Class / Patent application number | Description | Number of patent applications / Date published |
707685000 | Incremental Recovery | 17 |
20100312754 | METHOD AND SYSTEM FOR BACKUP AND RECOVERY - A method and system for backup and recovery of data objects accessible to a computer system may identify data events associated with the data objects. Metadata providing a record of data events associated with a data object, including information identifying prior versions of a data object may be stored in a central index. An indication of a plurality of data objects may be displayed on a single panel display object, along with a revision history for each displayed data object. The revision history may include an indication of previous versions of the data object, which may be selectable and accessible from the single panel display object. The single panel display object may further display a timeline with a selectable timescale. The timescale may be associated with a color scale, which may also be used in the display of the data objects and their respective revision histories. | 12-09-2010 |
20110016094 | TRANSACTION HISTORY WITH BOUNDED OPERATION SEQUENCES - A technique for maintaining a transaction history is described. This transaction history includes a sequence of commands or operations in an electronic-design-automation (EDA) environment. For subsets of one or more operations in the sequence of operations, the transaction history includes an associated transaction name, as well as a state of the of the subset, which is open after an initial EDA operation in the subset has been performed and is closed after a last EDA operation in the subset has been performed. This transaction history can be displayed in a window in a graphical user interface, and facilitates undoing and/or rolling back of changes to the data associated with one or more subsets. For example, if an error is detected, roll back of one or more subsets to a known software state or condition prior to the operations in the one or more subsets may be performed without user instructions using the transaction history. | 01-20-2011 |
20110093440 | DEVICE AND METHOD FOR GENERATING COPY OF DATABASE - In a DBMS, in response to a request from application programs, a base table update function updates a base table and a recovery start point, and a log recording function records update logs for the base table. Then, at predetermined timing, a backup function outputs the content of the base table to a backup file and copies the recovery start point associated with the base table to a recovery start point. Subsequently, when a user has specified a quiesce point and the base table, a copy generation function generates a target table that is a copy of the base table at the quiesce point by updating the backup file of the specified base table with ones of the update logs from the recovery start point to the quiesce point. | 04-21-2011 |
20110258164 | Detecting Inadvertent or Malicious Data Corruption in Storage Subsystems and Recovering Data - Embodiments of the invention detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored, by mapping the table data to locations within the file system and mapping the file system locations to volume logical blocks; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks. Changes which are reflected in the bitmaps for the data, but which do not have corresponding entries in the transaction logs are flagged as unauthorized changes. Snapshots of the data, from a time prior to the time at which a flagged snapshot was taken, are identified for use in restoring data to its status prior to the unauthorized change. | 10-20-2011 |
20120124007 | Disinfection of a file system - A method of disinfecting an infected electronic file in a file system. At a computer device, a file system is scanned using an anti-virus application to identify the infected electronic file. All or part of an uninfected version of the electronic file is obtained from a backup database of the file system. The backup system includes data from which a plurality of backup copies of at least part of the file system may be obtained. All or part of the infected electronic file is replaced with all or part of the uninfected electronic file. A determination is made as to whether any of the plurality of backup copies include an infected version of the file. If any of the plurality of backup copies include an infected version of the electronic file, the electronic file in the backup database is replaced with all or part of the uninfected version of the electronic file. | 05-17-2012 |
20120290541 | RECOVERY PROCEDURE FOR A DATA STORAGE SYSTEM - A method of recovering a value in a data storage system includes maintaining a list of entries corresponding to values that have been inserted into the data storage system, determining whether the values are at an At Maximum Redundancy (AMR) state, and if not, the converging the values to the AMR state. | 11-15-2012 |
20130238565 | REBUILDING AN ENCODED DATA SLICE WITHIN A DISPERSED STORAGE NETWORK - A method begins with a computing device of a dispersed storage network (DSN) determining that an encoded data slice of a set of encoded data slices requires rebuilding and sending partial rebuild requests to storage units of the DSN. The method continues with one of the storage units generating a partial rebuilt slice based one or more encoded data slices of the set of encoded data slices stored by the one of the storage units and securing the partial rebuilt slice using a shared secret scheme that is shared among the storage units to produce a secured partial rebuilt slice. The method continues with the computing device receiving a set of secured partial rebuilt slices from the storage units, recovering a set of partial rebuilt slices from the set of secured partial rebuilt slices, and rebuilding the encoded data slice from the set of partial rebuilt slices. | 09-12-2013 |
20130346374 | RESTORING OBJECTS IN A CLIENT-SERVER ENVIRONMENT - Provided are a computer program product, system, and method for restoring objects in a client-server environment. An entry is added to an index for each chunk identifier. Each index entry includes one of the chunk identifiers and a reference to the chunk of data in the target storage from which the chunk identifier was calculated. A request is transmitted to a server recovery agent to recover an object from the storage server. Chunk identifiers of chunks of data in the requested object to recover are received from the server recovery agent. A determination is made from the index of whether the received chunk identifiers for the requested object matches the chunk identifiers indicated in the index. A request is made of the chunks from the server recovery agent for the received chunk identifiers not matching chunk identifiers in the index entries. | 12-26-2013 |
20140317063 | SYNCHRONIZATION OF STORAGE USING COMPARISONS OF FINGERPRINTS OF BLOCKS - A system for processing data comprises a deduplicating system, an interface, and a processor. The deduplicating system stores a copy of data stored in a data storage system by storing a set of segments that is able to reconstruct the data stored in the data storage system. The interface receives an indication to revert data stored in the data storage system to a state of data at a snapshot time stored in the deduplicating system. The processor is configured to determine a subset of the data stored in the data storage system that has changed between the data stored in the data storage system and the state of data at the snapshot time stored in the deduplicating system using a first list of fingerprints associated with the data stored on the data storage system and a second list of fingerprints associated with the state of data at the snapshot time stored in the deduplicating system. | 10-23-2014 |
20150127619 | File System Metadata Capture and Restore - Example apparatus and methods create and maintain a functional mirror of file system metadata for an active file system. The functional mirror may be implemented as a set of database tables that allow a journal functionality for information received from the active file system. Example apparatus and methods also restore the file system metadata from the functional mirror. Mirror creation and maintenance can operate in parallel. Mirror maintenance and metadata restore can also operate in parallel. The functional mirror may be created primarily using a systematic, system-wide, multi-threaded crawler approach whose results are updated using an event-driven approach that accounts for changes that may make obsolete information acquired during the crawler approach. The metadata may be restored using a systematic, system-wide, multi-threaded crawler approach acting together with an event-driven approach that restores certain files out of order as they are needed. | 05-07-2015 |
20150317212 | TIME-BASED CHECKPOINT TARGET FOR DATABASE MEDIA RECOVERY - A method, apparatus, and system for a time-based checkpoint target is provided for standby databases. Change records received from a primary database are applied for a standby database, creating dirty buffer queues. As the change records are applied, a mapping is maintained, which maps timestamps to logical times of change records that were most recently applied at the timestamp for the standby database. On a periodic dirty buffer queue processing interval, the mapping is used to determine a target logical time that is mapped to a target timestamp that is prior to a present timestamp by at least a checkpoint delay. The dirty buffer queues are then processed up to the target logical time, creating an incremental checkpoint. On a periodic header update interval, file headers reflecting a consistent logical time for the checkpoint are also updated. The intervals and the checkpoint delay are adjustable by user or application. | 11-05-2015 |
20160062845 | Populating Image Metadata By Cross-Referencing Other Images - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for accessing first image metadata corresponding to a first image, the first image metadata including a plurality of first image data fields, determining that at least one data field of the plurality of first image data fields is a null data field, in response to determining that at least one data field is a null data field, accessing second image metadata corresponding to a second image, the second image metadata including a plurality of second image data fields, determining that the second image corresponds to the first image, and cross-referencing the at least one data field with data from a corresponding data field of the plurality of second image data fields. | 03-03-2016 |
20160062850 | EFFICIENT FILE BROWSING USING KEY VALUE DATABASES FOR VIRTUAL BACKUPS - A method, article of manufacture, and apparatus for protecting data. In some embodiments, this includes using a directory to identify keys in a key value database, walking through each identified key to identify values, identifying a file based on the walk through, and restoring the identified file to a storage device. | 03-03-2016 |
20160085632 | AUTOMATED DATA RECOVERY FROM REMOTE DATA OBJECT REPLICAS - Machines, systems and methods for recovering data objects in a distributed data storage system, the method comprising storing one or more replicas of a first data object on one or more clusters in one or more data centers connected over a data communications network; recording health information about said one or more replicas, wherein the health information comprises data about availability of a replica to participate in a restoration process; calculating a query-priority for the first data object; querying, based on the calculated query-priority, the health information for the one or more replicas to determine which of the one or more replicas is available for restoration of the object data; calculating a restoration-priority for the first data object based on the health information for the one or more replicas; and restoring the first data object from the one or more of the available replicas, based on the calculated restoration-priority. | 03-24-2016 |
20160085633 | AUTOMATED DATA RECOVERY FROM REMOTE DATA OBJECT REPLICAS - Machines, systems and methods for recovering data objects in a distributed data storage system, the method comprising storing one or more replicas of a first data object on one or more clusters in one or more data centers connected over a data communications network; recording health information about said one or more replicas, wherein the health information comprises data about availability of a replica to participate in a restoration process; calculating a query-priority for the first data object; querying, based on the calculated query-priority, the health information for the one or more replicas to determine which of the one or more replicas is available for restoration of the object data; calculating a restoration-priority for the first data object based on the health information for the one or more replicas; and restoring the first data object from the one or more of the available replicas, based on the calculated restoration-priority. | 03-24-2016 |
20160085635 | UPDATING KEY VALUE DATABASES FOR VIRTUAL BACKUPS - A method, article of manufacture, and apparatus for protecting data. In some embodiments, this includes identifying a file modification, modifying a previous file entry, wherein the previous file entry is stored in a key value database, and creating a new file entry in the key value database. In some embodiments, modifying the previous file entry includes modifying the end version of the entry. | 03-24-2016 |
20160154703 | SYSTEM AND METHOD FOR PERFORMING AN IMAGE LEVEL SNAPSHOT AND FOR RESTORING PARTIAL VOLUME DATA | 06-02-2016 |