Techniques for data retrieval using cryptographic signatures

    公开(公告)号:US12261964B2

    公开(公告)日:2025-03-25

    申请号:US18415548

    申请日:2024-01-17

    Applicant: Rubrik, Inc.

    Abstract: A second data source may retrieve metadata for one or more versions of a set of versions of a file stored at the first data source. In some examples, the metadata for the one or more versions of the file may include at least an identifier of the file, a timestamp, and a cryptographic signature. In some examples, generation of the cryptographic signature may be based on the identifier of the file, the timestamp, and a cryptographic key. The second data source may identify a set of versions of the file that were uploaded from a trusted data source to the first data source based on a comparison of the cryptographic signature to a computed cryptographic signature. The second data source may then determine a targeted version of the file and retrieve the targeted version of the file from the first data source.

    TECHNIQUES FOR DATA RETRIEVAL USING CRYPTOGRAPHIC SIGNATURES

    公开(公告)号:US20230145634A1

    公开(公告)日:2023-05-11

    申请号:US17521661

    申请日:2021-11-08

    Applicant: Rubrik, Inc.

    Abstract: A second data source may retrieve metadata for one or more versions of a set of versions of a file stored at the first data source. In some examples, the metadata for the one or more versions of the file may include at least an identifier of the file, a timestamp, and a cryptographic signature. In some examples, generation of the cryptographic signature may be based on the identifier of the file, the timestamp, and a cryptographic key. The second data source may identify a set of versions of the file that were uploaded from a trusted data source to the first data source based on a comparison of the cryptographic signature to a computed cryptographic signature. The second data source may then determine a targeted version of the file and retrieve the targeted version of the file from the first data source.

    TECHNIQUES FOR DATA RETRIEVAL USING CRYPTOGRAPHIC SIGNATURES

    公开(公告)号:US20240187248A1

    公开(公告)日:2024-06-06

    申请号:US18415548

    申请日:2024-01-17

    Applicant: Rubrik, Inc.

    Abstract: A second data source may retrieve metadata for one or more versions of a set of versions of a file stored at the first data source. In some examples, the metadata for the one or more versions of the file may include at least an identifier of the file, a timestamp, and a cryptographic signature. In some examples, generation of the cryptographic signature may be based on the identifier of the file, the timestamp, and a cryptographic key. The second data source may identify a set of versions of the file that were uploaded from a trusted data source to the first data source based on a comparison of the cryptographic signature to a computed cryptographic signature. The second data source may then determine a targeted version of the file and retrieve the targeted version of the file from the first data source.

    Techniques for data retrieval using cryptographic signatures

    公开(公告)号:US11902452B2

    公开(公告)日:2024-02-13

    申请号:US17521661

    申请日:2021-11-08

    Applicant: Rubrik, Inc.

    Abstract: A second data source may retrieve metadata for one or more versions of a set of versions of a file stored at the first data source. In some examples, the metadata for the one or more versions of the file may include at least an identifier of the file, a timestamp, and a cryptographic signature. In some examples, generation of the cryptographic signature may be based on the identifier of the file, the timestamp, and a cryptographic key. The second data source may identify a set of versions of the file that were uploaded from a trusted data source to the first data source based on a comparison of the cryptographic signature to a computed cryptographic signature. The second data source may then determine a targeted version of the file and retrieve the targeted version of the file from the first data source.

Patent Agency Ranking