-
公开(公告)号:US12261964B2
公开(公告)日:2025-03-25
申请号:US18415548
申请日:2024-01-17
Applicant: Rubrik, Inc.
Inventor: Sean Lobo , Prasanta Ranjan Dash , Hao Wu
Abstract: A second data source may retrieve metadata for one or more versions of a set of versions of a file stored at the first data source. In some examples, the metadata for the one or more versions of the file may include at least an identifier of the file, a timestamp, and a cryptographic signature. In some examples, generation of the cryptographic signature may be based on the identifier of the file, the timestamp, and a cryptographic key. The second data source may identify a set of versions of the file that were uploaded from a trusted data source to the first data source based on a comparison of the cryptographic signature to a computed cryptographic signature. The second data source may then determine a targeted version of the file and retrieve the targeted version of the file from the first data source.
-
公开(公告)号:US20230145634A1
公开(公告)日:2023-05-11
申请号:US17521661
申请日:2021-11-08
Applicant: Rubrik, Inc.
Inventor: Sean Lobo , Prasanta Ranjan Dash , Hao Wu
CPC classification number: H04L9/3247 , H04L9/3297 , H04L9/3242 , H04L9/0825 , H04L9/0863 , H04L67/06
Abstract: A second data source may retrieve metadata for one or more versions of a set of versions of a file stored at the first data source. In some examples, the metadata for the one or more versions of the file may include at least an identifier of the file, a timestamp, and a cryptographic signature. In some examples, generation of the cryptographic signature may be based on the identifier of the file, the timestamp, and a cryptographic key. The second data source may identify a set of versions of the file that were uploaded from a trusted data source to the first data source based on a comparison of the cryptographic signature to a computed cryptographic signature. The second data source may then determine a targeted version of the file and retrieve the targeted version of the file from the first data source.
-
公开(公告)号:US20240187248A1
公开(公告)日:2024-06-06
申请号:US18415548
申请日:2024-01-17
Applicant: Rubrik, Inc.
Inventor: Sean Lobo , Prasanta Ranjan Dash , Hao Wu
CPC classification number: H04L9/3247 , H04L9/0825 , H04L9/0863 , H04L9/3242 , H04L9/3297 , H04L67/06
Abstract: A second data source may retrieve metadata for one or more versions of a set of versions of a file stored at the first data source. In some examples, the metadata for the one or more versions of the file may include at least an identifier of the file, a timestamp, and a cryptographic signature. In some examples, generation of the cryptographic signature may be based on the identifier of the file, the timestamp, and a cryptographic key. The second data source may identify a set of versions of the file that were uploaded from a trusted data source to the first data source based on a comparison of the cryptographic signature to a computed cryptographic signature. The second data source may then determine a targeted version of the file and retrieve the targeted version of the file from the first data source.
-
公开(公告)号:US11902452B2
公开(公告)日:2024-02-13
申请号:US17521661
申请日:2021-11-08
Applicant: Rubrik, Inc.
Inventor: Sean Lobo , Prasanta Ranjan Dash , Hao Wu
CPC classification number: H04L9/3247 , H04L9/0825 , H04L9/0863 , H04L9/3242 , H04L9/3297 , H04L67/06
Abstract: A second data source may retrieve metadata for one or more versions of a set of versions of a file stored at the first data source. In some examples, the metadata for the one or more versions of the file may include at least an identifier of the file, a timestamp, and a cryptographic signature. In some examples, generation of the cryptographic signature may be based on the identifier of the file, the timestamp, and a cryptographic key. The second data source may identify a set of versions of the file that were uploaded from a trusted data source to the first data source based on a comparison of the cryptographic signature to a computed cryptographic signature. The second data source may then determine a targeted version of the file and retrieve the targeted version of the file from the first data source.
-
-
-