Class / Patent application number | Description | Number of patent applications / Date published |
707646000 | Incremental backup | 76 |
20100179943 | Hybrid Data Archival Method And System Thereof - The present invention relates to a method and a system for obtaining both online and offline backups from one application with a single toggle operation. By performing the method of the present invention it would be possible to take hybrid backup of the data automatically according to a predetermined schedule. Also, the hybrid data backup method enables the easily retrieve the data. | 07-15-2010 |
20110078118 | BACKUP OF INCREMENTAL METADATA IN BLOCK BASED BACKUP SYSTEMS - Performing a backup is disclosed. A changed portion of a file system tree is determined based at least in part on a stored state of the file system tree at a time a prior block based backup of the file system tree was performed. Incremental metadata associated with the changed portion is obtained. The obtained incremental metadata is stored where there is at least some metadata associated with an unchanged portion of the file system tree that is not stored when storing the obtained incremental metadata. | 03-31-2011 |
20110082835 | PERIODIC FILE SYSTEM CHECKPOINT MANAGER - A periodic checkpoint method for a file system replication source. The method comprises generating a first checkpoint at a first time on a file system replication source and identifying a set of data objects from the replication source that have been modified during a time period between the first time and a subsequent second time. A periodic checkpoint is then generated at the second time on the file system replication source by using the set of data objects. | 04-07-2011 |
20110106768 | BACKUP USING METADATA VIRTUAL HARD DRIVE AND DIFFERENTIAL VIRTUAL HARD DRIVE - Methods and systems are disclosed for backup using a metadata virtual hard drive (VHD) and a differential VHD. A particular system includes a memory device that stores files and a backup agent configured to detect changes to the files. The system includes a translation module configured to translate the detected changes into VHD formatted changes and a VHD module configured to write the VHD formatted changes to a metadata VHD stored at the memory device. The VHD module is also configured to generate a differential VHD based on the metadata VHD. A network interface at the system is configured to transmit the metadata VHD and the differential VHD to a remote storage device. | 05-05-2011 |
20110113012 | Operating System and File System Independent Incremental Data Backup - Embodiments of the invention relate to creating an operating system and file system independent incremental data backup. A first data backup of a source system and second version of the data on the source system is received. A second data backup of the second version of the data is created by determining differences between the first data backup and the second version of the data. Each portion of the second version of the data that is the same as a portion of the first data backup is referenced in the second data backup. Each portion of the second version of the data that is different than all portions of the first data backup is included in the second data backup. The second data backup is appended to the first data backup to create an incremental data backup. | 05-12-2011 |
20110113013 | DUPLICATE BACKUP DATA IDENTIFICATION AND CONSOLIDATION - The various embodiments herein include operate to identify, consolidate, and reduce redundant backup data storage. One embodiment includes storing data blocks and first signatures of data chunks of each stored data block, the first signature of each data chunk including a reference to a storage location of the data chunk within a stored data block, the stored data blocks including data blocks of previous and recent backup sessions. Some embodiments further include storing second signatures in a second signature repository, where the second signatures are calculated based on determined boundaries of the first signatures from previous backup sessions. At least one of the second signatures is calculated based on at least two first signatures, and in the range of 32 to 64 first signatures in some embodiments. Some embodiments may identify data chunks of the recent backup session present in the stored data blocks prior to the recent backup session. | 05-12-2011 |
20110161297 | CLOUD SYNTHETIC BACKUPS - Synthetic backups are created without accessing previous backup data or retrieving backup data from a cloud storage service. A backup system provides two or more backup data sets to a cloud spanning storage interface for storage in deduplicated form as label maps and data segments in a cloud storage service. A specification defines portions of two or more previous backup data sets to be copied into the synthetic backup. Labels corresponding with the specified portions of previous backup data sets are identified and added to a new label map to create a deduplicated synthetic backup. The completed label map is transferred to the cloud storage service. To provide access to the synthetic backup, the cloud spanning storage interface reconstructs all or a portion of the synthetic backup from the new label map and the data segments created during deduplication of previous backup data sets. | 06-30-2011 |
20110178987 | APPARATUS AND METHOD FOR PROCESSING DATA ACCORDING TO REMOTE CONTROL IN DATA STORAGE DEVICE - A method and apparatus for processing data at a data storage device according to remote control are provided. In response to a remote control permission request being received from a remote control device, identification information included in the remote control permission request may be authenticated. A remote control command according to a right corresponding to the identification information may be performed when the remote control command is received from the remote control device. | 07-21-2011 |
20110191299 | LOGICAL DATA BACKUP AND ROLLBACK USING INCREMENTAL CAPTURE IN A DISTRIBUTED DATABASE - Architecture that eliminates the need for on-disk full backups of data retaining only changes that have occurred, in a separate table. Thus, the architecture provides for incremental recovery of incremental changes in a relational database (e.g., SQL). The architecture provides improved recovery time and recovery point objectives. By using the incremental capture of changed data (e.g., in an XML format), the capability is provided to capture schema changes, query the incremental change data and efficiently restore user data to an earlier point-in-time state. Changes (e.g., insert, update and delete operations) are tracked (e.g., continuously) by a set of triggers and the incrementally captured changed rows are inserted in a data capture table (a differential change “delta” table) in a human-readable format (e.g., XML). Rollback is also provided. | 08-04-2011 |
20110191300 | Metadata management for fixed content distributed data storage - An archival storage cluster of preferably symmetric nodes includes a metadata management system that organizes and provides access to given metadata, preferably in the form of metadata objects. Each metadata object may have a unique name, and metadata objects are organized into regions. Preferably, a region is selected by hashing one or more object attributes (e.g., the object's name) and extracting a given number of bits of the resulting hash value. The number of bits may be controlled by a configuration parameter. Each region is stored redundantly. A region comprises a set of region copies. In particular, there is one authoritative copy of the region, and zero or more backup copies. The number of backup copies may be controlled by a configuration parameter. Region copies are distributed across the nodes of the cluster so as to balance the number of authoritative region copies per node, as well as the number of total region copies per node. Backup region copies are maintained synchronized to their associated authoritative region copy. | 08-04-2011 |
20110231367 | System and method for backing up data - A hash-optimized backup system and method takes data blocks and generates a probabilistically unique digital fingerprint of the content of each data block using a substantially collision-free algorithm. The process compares the generated fingerprint to a database of stored fingerprints and, if the generated fingerprint matches a stored fingerprint, the data block is determined to already have been backed up, and therefore does not need to be backed up again. Only if the generated fingerprint does not match a stored fingerprint is the data block backed up, at which point the generated fingerprint is added to the database of stored fingerprints. Because the algorithm is substantially collision-free, there is no need to compare actual data content if there is a hash-value match. The process can also be used to audit software license compliance, inventory software, and detect computer-file tampering such as viruses and malware. | 09-22-2011 |
20110302141 | SAVE SET BUNDLING FOR STAGING - Backing up data blocks is disclosed, including: receiving an indication that a first backed up data block is to be processed; determining that the first backed up data block and a second backed up data block are related at an application level and are to remain stored together; and processing together the first and second backed up data blocks based at least in part on the determination that the first and second backed up data blocks are related at an application level and are to remain stored together. | 12-08-2011 |
20120005163 | BLOCK-BASED INCREMENTAL BACKUP - A method for backing up a file system, including obtaining a first indirect block comprising a first block pointer, obtaining a first birth time from the first block pointer, determining whether the first birth time is subsequent to a time of a last backup, and backing up a first block referenced by the first block pointer, if the first birth time is subsequent to the time of the last backup. | 01-05-2012 |
20120011099 | FILE BACKUP APPARATUS AND METHOD - A file backup apparatus and method estimates whether a file has been changed in a directory based on directory property information, and backs up the directory which includes a changed file according to the estimation result. | 01-12-2012 |
20120143824 | PROTECTING FILES THAT INCLUDE EDITABLE METADATA - Aspects of the subject matter described herein relate to data protection of files that may include both content and embedded metadata. In aspects, an indication that a file has changed is received. If the content has changed, the entire file or just the content may be backed up. If the metadata only has changed, the metadata may or may not be backed up, depending on implementation. Instead of parsing the file to determine the exact size and positioning of the metadata within the file, the file may be divided into three portions: a head portion, a middle portion, and a tail portion. Hashes of these portions may then be used to determine whether the metadata and/or content of the file have changed. | 06-07-2012 |
20120150806 | NORMALIZING DATA ON DATABASE RESTORE - Techniques for normalizing a database as part of a database restore. Embodiments may receive a database restore request indicating a previous state to restore a database to. Responsive to the request, embodiments may restore the database to the previous state using backup data associated with the previous state, and normalize the restored database using historical database usage data based on one or more previous database operations. | 06-14-2012 |
20120179655 | METHOD AND SYSTEM OF PERFORMING INCREMENTAL SQL SERVER DATABASE BACKUPS - A system, method, and medium for performing incremental backups of a Microsoft SQL server database. A snapshot of the database is created, and then a map identifying the changed extents is retrieved from the snapshot. The changed extents are then retrieved from the snapshot and stored in a backup storage device. For a restore operation, a full database backup file is written to a storage device and then the changed extents from a stored incremental backup file may be merged with the full backup file. Next, the database server is notified of the reconstructed file and then the reconstructed file is mounted by the database server as a live instance of the database. | 07-12-2012 |
20120197844 | BLOCK LEVEL DATA REPLICATION - Systems and methods for replicating data from a production server to a backup server include identifying one or more data blocks of a file that were modified after a first time instant and before a second time instant. The file may be associated with a protected directory of the production server. An representative data block (e.g., including a hash value) for at least one of the identified data blocks may be computed using a cryptography algorithm, e.g., MD | 08-02-2012 |
20120203742 | REMOTE DATA PROTECTION IN A NETWORKED STORAGE COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for protecting and restoring data within a networked (e.g. cloud) storage computing environment through asynchronous replication and remote backup of data and its associated metadata. Under embodiments of the present invention, data backup and recovery functionality provides data backups by detecting incremental updates to the data and its associated metadata at specific points in time determined by policies. The policies are configurable based on user requirements. Multiple copies of the data backups can be made and stored in separate compressed files at backup/disaster recovery locations. The backups of data and its associated metadata, which includes file system configuration information can be used to restore the state of a computer file system to that of a given point-in-time. Accordingly, a data protection approach is disclosed for protecting data at both the file system level and application level. | 08-09-2012 |
20120209812 | INCREMENTAL VIRTUAL MACHINE BACKUP SUPPORTING MIGRATION - A record of changes to virtual machine data of a virtual machine and a record of changes to snapshots of the virtual machine that have been received since the virtual machine was last backed up are maintained. In response to it being time to perform an incremental backup of the virtual machine, a portion of the virtual machine data is backed up based on the record of changes to the virtual machine data, and a portion of the snapshots is backed up based on the record of changes to the snapshots. In response to it being time to migrate the virtual machine to a second host device, the virtual machine data, the record of changes to the virtual machine data, the record of changes to the snapshots, and one or more of the snapshots are migrated to the second host device. | 08-16-2012 |
20120215742 | DATA RETENTION USING LOGICAL OBJECTS - Various embodiments are provided for facilitation of data retention using logical objects. Following an operation creating a redundant copy of the data performed on a scheduled interval, a logical object containing a number of managed file versions, represented by a number of member objects for a recovery point, is created. The logical object is assigned a policy of a data retention policy construct associated with the recovery point. The logical object is adapted for reassignment between policies of the data retention policy construct associated with various recovery points. During the reassignment, the plurality of member objects representing the plurality of managed file versions are logically retained instead of performing a data copy operation to associate the plurality of managed file versions with another recovery point. | 08-23-2012 |
20120254119 | RESTORING COMPUTING ENVIRONMENTS, SUCH AS AUTORECOVERY OF FILE SYSTEMS AT CERTAIN POINTS IN TIME - A method and system for restoring a computing environment from a secondary data store, and facilitating such restoration, is described. In some examples, the system copies the configuration parameters of a computing environment, such as a file system, as well as the data within the file system, and transfers the copies to secondary storage for later restoration. For example, the system may generate an xml file of the configuration parameters of the computing environment when a backup operation of the computing environment is performed, and store the xml file along with copies of the data from the computing environment in secondary storage. | 10-04-2012 |
20120284232 | DATA RESTORATION UTILIZING FORWARD AND BACKWARD DELTAS - In an implementation, a set of files are stored into a collection of blocks. The collection of blocks are stored within a storage subsystem that includes a premium storage area and a low-end storage area, wherein the premium storage area has a performance metric that is better than a performance metric of the low-end storage area. The collection of blocks define the set of files at multiple different times within the predefined time window, the collection of blocks include a first baseline of blocks which defines the set of files at a first baseline time within a predefined time window, older blocks which were formed before the first baseline time, and newer blocks which were formed after the first baseline time. The first baseline of blocks and the newer blocks are stored in the premium storage area and the older blocks are stored in the low-end storage area. | 11-08-2012 |
20120310890 | DATA COMPRESSION AND STORAGE TECHNIQUES - Provided are systems and methods for use in data archiving. In one arrangement, compression techniques are provided wherein an earlier version of a data set (e.g., file folder, etc) is utilized as a dictionary of a compression engine to compress a subsequent version of the data set. This compression identifies changes between data sets and allows for storing these differences without duplicating many common portions of the data sets. For a given version of a data set, new information is stored along with metadata used to reconstruct the version from each individual segment saved at different points in time. In this regard, the earlier data set and one or more references to stored segments of a subsequent data set may be utilized to reconstruct the subsequent data set. | 12-06-2012 |
20130066836 | MANIPULATING ELECTRONIC BACKUPS - Systems and methods are provided for storing and restoring digital data. In some implementations, a method is provided. The method includes initiating a backup operation of data including a plurality of items, interrupting the backup operation, where interrupting occurs after a portion of the data has been completed, receiving an input to resume the backup operation, identifying a previously completed portion of the backup data, and performing a backup of a remaining uncompleted portion of the backup data. Other embodiments of this aspect include corresponding systems, apparatus, computer program products, and computer readable media. | 03-14-2013 |
20130080392 | RESTORE OF FULL SYSTEM BACKUP AND INCREMENTAL BACKUPS USING MULTIPLE SIMULTANEOUS DEVICE STREAMS - A technique for restoring file systems by applying full and incremental backups together while streaming them from multiple devices provides a faster system restore from a full backup where incremental backups must also be applied. A first storage device streams the full backup while at least one second storage device streams at least one incremental backup. As files are detected in the incremental backup, they are written instead of the corresponding file in the full backup. Incremental backups can be pre-merged to reduce their number to one less than a number of storage devices available to stream the backups, so that the full backup can be streamed along with the pre-merged incremental backup(s) to restore the file system. | 03-28-2013 |
20130110783 | VIRTUAL FULL BACKUPS | 05-02-2013 |
20130144841 | UNATTENDED BACKUP SYSTEM - The invention provides a process for performing automatic backups of a user's data contained in the local drives of at lest one computer of a local area network by means of a Residential Gateway, which is in turn connected to a provider's Backup Server. A backup method is thus provided, which enables creating a backup in an automatic way without the need of providing UPnP support | 06-06-2013 |
20130151472 | System and Method for Backing Up Data - A hash-optimized backup system and method takes data blocks and generates a probabilistically unique digital fingerprint of the content of each data block using a substantially collision-free algorithm. The process compares the generated fingerprint to a database of stored fingerprints and, if the generated fingerprint matches a stored fingerprint, the data block is determined to already have been backed up, and therefore does not need to be backed up again. Only if the generated fingerprint does not match a stored fingerprint is the data block backed up, at which point the generated fingerprint is added to the database of stored fingerprints. Because the algorithm is substantially collision-free, there is no need to compare actual data content if there is a hash-value match. The process can also be used to audit software license compliance, inventory software, and detect computer-file tampering such as viruses and malware. | 06-13-2013 |
20130185260 | DATA BACKUP AND RESTORAL APPARATUS, SYSTEM, AND METHODS - A method for maintaining incremental backups of a file. The method includes identifying a target file to be backed up. The method also includes comparing the target file to a one or more previously backed up files, in order to identify differences of the target file from a corresponding previously backed up file. The method also includes generating a delta version of the target file that records the identified differences from the previously backed up file. | 07-18-2013 |
20130198137 | DATA BACKUP AND RESTORAL APPARATUS, SYSTEM, AND METHODS - A method for maintaining local and remote backups of a target file on a local device. The method includes identifying the target file to be backed up; modifying a first backup data structure on a local backup apparatus to backup the target file; and modifying a second backup data structure in a remote backup system to backup the target file. | 08-01-2013 |
20130212069 | Method of backing-up, and making available, electronic data and software initially stored on a client server - Methods and systems for allowing the backing-up of electronic data, its accessibility in times of need, and the ability to restore this data without denying user access to it while the restoration occurs. Also, the data may continue to be backed-up while it is being restored. One method allows for the removal of duplicated data from within the on or off-site copy and subsequent incremental on or off-site-site copies of the data. In this way, the amount of bandwidth and storage required may be reduced. For example, if there are two sets of files required to run two applications and some or all of these files are identical then only one copy need be made and sent and stored. This also applies where the on-site appliance is connected to more than one client server, such that data which is common to the client servers may only be copied once. | 08-15-2013 |
20130246362 | METHOD AND SYSTEM FOR IMPLEMENTING FAST INCREMENTAL BACKUPS - A method for fast incremental replication of a file system. The method includes, at a data storage level, tracking file system status for a plurality of files by using a data structure inside respective inodes for the plurality of files, and at a file system level, tracking file system status for a plurality of files by using a file system mask structure. For all files present in a backup, a catalogue of the file path name and inode number is maintained on a source file system. During incremental backup, a source file system data structure enumerating a plurality of modified inodes is consulted. For inodes that have not been marked as removed or created, the file system mask structure that tracks modified portions is consulted to obtain a file incremental change and inodes. The method further includes performing incremental backup using the inodes that have been modified and appended. | 09-19-2013 |
20140032499 | METHOD AND SYSTEM FOR DATA BACKUP - The present invention relates to a method, system, and computer program product for data backup, the method comprising: performing first chunking on current data by using the same chunking method as that used by original backup data to obtain a current chunk; calculating hash value of the current chunk; and acquiring, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk, and incrementing number of continuous matched chunks by one. Since the pertinence between original backup data and current data is maximally utilized, performance of de-duplication method can be efficiently improved. | 01-30-2014 |
20140164330 | PRUNING PREVIOUSLY-ALLOCATED FREE BLOCKS FROM A SYNTHETIC BACKUP - Pruning previously-allocated free blocks from a synthetic backup. In one example embodiment, a method of pruning previously-allocated free blocks from a synthetic backup includes identifying multiple sequential backups to be included in a synthetic backup, accessing a copy of a file system block allocation map (FSBAM) of the most recent of the multiple sequential backups that was stored with the most recent backup, identifying a set of blocks that includes the most recent block for each unique block position contained within the multiple sequential backups, pruning the set of blocks to exclude all blocks that are identified as being free in the FSBAM, storing the pruned set of blocks in the synthetic backup, and storing a copy of the FSBAM with the synthetic backup. | 06-12-2014 |
20140181034 | SYSTEMS AND METHODS FOR MINIMIZING NETWORK BANDWIDTH FOR REPLICATION/BACK UP - Systems and methods are disclosed for backing up a client data set on a computer by identifying changed files; generating a first sub-file signature for one or more segments of a changed file; subsequently generating a second sub-file signature for each file segment to detect insertions, removals, and rearrangements of data in the file; transmitting one more changed segment(s) in the file; and writing a manifest file reflecting the new target state. | 06-26-2014 |
20140188805 | BACKUP AND RESTORATION FOR A DEDUPLICATED FILE SYSTEM - The disclosed techniques that can use deduplication information on a source computer platform to improve the process of performing data backups or restoration from/to the computer platform. In one example aspect, a data backup operation can re-use some of the work already done by a source computer's deduplication system. For example, a storage operation could read a deduplication database on the source computer platform to determine the duplicativeness of a given data chunk being transferred to a backup storage system, without having to perform computations such as data chunk hashing and comparison with previously generated hashes. The technique may additionally or alternatively reuse hashes generated by the source computer during deduplication of the data file on the source computer's file system during deduplication at the external backup storage system. | 07-03-2014 |
20140188806 | Methods and Systems for Saving Draft Electronic Communications - Methods and systems for saving draft electronic communications, such as web e-mails, are described herein. One such described method comprises automatically saving a draft web-email in the e-mail web page. A second such described method comprises saving a draft web e-mail in a cookie residing on the client machine. A third such described method comprises automatically saving a draft web e-mail at the host that provides the Web e-mail service. A fourth such described method comprises interacting with a central installed client component to save a draft web e-mail one the user's machine at the client side. | 07-03-2014 |
20140201151 | SYSTEMS AND METHODS TO SELECT FILES FOR RESTORATION FROM BLOCK-LEVEL BACKUP FOR VIRTUAL MACHINES - A data storage system receives a user instruction through a user interface to restore a specific virtual machine file from a block-level backup. The system accesses a file index which is created during the block-level backup by accessing the file allocation table of the underlying host system and associating the blocks with the file location information of the virtual machine files stored in the file allocation table. The system further creates a file level table based at least in part on the virtual machine file information stored in the file index, displays a listing of the virtual machine files from the file level table, and receives a user selected virtual machine file to restore. | 07-17-2014 |
20140250078 | MULTIPHASE DEDUPLICATION - Multiphase deduplication. In one example embodiment, a method of multiphase deduplication includes an analysis phase and a backup phase. The analysis phase includes analyzing each allocated block stored in a source storage at a point in time to determine if the block is duplicated in a vault storage. The backup phase is performed after completion of the analysis phase and includes storing, in the vault storage, each unique nonduplicate block from the source storage. | 09-04-2014 |
20140250079 | LOCAL SEEDING OF A RESTORE STORAGE FOR RESTORING A BACKUP FROM A REMOTE DEDUPLICATION VAULT STORAGE - Local seeding of a restore storage for restoring a backup from a remote deduplication vault storage. In one example embodiment, a method of local seeding of a restore storage for restoring a backup from a remote deduplication vault storage includes determining which blocks included in a backup of a source storage at a point in time, which is stored in the remote vault storage, are available in a local seeded storage containing common blocks, reading the locally available blocks from the local seeded storage, reading the non-locally available blocks from the remote vault storage, and storing the read blocks in the restore storage in the same position as stored in the source storage at the point in time. The remote vault storage is remote from the restore storage and the local seeded storage is local to the restore storage. | 09-04-2014 |
20140250080 | CHANGE TRACKING FOR MULTIPHASE DEDUPLICATION - Change tracking for multiphase deduplication. In one example embodiment, a method of tracking changes to a source storage of a source system for multiphase deduplication includes a change tracking phase that includes performing various steps for only allocated blocks in the source storage that are changed between a prior point in time and a subsequent point in time. These steps include temporarily storing a copy of the changed block in a volatile memory of the source system prior to writing the changed block to the source storage, performing a hash function only once on the copy of the changed block, while the copy is temporarily stored in a volatile memory of the source system, to calculate a hash value, writing the changed block to the source storage, and tracking, in a change log, a location in the source storage of the changed block and the corresponding hash value. | 09-04-2014 |
20140279916 | METHOD OF AND SYSTEM FOR ENHANCED DATA STORAGE - A method of and system for enhanced storage allows more data to be backed up than would otherwise be possible. Instead of storing uncompressed base images and incremental images, differentials of non-current base images are compressed and stored. Furthermore, incremental images that are older than the current base image are removed. By only saving differential base images that are compressed, aside from the newest base image, and deleting older incremental images, a significant amount of space is saved. A removable drive is used as temporary storage in the process of generating a compressed differential base for previous base images. Additionally, a process ensures that previous base images are differentials of the most recent base image and not each other. | 09-18-2014 |
20140324782 | APPLYING WRITE ELISION - A data portion is evicted from a buffer, where the evicted data portion is modified from a corresponding data portion in a persistent storage. Write elision is applied to suppress writing the evicted data portion to the persistent storage. Subsequent to applying the write elision and in response to reading a version of the data portion, a redo of a modification of the read data portion is applied. | 10-30-2014 |
20140337295 | PRIORITIZATION OF DATA ITEMS FOR BACKUP IN A COMPUTING ENVIRONMENT - Described are embodiments of an invention for prioritizing data items for backup in a computing environment. The computing environment includes a plurality of clients coupled through a network to a backup system for backing up items stored locally on the client. Each client includes a continuous data protection (CDP) module that prioritizes the order of files transmitted to the backup system for storage on one or more storage devices based on policy. The CDP module builds an initial backup list and a CDP backup list. The initial backup list includes any item that meets the criteria of the initial backup profile. The CDP backup list includes items that have been modified since the initial backup process began. The data that is the most critical to a user is often the most recently modified data. Thus, the CDP module preferentially performs a backup of items on the CDP backup list. | 11-13-2014 |
20140372378 | CONSOLIDATING ANALYTICS METADATA - A single system merges primary data storage, data protection, and intelligence. Intelligence is provided through in-line data analytics, and data intelligence and analytics are gathered on protected data and prior analytics, and stored in discovery points, all without impacting performance of primary storage. As data is written it is automatically mirrored for data protection as part of a High Availability (HA) process. Real-time analysis is done in-line with the HA processing, enabling a variety of data analytics. Data content can mined from within files or blocks. The gathered intelligence is used to tag objects with extended metadata, enabling both valuable search options and rapid restore options. Data recovery begins with metadata restoration, followed by near-instantaneous access to “hot” regions of data being restored, allowing site operation to continue or resume while a restore is ongoing. | 12-18-2014 |
20150039563 | UNOBTRUSIVE COPIES OF ACTIVELY USED COMPRESSED INDICES - Methods, devices and systems to make compressed backup copies of in-use compressed database indices are described. In general, an “oldest” time at which index pages in working memory had been updated is identified. Compressed index pages may be directly copied without the need to bring them into working memory or uncompressing them. The identified “oldest” time is then associated with the compressed backup copy. In some embodiments, an entire compressed backup copy may be associated with a single point in time (e.g., the identified “oldest” time). In other embodiments, a compressed backup copy may be associated with multiple points in time (e.g., one time for each portion of the compressed index that is being backed-up). Compressed indices copied in accordance with the invention may be used during restore operations to reconstruct database indices using the identified “oldest” time and database log files. | 02-05-2015 |
20150074058 | CONTAINER-BASED PROCESSING METHOD, APPARATUS, AND SYSTEM - A container-based processing method includes: when a container state needs to be backed up, determining that content of a first control group file in at least one control group file of the container is modified; acquiring, a file name of the first control group file corresponding to the first flag bit; searching for, according to a correspondence between the file name of the at least one control group file and a storage location of the at least one control group file, a storage location of the first control group file corresponding to the file name of the first control group file, and extracting modified content of the first control group file from the first control group file stored in the storage location of the first control group file; and backing up the file name of the first control group file and the modified content of the first control group file. | 03-12-2015 |
20150081640 | SYSTEM AND METHOD OF DATA INTELLIGENT STORAGE - A single system merges primary data storage, data protection, and intelligence. Intelligence is provided through in-line data analytics, and data intelligence and analytics are gathered on protected data and prior analytics, and stored in discovery points, all without impacting performance of primary storage. As data is written it is automatically mirrored for data protection as part of a High Availability (HA) process. Real-time analysis is done in-line with the HA processing, enabling a variety of data analytics. Data content can mined from within files or blocks. The gathered intelligence is used to tag objects with extended metadata, enabling both valuable search options and rapid restore options. Data recovery begins with metadata restoration, followed by near-instantaneous access to “hot” regions of data being restored, allowing site operation to continue or resume while a restore is ongoing. | 03-19-2015 |
20150112939 | INCREMENTAL BLOCK LEVEL BACKUP - Disclosed are systems, computer-readable mediums, and methods for incremental block level backup. An initial backup of a volume is created at a backup server, where creating the initial backup includes retrieving an original metadata file from a metadata server, and retrieving a copy of all data of the volume based on the original metadata file. A first incremental backup of the volume is then created at the backup server, where creating the first incremental backup includes retrieving a first metadata file, where the first metadata file was created separately from the original metadata file. A block identifier of the first metadata file is compared to a corresponding block identifier of the original metadata file to determine a difference between the first and original block identifiers, and a copy of a changed data block of the volume is retrieved based on the comparison of the first and original block identifiers. | 04-23-2015 |
20150120666 | RELAY DEVICE, RELAY METHOD, COMPUTER-READABLE RECODING MEDIUM HAVING STORED THEREIN RELAY PROGRAM, AND RELAY SYSTEM - A relay device includes a first storage unit, a second storage unit and a processor. The processor extracts a duplication pattern, which is an identical portion between data stored in the first storage unit in the past and data received currently. Also, the processor executes a process of storing the currently received data in the first storage unit and a process of associating an identifier with the extracted duplication pattern and storing the duplication pattern and the identifier in the second storage unit. Further, the processor edits data into edited data in which a duplication pattern included in the data has been replaced with the identifier associated with the duplication pattern when the data including a duplication pattern stored in the second storage unit has been received from a first device. Then, the processor transfers the edited data to a second device. | 04-30-2015 |
20150120667 | TECHNIQUES FOR ESTABLISHING A FILE SYSTEM THAT EXPOSES A VIRTUAL FILE SYSTEM FOR BACKUP OPERATIONS - Techniques for establishing a files system that exposes a virtual file system for backup operations are presented. Changes to files of a file system are maintained separately or collected and presented as a VFS. The VFS is then used to perform backup operations. Moreover, the files identified in the VFS can be customized based on search parameters, criterion, and/or criteria supplied by a user or supplied as parameters to backup and VFS mount operations. | 04-30-2015 |
20150127613 | METHOD, APPARATUS, AND APPLICATION PLATFORM FOR UPDATING APPLICATION OBJECT ATTRIBUTE - Methods, apparatus and application platforms for updating application object attribute are provided herein. In an exemplary method, a task for updating an attribute of an application object corresponding to an application can be established via task configuration, to obtain task configuration information of the task and form a task list. The task can be extracted from the task list. The task configuration information can be parsed, to obtain source attribute information and destination attribute information of the application. The application object can be found in a database, according to the source attribute information of the application. Current attribute information of the application object can be modified into the destination attribute information. After the modifying, the destination attribute information can be written into the database as the current attribute information of the application object. | 05-07-2015 |
20150142745 | COMPUTERIZED METHODS AND APPARATUS FOR INCREMENTAL DATABASE BACKUP USING CHANGE TRACKING - Computerized methods and systems are disclosed for creating an incremental backup of application data by creating a snapshot associated with a current incremental backup of a data file using a change tracking bitmap such that a data file associated with the current incremental backup can be restored from just the snapshot associated with the current incremental backup and an initial backup without needing to access one or more previously generated incremental backups of the data file. | 05-21-2015 |
20150142746 | Manipulating Electronic Backups - Systems and methods are provided for storing and restoring digital data. In some implementations, a method is provided. The method includes initiating a backup operation of data including a plurality of items, interrupting the backup operation, where interrupting occurs after a portion of the data has been completed, receiving an input to resume the backup operation, identifying a previously completed portion of the backup data, and performing a backup of a remaining uncompleted portion of the backup data. Other embodiments of this aspect include corresponding systems, apparatus, computer program products, and computer readable media. | 05-21-2015 |
20150317209 | SYSTEM AND METHOD FOR INCREMENTAL VIRTUAL MACHINE BACKUP USING STORAGE SYSTEM FUNCTIONALITY - Techniques for virtual machine incremental backup are described herein. According to one embodiment, a request for an incremental backing up a virtual machine (VM) is received at a storage system, the request identifying a requested VM disk image associated with a consistent state of the VM. The storage system determines a difference between the requested VM disk image and a previous VM disk image representing a previous VM backup. The changes between the requested VM disk image and a previous VM disk image are then transmitted to a target backup storage system. | 11-05-2015 |
20150317211 | HASH VALUE COMPARISON DURING CRASH-TOLERANT INCREMENTAL CHANGE TRACKING BETWEEN BACKUPS OF A SOURCE STORAGE - Hash value comparison during crash-tolerant incremental change tracking between backups of a source storage. In one example embodiment, a method includes assigning each block in a source storage into one of multiple zones, creating a nonvolatile zone map, tracking each of the zones that is changed between a first point in time and a second point in time, identifying, as potentially changed zone blocks, the blocks in the source storage assigned to any zone marked as changed in the nonvolatile zone map, identifying, as potentially outdated backup blocks, the most recently backed-up blocks in one or more prior backups that correspond to the potentially changed zone blocks, calculating source hash values of the potentially changed zone blocks, calculating backup hash values of the potentially outdated backup blocks, and comparing the source hash values to the backup hash values to determine which blocks in the source storage actually changed. | 11-05-2015 |
20150331755 | SYSTEMS AND METHODS FOR TIME-BASED FOLDER RESTORE - The present disclosure describes systems and methods for hierarchical, iterative backup and restoration of files in a hierarchy. Upon backup of a new or modified file, an identification file is created with entries identifying the new or modified file and current versions of all other files in the same directory. The identification file may be stored on the local system and marked for backup. This triggers standard backup routines, such that the identification file is then backed up as if it were a new file in the parent directory. Accordingly, a second identification file is created with entries identifying the first identification file (and thus the child directory) as well as any other current versions of files in the parent directory and identification files for other child directories. This process is iteratively repeated, climbing through the directory structure, until reaching a top-most or root folder. | 11-19-2015 |
20150331757 | ONE-CLICK BACKUP IN A CLOUD-BASED DISASTER RECOVERY SYSTEM - In one embodiment, a computer-implemented method includes the step of accessing a set of data blocks in a local application server disk in an application server. It is determined which of the set of data blocks are used to store data. The data blocks used to store data are read to a deduplication store on the storage appliance. It is determined that a modification occurs to a data block in the local application server disk of the application server. The modification is read to the deduplication store. A remote virtual image of the application server can be generated from the deduplication store. | 11-19-2015 |
20150339199 | STORAGE DEVICE TO BACKUP CONTENT BASED ON A DEDUPLICATION SYSTEM - Chunks that commonly occur in each content type are aggregated in a first container. To be more specific, a storage device used for content backup is configured with: (1) a memory device that provides a memory region for one or a plurality of first containers used to store first chunks that commonly occur in each content type among chunks extracted from the contents of writing targets, and for one or a plurality of second containers used to store other chunks than the first chunks; and (2) a backup unit that decides whether each of the chunks extracted from the contents of the writing targets is a first duplication chunk duplicating a chunk stored in the first container, and further decides, for only a chunk that is decided not to be the first duplication chunk, whether each of the chunks is a second duplication chunk duplicating a chunk stored in the second container, and then stores only a chunk that is decided not to be the second duplication chunk in the second container. | 11-26-2015 |
20150370645 | SELECTING A BACKUP TYPE BASED ON CHANGED DATA - Techniques for selecting a backup type based on changed data are described in various implementations. An example method that implements the techniques may include identifying a backup policy that describes a source of data to be backed up during a backup operation. The method may also include determining an amount of data that has changed on the source since a previous backup of the source. The method may also include selecting a type of backup to perform based on the amount of data that has changed on the source. The method may also include causing the backup operation to be performed using the selected type of backup. | 12-24-2015 |
20150378834 | EFFICIENT BUILDING OF RESTORE LIST - A system for building a restore list comprises a processor and a memory. The processor is configured to determine whether a next sibling record comprises a directory. The directory is popped from a directory stack. In the event that the next sibling record comprises a subdirectory of the directory, the processor is configured to push a directory path associated with the next sibling record onto the directory stack. In the event that the next sibling record does not comprise a subdirectory, the processor is configured to add the latest index record associated with the latest index record to a restore list. The memory coupled to the processor and configured to provide the processor with instructions. | 12-31-2015 |
20160041884 | DATA BACKUP USING METADATA MAPPING - An information processing apparatus, backup method, and program product that enable efficient differential backup. In one embodiment, an information processing apparatus for files stored in a storage device includes: a metadata management unit for managing metadata of files stored in the storage device; a map generation unit for generating a map which indicates whether metadata associated with an identification value uniquely identifying a file in the storage device is present or absent; and a backup management unit for scanning the metadata to detect files that have been created, modified, or deleted since the last backup, and storing at least a data block and the metadata for a detected file in a backup storage device as backup information in association with the identification value. | 02-11-2016 |
20160048427 | VIRTUAL SUBDIRECTORY MANAGEMENT - A unified system provides primary storage and in-line analytics-based data protection. Additional data intelligence and analytics gathered on protected data and prior analytics are stored in discovery points. The disclosed system implements multi-threaded log writes across primary and restore nodes with write gathering across file systems; nested directories such as may be used for storing virtual machine files, where every subdirectory has an associated file system for snapshot purposes; and cloning objects on demand with background metadata and data migration. | 02-18-2016 |
20160048428 | THIN PROVISIONED CLONE - A unified system provides primary storage and in-line analytics-based data protection. Additional data intelligence and analytics gathered on protected data and prior analytics are stored in discovery points. The disclosed system implements multi-threaded log writes across rimary and restore nodes with write gathering across file systems; nested directories such as may be used for storing virtual machine files, where every subdirectory has an associated file system for snapshot purposes; and cloning objects on demand with background metadata and data migration. | 02-18-2016 |
20160055065 | DATA PROCESSING APPARATUS AND METHOD - Operating a data processing and storage apparatus to perform continuous backup monitoring for a collection of stored file system objects. In response to changes respective to a number of the file system objects, a set of Data Management Application Program Interface (DMAPI) events is created. For each of the events, accessory file system object information relative to a file system object subject to the change is determined. The events are grouped into an event group and a unique group identifier and an overall group size count are assigned to each of the events included in the event group. The events are sent together with the respective accessory file system object information, the respective group identifier and the respective group size to a number of backup clients registered as applications. The backup clients are to process the events together with the respective accessory file system object information, the respective group identifier and the respective group size into a number of backup requests. | 02-25-2016 |
20160062843 | METHODS AND DEVICES FOR BACKING UP FILE - A method for backing up files to a back-up server includes determining a hash value of a file according to a preset algorithm, inquiring for the determined hash value in a local back-up database, and canceling back-up of the file to the back-up server if the hash value is recorded in the local back-up database. | 03-03-2016 |
20160092311 | UTILIZING AN INCREMENTAL BACKUP IN A DECREMENTAL BACKUP SYSTEM - Utilizing an incremental backup in a decremental backup system. In one example embodiment, a method for utilizing an incremental backup in a decremental backup system includes creating a base backup that includes all original allocated blocks in a source storage at a first point in time. Next, an incremental backup is created that includes allocated blocks in the source storage that were newly allocated or were changed between the first point in time and a second point in time. The changed allocated blocks in the incremental backup are identified. During a third time period, a decremental backup is created and the incremental backup is ingested into the base backup by copying, into the decremental backup, original allocated blocks from the base backup that correspond to the changed allocated blocks in the incremental backup. Lastly, the newly-allocated blocks and the changed allocated blocks from the incremental backup are added to the base backup. | 03-31-2016 |
20160092451 | PRUNING FREE BLOCKS OUT OF A DECREMENTAL BACKUP CHAIN - Pruning free blocks out of a decremental backup chain. In one example embodiment, a method for pruning free blocks out of a decremental backup in a decremental backup chain includes identifying a decremental backup chain, and pruning free blocks out of the target decremental backup. | 03-31-2016 |
20160092457 | CONSOLIDATING DECREMENTAL BACKUPS IN A DECREMENTAL BACKUP CHAIN - Consolidating decremental backups in a decremental backup chain. In one example embodiment, a method for consolidating decremental backups in a decremental backup chain includes identifying a decremental backup chain that includes multiple decremental backups of a source storage and a base backup of the source storage, identifying, for consolidation, a sequential set of decremental backups in the multiple decremental backups, identifying a set of oldest blocks from the sequential set of decremental backups for unique block positions of blocks included in the sequential set of decremental backups, and creating a consolidated decremental backup that includes the set of oldest blocks. | 03-31-2016 |
20160110259 | SYSTEM AND METHOD FOR MERGING CONTINUOUS VOLUME SNAPSHOTS - A system divides a source computer storage device into a plurality of logical volumes, and creates a first recovery point data file and a first recovery point index file. In response to an incremental backup of a first logical volume, the system creates a second recovery point index file comprising a plurality of indices. In response to no data changing in a particular block in the first logical volume, the system points an index in the second recovery point index file to the particular block in the first logical volume. In response to data changing in the particular block in the first logical volume, the system creates a corresponding new block in a second recovery point data file. The system points the index in the second recovery point index file to the corresponding new block in the first logical volume. | 04-21-2016 |
20160139996 | METHODS FOR PROVIDING UNIFIED STORAGE FOR BACKUP AND DISASTER RECOVERY AND DEVICES THEREOF - A method, non-transitory computer readable medium, and device that providing a unified storage for backup and disaster recovery includes capturing a recent snapshot of one or more file systems associated with a client computing device. The captured recent snapshot is stored in a secondary storage device. One or more changes to one or more files in the one or more file systems are determined by comparing the stored recent snapshot against an initial snapshot. A response to a disaster recovery request or a backup request based on the determined one or more changes to the one or more file systems is provided. | 05-19-2016 |
20160154704 | BACKUP SYSTEM AND BACKUP METHOD THEREOF | 06-02-2016 |
20160162365 | STORING DIFFERENCE INFORMATION IN A BACKUP SYSTEM - Examples disclosed herein relate to storing difference information in a backup system. Examples include storing, in remote backup storage of the backup system, difference information representing differences between data stored locally at a computing device and a version of the data stored in the version control storage of a version control system. | 06-09-2016 |
20160170839 | UTILIZING AN INCREMENTAL BACKUP IN A DECREMENTAL BACKUP SYSTEM | 06-16-2016 |
20170235642 | HIGH SPEED BACKUP | 08-17-2017 |