and comparing; and disabling the virtual machine if malware is detected based on a number of matches from the comparing breaching a predetermined threshold over a predetermined amount of time.
-
公开(公告)号:US10380369B1
公开(公告)日:2019-08-13
申请号:US16008989
申请日:2018-06-14
Applicant: Rubrik, Inc.
Inventor: Matthew Noe , Seungyeop Han , Arohi Kumar
Abstract: A data management and storage (DMS) cluster of peer DMS nodes manages resources of a multi-tenant environment. The DMS cluster provides an authorization framework that provides user access which is scoped to the resources within a tenant organization and the privileges of the user within the organization. To authorize an action on a resource by a user, the DMS cluster determines determine user authorizations associated with the user defining privileges of the user on the resources of the multi-tenant environment, and organization authorizations associated defining resources of the multi-tenant environment that belong to the organization. The DMS cluster authorizes the action when the user authorizations and organizations authorized indicate that the action on the resource is authorized.
-
公开(公告)号:US20250103754A1
公开(公告)日:2025-03-27
申请号:US18977619
申请日:2024-12-11
Applicant: Rubrik, Inc.
Inventor: Hao Wu , Arohi Kumar , Seungyeop Han , Michael Wronski , Shrihari Kalkar , Xiaoqing Tao , Michelle Nguyen
Abstract: A method for updating configuration settings of a backup database supported by a data management system is described. The method may include receiving, from a first user in a first user group, a request to update configuration settings of the backup database. The method may further include determining that the first user is authorized to update the configuration settings of the backup database based on a set of permissions associated with the first user. The method may further include identifying a second user in a second user group that is authorized to approve the request from the first user. The method may further include transmitting an indication of the request to the second user and receiving a notification that the second user has approved the request from the first user. The method may further include updating the configuration settings of the backup database in response to the notification.
-
-
-
-
-
-
-
-
-