Movatterモバイル変換


[0]ホーム

URL:


US20140281519A1 - Encrypted file backup - Google Patents

Encrypted file backup
Download PDF

Info

Publication number
US20140281519A1
US20140281519A1US14/042,173US201314042173AUS2014281519A1US 20140281519 A1US20140281519 A1US 20140281519A1US 201314042173 AUS201314042173 AUS 201314042173AUS 2014281519 A1US2014281519 A1US 2014281519A1
Authority
US
United States
Prior art keywords
file
encrypted
data
private key
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/042,173
Inventor
Andrei Erofeev
Rahul S. Pawar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Commvault Systems Inc
Original Assignee
Commvault Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Commvault Systems IncfiledCriticalCommvault Systems Inc
Priority to US14/042,173priorityCriticalpatent/US20140281519A1/en
Assigned to COMMVAULT SYSTEMS, INC.reassignmentCOMMVAULT SYSTEMS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: EROFEEV, ANDREI, PAWAR, RAHUL S.
Assigned to BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENTreassignmentBANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENTSECURITY INTERESTAssignors: COMMVAULT SYSTEMS, INC.
Publication of US20140281519A1publicationCriticalpatent/US20140281519A1/en
Assigned to COMMVAULT SYSTEMS, INC.reassignmentCOMMVAULT SYSTEMS, INC.RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: BANK OF AMERICA, N.A.
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access to a first file, which may be stored in a primary storage system. Further, the method can include determining whether the access comprises a write access. In response to determining that the access comprises a write access, the method can include accessing file metadata associated with the first file and accessing a set of encryption rules. In addition, the method can include determining whether the file metadata satisfies the set of encryption rules. In response to determining that the file metadata satisfies the set of encryption rules, the method can include encrypting the first file to obtain a first encrypted file and modifying an extension of the first encrypted file to include an encryption extension.

Description

Claims (21)

What is claimed is:
1. A method for backing up a primary storage system, the method comprising:
by a computing system comprising one or more processors:
identifying a file stored at a primary storage system for backup to a secondary storage system;
determining whether the file is an encrypted file; and
in response to determining that the file is an encrypted file:
extracting an encrypted data encryption key from the file;
decrypting the encrypted data encryption key to obtain a data encryption key;
decrypting the file using the data encryption key to obtain a decrypted file; and
providing the decrypted file to the secondary storage system for backup, thereby enabling the secondary storage system to more efficiently store files at the secondary storage system.
2. The method ofclaim 1, wherein the encrypted data encryption key is associated with the computing system, and wherein decrypting the encrypted data encryption key comprises:
accessing an encrypted private key assigned to the computing system;
providing the encrypted private key to a storage manager;
in response to providing the encrypted private key to the storage manager, receiving a private key corresponding to the encrypted private key, the private key a decrypted version of the encrypted private key; and
using the private key to decrypt the encrypted data encryption key to obtain the data encryption key.
3. The method ofclaim 1, wherein the file includes a set of encrypted data encryption keys, each data encryption key associated with a different user from a set of users.
4. The method ofclaim 3, wherein the encrypted data encryption key is associated with a first user from the set of users, and wherein decrypting the encrypted data encryption key comprises:
accessing an encrypted private key assigned to the first user;
accessing a passphrase associated with the first user;
using the passphrase to decrypt the encrypted private key to obtain a private key corresponding to the encrypted private key, the private key a decrypted version of the encrypted private key; and
using the private key to decrypt the encrypted data encryption key to obtain the data encryption key.
5. The method ofclaim 4, wherein using the passphrase to decrypt the encrypted private key comprises:
hashing the passphrase to obtain a modified passphrase; and
decrypting the encrypted private key using the modified passphrase.
6. The method ofclaim 5, wherein hashing the passphrase comprises hashing the passphrase a number of times equivalent to the number of times the passphrase was hashed when encrypting the private key.
7. The method ofclaim 4, wherein the private key corresponds to a public key associated with the first user, the public key used to create the encrypted data encryption key.
8. The method ofclaim 4, wherein accessing the encrypted private key assigned to the first user comprises accessing the encrypted private key from a secure storage area within the primary storage system.
9. The method ofclaim 4, wherein accessing the encrypted private key assigned to the first user comprises extracting the encrypted private key from the encrypted file.
10. The method ofclaim 4, wherein the passphrase is equivalent to a password used by the first user to access the computer system.
11. The method ofclaim 1, wherein determining whether the file is the encrypted file occurs at a first time period, and wherein the encrypted file is encrypted for storage at the primary storage system as part of a backup operation performed at a second time period, the second time period earlier than the first time period.
12. The method ofclaim 1, wherein determining whether the file is the encrypted file comprises determining whether the file includes an encryption extension.
13. The method ofclaim 1, wherein determining whether the file is the encrypted file comprises analyzing the contents of the file.
14. The method ofclaim 1, further comprising discarding the decrypted file after providing the decrypted file to the secondary storage system.
15. A system for backing up a primary storage system, the system comprising:
a primary storage device configured to store a set of files; and
a data agent comprising computer hardware and configured to:
identify a file from the set of files for backup to a secondary storage system; and
determine whether the file is an encrypted file; and
in response to determining that the file is an encrypted file, the data agent is further configured to:
extract an encrypted data encryption key from the file;
decrypt the encrypted data encryption key to obtain a data encryption key;
decrypt the file using the data encryption key to obtain a decrypted file; and
provide the decrypted file to the secondary storage system for backup, thereby enabling the secondary storage system to more efficiently store files at the secondary storage system.
16. The system ofclaim 15, wherein the encrypted data encryption key is associated with the system, and wherein the data agent is further configured to decrypt the encrypted data encryption key by:
accessing an encrypted private key assigned to the system;
providing the encrypted private key to a storage manager;
in response to providing the encrypted private key to the storage manager, receiving a private key corresponding to the encrypted private key, the private key a decrypted version of the encrypted private key; and
using the private key to decrypt the encrypted data encryption key to obtain the data encryption key.
17. The system ofclaim 15, wherein the encrypted data encryption key is associated with a first user from a set of users, each user associated with a different encrypted data encryption key, and wherein the data agent is further configured to decrypt the encrypted data encryption key by:
accessing an encrypted private key assigned to the first user;
accessing a passphrase associated with the first user;
using the passphrase to decrypt the encrypted private key to obtain a private key corresponding to the encrypted private key, the private key a decrypted version of the encrypted private key; and
using the private key to decrypt the encrypted data encryption key to obtain the data encryption key.
18. The system ofclaim 17, wherein the data agent is further configured to use the passphrase to decrypt the encrypted private key by:
hashing the passphrase to obtain a modified passphrase; and
decrypting the encrypted private key using the modified passphrase.
19. The system ofclaim 17, wherein the primary storage system comprises a secure storage area configured to store the encrypted private key, and wherein the data agent is further configured to access the encrypted private key from the secure storage area of the primary storage system.
20. The system ofclaim 17, wherein the data agent is further configured to access the encrypted private key by extracting the encrypted private key from the encrypted file.
21. The system ofclaim 15, wherein the data agent is further configured to identify the file from the set of files for backup to the secondary storage system based on the location of the file in the primary storage system.
US14/042,1732013-03-122013-09-30Encrypted file backupAbandonedUS20140281519A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/042,173US20140281519A1 (en)2013-03-122013-09-30Encrypted file backup

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US201361777195P2013-03-122013-03-12
US14/042,173US20140281519A1 (en)2013-03-122013-09-30Encrypted file backup

Publications (1)

Publication NumberPublication Date
US20140281519A1true US20140281519A1 (en)2014-09-18

Family

ID=51534049

Family Applications (13)

Application NumberTitlePriority DateFiling Date
US14/042,106AbandonedUS20140281518A1 (en)2013-03-122013-09-30Multi-tier file restoration
US14/042,076AbandonedUS20140281516A1 (en)2013-03-122013-09-30Automatic file decryption
US14/042,095Active2034-10-08US9483655B2 (en)2013-03-122013-09-30File backup with selective encryption
US14/042,061Active2034-01-27US9367702B2 (en)2013-03-122013-09-30Automatic file encryption
US14/042,173AbandonedUS20140281519A1 (en)2013-03-122013-09-30Encrypted file backup
US14/042,216AbandonedUS20140281545A1 (en)2013-03-122013-09-30Multi-layer embedded encryption
US14/042,062AbandonedUS20140281515A1 (en)2013-03-122013-09-30Encrypted file presentation
US15/175,534ActiveUS9734348B2 (en)2013-03-122016-06-07Automatic file encryption
US15/282,931Active2033-11-17US9990512B2 (en)2013-03-122016-09-30File backup with selective encryption
US15/670,848Expired - Fee RelatedUS10445518B2 (en)2013-03-122017-08-07Automatic file encryption
US16/444,355Active2034-03-09US11042663B2 (en)2013-03-122019-06-18Automatic file encryption
US17/322,439Active2034-07-26US11928229B2 (en)2013-03-122021-05-17Automatic file encryption
US18/588,451PendingUS20240256694A1 (en)2013-03-122024-02-27Automatic file encryption

Family Applications Before (4)

Application NumberTitlePriority DateFiling Date
US14/042,106AbandonedUS20140281518A1 (en)2013-03-122013-09-30Multi-tier file restoration
US14/042,076AbandonedUS20140281516A1 (en)2013-03-122013-09-30Automatic file decryption
US14/042,095Active2034-10-08US9483655B2 (en)2013-03-122013-09-30File backup with selective encryption
US14/042,061Active2034-01-27US9367702B2 (en)2013-03-122013-09-30Automatic file encryption

Family Applications After (8)

Application NumberTitlePriority DateFiling Date
US14/042,216AbandonedUS20140281545A1 (en)2013-03-122013-09-30Multi-layer embedded encryption
US14/042,062AbandonedUS20140281515A1 (en)2013-03-122013-09-30Encrypted file presentation
US15/175,534ActiveUS9734348B2 (en)2013-03-122016-06-07Automatic file encryption
US15/282,931Active2033-11-17US9990512B2 (en)2013-03-122016-09-30File backup with selective encryption
US15/670,848Expired - Fee RelatedUS10445518B2 (en)2013-03-122017-08-07Automatic file encryption
US16/444,355Active2034-03-09US11042663B2 (en)2013-03-122019-06-18Automatic file encryption
US17/322,439Active2034-07-26US11928229B2 (en)2013-03-122021-05-17Automatic file encryption
US18/588,451PendingUS20240256694A1 (en)2013-03-122024-02-27Automatic file encryption

Country Status (1)

CountryLink
US (13)US20140281518A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9367702B2 (en)2013-03-122016-06-14Commvault Systems, Inc.Automatic file encryption
US9405928B2 (en)2014-09-172016-08-02Commvault Systems, Inc.Deriving encryption rules based on file content
US9411986B2 (en)2004-11-152016-08-09Commvault Systems, Inc.System and method for encrypting secondary copies of data
US20160253529A1 (en)*2015-02-262016-09-01Whitecanyon Software, Inc.Selective Storage Device Wiping System and Method
US9858427B2 (en)2016-02-262018-01-02International Business Machines CorporationEnd-to-end encryption and backup in data protection environments
CN110692223A (en)*2017-07-142020-01-14日立数据管理有限公司Method, apparatus and system for controlling user access to a data storage system

Families Citing this family (120)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9106411B2 (en)2012-09-302015-08-11Apple Inc.Secure escrow service
US10078968B2 (en)*2012-12-192018-09-18Law School Admission Council, Inc.System and method for electronic test delivery
US9202077B2 (en)*2013-04-262015-12-01Vormetric, Inc.Encryption solution for protecting file systems in multi-host clusters
US10860529B2 (en)*2014-08-112020-12-08Netapp Inc.System and method for planning and configuring a file system migration
US9912474B2 (en)*2013-09-272018-03-06Intel CorporationPerforming telemetry, data gathering, and failure isolation using non-volatile memory
US9246676B2 (en)*2013-11-222016-01-26Cisco Technology, Inc.Secure access for encrypted data
US9697378B2 (en)*2013-12-132017-07-04International Business Machines CorporationNetwork encrypted data object stored on an encrypted file system
US9811669B1 (en)*2013-12-312017-11-07EMC IP Holding Company LLCMethod and apparatus for privacy audit support via provenance-aware systems
US20160335201A1 (en)*2014-01-282016-11-17Hewlett Packard Enterprise Development LpData and instruction set encryption
US9076004B1 (en)*2014-05-072015-07-07Symantec CorporationSystems and methods for secure hybrid third-party data storage
US9864874B1 (en)*2014-05-212018-01-09Amazon Technologies, Inc.Management of encrypted data storage
KR102263880B1 (en)*2014-06-192021-06-11삼성전자주식회사Host controller and system-on-chip
US9547563B2 (en)*2014-06-302017-01-17Vmware, Inc.Recovery system and method for performing site recovery using replicated recovery-specific metadata
US10152487B1 (en)*2014-09-292018-12-11EMC IP Holding Company LLCSystem and method for a cloud storage provider to safely deduplicate encrypted backup objects
GB2532039B (en)2014-11-062016-09-21IbmSecure database backup and recovery
US10043015B2 (en)*2014-11-202018-08-07At&T Intellectual Property I, L.P.Method and apparatus for applying a customer owned encryption
CN105656866B (en)*2014-12-022019-10-22华为技术有限公司 Data encryption method and system
EP3032453B1 (en)*2014-12-082019-11-13eperi GmbHStoring data in a server computer with deployable encryption/decryption infrastructure
CA2876468C (en)*2014-12-292023-02-28Ibm Canada Limited - Ibm Canada LimiteeSystem and method for selective compression in a database backup operation
SG10201500698YA (en)*2015-01-292016-08-30Huawei Internat Pte LtdMethod for data protection using isolated environment in mobile device
US10025932B2 (en)*2015-01-302018-07-17Microsoft Technology Licensing, LlcPortable security device
US10348727B2 (en)*2015-02-132019-07-09International Business Machines CorporationAutomatic key management using enterprise user identity management
US10454676B2 (en)2015-02-132019-10-22International Business Machines CorporationAutomatic key management using enterprise user identity management
US10020940B2 (en)*2015-02-232018-07-10Oracle International CorporationIdentity-based encryption for securing access to stored messages
US10445289B1 (en)*2015-03-312019-10-15EMC IP Holding Company LLCMethod and apparatus for automatic cleanup of disfavored content
US10997030B2 (en)*2015-03-312021-05-04EMC IP Holding Company LLCDisaster recovery as a service
US9904629B2 (en)*2015-05-312018-02-27Apple Inc.Backup system with multiple recovery keys
US10311042B1 (en)*2015-08-312019-06-04Commvault Systems, Inc.Organically managing primary and secondary storage of a data object based on expiry timeframe supplied by a user of the data object
US10623184B2 (en)*2015-09-292020-04-14International Business Machines CorporationSmart resource access for decrypted information
US10248316B1 (en)*2015-09-302019-04-02EMC IP Holding Company LLCMethod to pass application knowledge to a storage array and optimize block level operations
US10223543B1 (en)*2015-09-302019-03-05EMC IP Holding Company LLCDynamic external views with encryption to support global data compliance for global archives
CN105354109B (en)*2015-10-092018-11-13浙江宇视科技有限公司The backup method and device of video monitoring index data
JP6082130B1 (en)*2015-10-142017-02-15株式会社アイキュエス System and program
CN105303124A (en)*2015-11-262016-02-03浪潮电子信息产业股份有限公司Mother and child key encryption method for physical tape library
TWI611349B (en)*2015-12-112018-01-11財團法人資訊工業策進會Detection system and method thereof
US9992175B2 (en)*2016-01-082018-06-05Moneygram International, Inc.Systems and method for providing a data security service
US20170220464A1 (en)*2016-01-282017-08-03Pure Storage, Inc.Efficiently managing encrypted data on a remote backup server
CN107025147A (en)*2016-02-022017-08-08中兴通讯股份有限公司Processing method, server and the system of data
US10437791B1 (en)*2016-02-092019-10-08Code 42 Software, Inc.Network based file storage system monitor
US10791097B2 (en)2016-04-142020-09-29Sophos LimitedPortable encryption format
US10686827B2 (en)2016-04-142020-06-16Sophos LimitedIntermediate encryption for exposed content
US9984248B2 (en)2016-02-122018-05-29Sophos LimitedBehavioral-based control of access to encrypted content by a process
US10263966B2 (en)2016-04-142019-04-16Sophos LimitedPerimeter enforcement of encryption rules
US10681078B2 (en)*2016-06-102020-06-09Sophos LimitedKey throttling to mitigate unauthorized file access
US10650154B2 (en)2016-02-122020-05-12Sophos LimitedProcess-level control of encrypted content
US10628597B2 (en)*2016-04-142020-04-21Sophos LimitedJust-in-time encryption
US10616266B1 (en)2016-03-252020-04-07Fireeye, Inc.Distributed malware detection system and submission workflow thereof
US10671721B1 (en)*2016-03-252020-06-02Fireeye, Inc.Timeout management services
US10601863B1 (en)2016-03-252020-03-24Fireeye, Inc.System and method for managing sensor enrollment
US10785255B1 (en)2016-03-252020-09-22Fireeye, Inc.Cluster configuration within a scalable malware detection system
US10454679B2 (en)*2016-06-102019-10-22Apple Inc.File system support for rolling keys on file extents
US9794061B1 (en)*2016-06-142017-10-17Storagecraft Technology CorporationConsolidating encrypted image backups without decryption
GB2551983B (en)2016-06-302020-03-04Sophos LtdPerimeter encryption
US10289568B2 (en)*2016-07-072019-05-14Microsoft Technology Licensing, LlcApplication-driven storage systems for a computing system
US20180034787A1 (en)*2016-08-012018-02-01Vormetric, Inc.Data encryption key sharing for a storage system
US10581807B2 (en)*2016-08-292020-03-03International Business Machines CorporationUsing dispersal techniques to securely store cryptographic resources and respond to attacks
CN109923548B (en)*2016-10-112022-06-10佰倬信息科技有限责任公司Method, system and computer program product for implementing data protection by supervising process access to encrypted data
US10805070B2 (en)*2016-10-192020-10-13Index Systems, LlcSystems and methods for multi-region encryption/decryption redundancy
FR3060165B1 (en)*2016-12-092019-05-24Commissariat A L'energie Atomique Et Aux Energies Alternatives SECURE CLASSIFICATION METHOD USING TRANSCHIFFREMENT OPERATION
US10262135B1 (en)*2016-12-132019-04-16Symantec CorporationSystems and methods for detecting and addressing suspicious file restore activities
CN106709368A (en)*2016-12-152017-05-24天津交控科技有限公司Data analysis method and device
CN106570396A (en)*2016-12-292017-04-19哈尔滨安天科技股份有限公司System and method for preventing data from being encrypted by ransomware
EP3346414A1 (en)*2017-01-102018-07-11BMI SystemData filing method and system
US10289844B2 (en)*2017-01-192019-05-14International Business Machines CorporationProtecting backup files from malware
CN108337355B (en)*2017-01-192020-10-13北京小米移动软件有限公司Object encryption method and device
US20180217943A1 (en)*2017-01-302018-08-02Lenovo (Singapore) Pte. Ltd.Automatic Encryption of Failing Drives
US10594481B2 (en)2017-02-212020-03-17International Business Machines CorporationReplicated encrypted data management
EP3367243B1 (en)*2017-02-282020-09-30KYOCERA Document Solutions Inc.Information processing system, and information processing method
JP6575547B2 (en)2017-03-172019-09-18富士ゼロックス株式会社 Document management system
JP6572926B2 (en)2017-03-172019-09-11富士ゼロックス株式会社 Document management system
US10664606B2 (en)*2017-05-192020-05-26Leonard L. DreySystem and method of controlling access to a document file
US11182349B2 (en)2017-06-042021-11-23Apple Inc.Synchronizing content
US11063748B2 (en)2017-06-042021-07-13Apple Inc.Synchronizing content
US10200194B2 (en)*2017-06-302019-02-05Microsoft Technology Licensing, LlcTheft and tamper resistant data protection
US10664574B1 (en)*2017-09-152020-05-26Architecture Technology CorporationDistributed data storage and sharing in a peer-to-peer network
US10193690B1 (en)*2017-09-292019-01-29U.S. Bancorp, National AssociationSystems and methods to secure data using computer system attributes
US11093342B1 (en)*2017-09-292021-08-17EMC IP Holding Company LLCEfficient deduplication of compressed files
CN107612763B (en)*2017-11-082020-10-02浪潮通用软件有限公司Metadata management method, application server, service system, medium and controller
US11023595B1 (en)*2018-12-072021-06-01Amazon Technologies, Inc.System and method for processing encrypted search
US11861024B1 (en)*2018-01-262024-01-02Wells Fargo Bank, N.A.Systems and methods for data risk assessment
US11165758B2 (en)*2018-04-092021-11-02International Business Machines CorporationKeystream generation using media data
US11023601B2 (en)*2018-04-202021-06-01Rohde & Schwarz Gmbh & Co. KgSystem and method for secure data handling
US11362824B2 (en)*2018-05-252022-06-14Intertrust Technologies CorporationContent management systems and methods using proxy reencryption
CN108874586B (en)*2018-06-062022-02-08Oppo广东移动通信有限公司Data recovery method and related product
US11768936B2 (en)*2018-07-312023-09-26EMC IP Holding Company LLCAnomaly-based ransomware detection for encrypted files
CN109286490A (en)*2018-08-272019-01-29西安电子科技大学 Method and system for deduplication and integrity verification of encrypted data
US10909245B1 (en)*2018-09-262021-02-02Ca, Inc.Secure quarantine of potentially malicious content
EP3644572B1 (en)*2018-10-272022-03-23Zertificon Solutions GmbHSecure communication of payload data
CN110033261B (en)*2018-12-262021-07-13创新先进技术有限公司 Blockchain data processing method, device and system
CN109670329A (en)*2018-12-282019-04-23东信和平科技股份有限公司A kind of safe lead-in and lead-out method of server data and server
EP3694142A1 (en)*2019-02-072020-08-12Tomes GmbHManagement and distribution of keys in distributed environments (ie cloud)
US12118106B2 (en)*2019-02-272024-10-15K2 Software, Inc.Methods and systems for extending row-level security policies
US11537724B2 (en)*2019-03-262022-12-27International Business Machines CorporationGenerating data migration plan for in-place encryption of data
US11281749B2 (en)*2019-05-102022-03-22Leonard L. DreyMethod of selective online dissemination of digital assets
US11165777B2 (en)2019-05-302021-11-02Bank Of America CorporationControlling access to secure information resources using rotational datasets and dynamically configurable data containers
US11196892B2 (en)2019-05-302021-12-07Microsoft Technology Licensing, LlcUse of client compute for document processing
US11138328B2 (en)2019-05-302021-10-05Bank Of America CorporationControlling access to secure information resources using rotational datasets and dynamically configurable data containers
EP3963860A1 (en)2019-05-302022-03-09Microsoft Technology Licensing, LLCInformation barriers for sensitive information
US11153315B2 (en)2019-05-302021-10-19Bank Of America CorporationControlling access to secure information resources using rotational datasets and dynamically configurable data containers
US11025422B2 (en)*2019-07-232021-06-01Nasuni CorporationCloud-native global file system with constant-time rekeying
US11340797B2 (en)2019-10-042022-05-24Zettaset, Inc.Dedicated encrypted container storage
EP4062278A4 (en)*2019-11-222023-08-16Hewlett-Packard Development Company, L.P. DATA MANAGEMENT
US11868318B1 (en)*2019-12-062024-01-09Pure Storage, Inc.End-to-end encryption in a storage system with multi-tenancy
US11829452B2 (en)2020-08-242023-11-28Leonard L. DreySystem and method of governing content presentation of multi-page electronic documents
CN112084516A (en)*2020-09-142020-12-15洛阳众智软件科技股份有限公司Method and equipment for safely protecting CAD drawing information
US11656951B2 (en)2020-10-282023-05-23Commvault Systems, Inc.Data loss vulnerability detection
US11928671B2 (en)2020-10-292024-03-12Ferry Pay Inc.Systems and methods for dynamic allocation of resources using an encrypted communication channel and tokenization
TR202022531A2 (en)*2020-12-302021-04-21M B I S Bilgisayar Otomasyon Danismanlik Ve Egitim Hizmetleri Sanayi Ticaret A S A SYSTEM THAT PROVIDES ENCRYPTION AND TRACKING OF PERSONAL DATA
CN112784303B (en)*2021-01-262022-11-22政采云有限公司 A file encryption method, device, system and storage medium
EP4315130A1 (en)*2021-03-302024-02-07Telefonaktiebolaget LM Ericsson (publ)Network time protocol key encryption
US12170720B2 (en)2021-05-102024-12-17Atakama LLCLocation-key encryption system
US11822686B2 (en)*2021-08-312023-11-21Mastercard International IncorporatedSystems and methods for use in securing backup data files
CN113965382A (en)*2021-10-212022-01-21国网安徽省电力有限公司物资分公司Tamper-proof method for bidding supervision list data encryption algorithm
WO2023092186A1 (en)*2021-11-252023-06-01Macropace Products Pty Ltd3-d prosthetic or object model file secure encapsulation in a non-distributable image rendering file format
US12081647B2 (en)2021-11-302024-09-03Bank Of America CorporationUsing automatic homomorphic encryption in a multi-cloud environment to support translytical data computation using an elastic hybrid memory cube
CN114640501B (en)*2022-02-142023-06-23杭州锘崴信息科技有限公司Super-fusion safety supervision and control system and method based on privacy computing platform
US20230393946A1 (en)*2022-06-062023-12-07Sap SeSelf-sufficient encrypted database backup for data migration and recovery
US20240020397A1 (en)*2022-07-182024-01-18Dell Products L.P.Dividing data between storage equipment in different security zones
US20240037542A1 (en)*2022-08-082024-02-01Block, Inc.Methods and systems for managing cryptocurrency
CN117475093B (en)*2023-12-282024-04-16齐马(海南)科技有限公司Automatic conversion method from geometric representation based on XML Meng Ka to three-dimensional CAD model

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030046572A1 (en)*2001-08-302003-03-06Newman Aaron CharlesCryptographic infrastructure for encrypting a database
US7171558B1 (en)*2000-09-222007-01-30International Business Machines CorporationTransparent digital rights management for extendible content viewers
US8140847B1 (en)*2007-09-182012-03-20Jianqing WuDigital safe

Family Cites Families (258)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4267568A (en)1975-12-031981-05-12System Development CorporationInformation storage and retrieval system
US4084231A (en)1975-12-181978-04-11International Business Machines CorporationSystem for facilitating the copying back of data in disc and tape units of a memory hierarchial system
GB2035014B (en)1978-11-061982-09-29British Broadcasting CorpCyclic redundancy data check encoding method and apparatus
US4417321A (en)1981-05-181983-11-22International Business Machines Corp.Qualifying and sorting file record data
US4641274A (en)1982-12-031987-02-03International Business Machines CorporationMethod for communicating changes made to text form a text processor to a remote host
JPS59160899A (en)1982-12-091984-09-11セコイア・システムス・インコ−ポレ−テツドMemory backup system
US4686620A (en)1984-07-261987-08-11American Telephone And Telegraph Company, At&T Bell LaboratoriesDatabase backup method
GB8622010D0 (en)1986-09-121986-10-22Hewlett Packard LtdFile backup facility
US5193154A (en)1987-07-101993-03-09Hitachi, Ltd.Buffered peripheral system and method for backing up and retrieving data to and from backup memory device
US5005122A (en)1987-09-081991-04-02Digital Equipment CorporationArrangement with cooperating management server node and network service node
JPH0743676B2 (en)1988-03-111995-05-15株式会社日立製作所 Back-up data dump control method and device
US4912637A (en)1988-04-261990-03-27Tandem Computers IncorporatedVersion management tool
US4995035A (en)1988-10-311991-02-19International Business Machines CorporationCentralized management in a computer network
US5093912A (en)1989-06-261992-03-03International Business Machines CorporationDynamic resource pool expansion and contraction in multiprocessing environments
EP0405926B1 (en)1989-06-301996-12-04Digital Equipment CorporationMethod and apparatus for managing a shadow set of storage media
US5454099A (en)1989-07-251995-09-26International Business Machines CorporationCPU implemented method for backing up modified data sets in non-volatile store for recovery in the event of CPU failure
US5133065A (en)1989-07-271992-07-21Personal Computer Peripherals CorporationBackup computer program for networks
US5321816A (en)1989-10-101994-06-14Unisys CorporationLocal-remote apparatus with specialized image storage modules
US5504873A (en)1989-11-011996-04-02E-Systems, Inc.Mass data storage and retrieval system
US5276860A (en)1989-12-191994-01-04Epoch Systems, Inc.Digital data processor with improved backup storage
US5276867A (en)1989-12-191994-01-04Epoch Systems, Inc.Digital data storage system with improved data migration
JPH0410041A (en)1990-04-271992-01-14Toshiba CorpData saving system
GB2246218B (en)1990-07-181994-02-09Stc PlcDistributed data processing systems
US5239647A (en)1990-09-071993-08-24International Business Machines CorporationData storage hierarchy with shared storage level
US5544347A (en)1990-09-241996-08-06Emc CorporationData storage system controlled remote data mirroring with respectively maintained data indices
US5301286A (en)1991-01-021994-04-05At&T Bell LaboratoriesMemory archiving indexing arrangement
US5212772A (en)1991-02-111993-05-18Gigatrend IncorporatedSystem for storing data in backup tape device
US5287500A (en)1991-06-031994-02-15Digital Equipment CorporationSystem for allocating storage spaces based upon required and optional service attributes having assigned piorities
US5333315A (en)1991-06-271994-07-26Digital Equipment CorporationSystem of device independent file directories using a tag between the directories and file descriptors that migrate with the files
US5347653A (en)1991-06-281994-09-13Digital Equipment CorporationSystem for reconstructing prior versions of indexes using records indicating changes between successive versions of the indexes
US5410700A (en)1991-09-041995-04-25International Business Machines CorporationComputer system which supports asynchronous commitment of data
EP0541281B1 (en)1991-11-041998-04-29Commvault Systems, Inc.Incremental-computer-file backup using signatures
US5241670A (en)1992-04-201993-08-31International Business Machines CorporationMethod and system for automated backup copy ordering in a time zero backup copy session
US5263154A (en)1992-04-201993-11-16International Business Machines CorporationMethod and system for incremental time zero backup copying of data
US5241668A (en)1992-04-201993-08-31International Business Machines CorporationMethod and system for automated termination and resumption in a time zero backup copy process
ATE153149T1 (en)1993-01-211997-05-15Apple Computer DEVICE AND METHOD FOR DATA BACKUP OF STORAGE UNITS IN A COMPUTER NETWORK
DE69434311D1 (en)1993-02-012005-04-28Sun Microsystems Inc ARCHIVING FILES SYSTEM FOR DATA PROVIDERS IN A DISTRIBUTED NETWORK ENVIRONMENT
US5404404A (en)*1993-07-011995-04-04Motorola, Inc.Method for updating encryption key information in communication units
JPH0721135A (en)1993-07-021995-01-24Fujitsu Ltd Data processing system with redundant monitoring function
US5642496A (en)1993-09-231997-06-24Kanfi; ArnonMethod of making a backup copy of a memory over a plurality of copying sessions
US5544345A (en)1993-11-081996-08-06International Business Machines CorporationCoherence controls for store-multiple shared data coordinated by cache directory entries in a shared electronic storage
EP0728333A1 (en)1993-11-091996-08-28Arcada SoftwareData backup and restore system for a computer network
US5495607A (en)1993-11-151996-02-27Conner Peripherals, Inc.Network management system having virtual catalog overview of files distributively stored across network domain
US5491810A (en)1994-03-011996-02-13International Business Machines CorporationMethod and system for automated data storage system space allocation utilizing prioritized data set parameters
US5673381A (en)1994-05-271997-09-30Cheyenne Software International Sales Corp.System and parallel streaming and data stripping to back-up a network
US5638509A (en)1994-06-101997-06-10Exabyte CorporationData storage and protection system
US5574906A (en)1994-10-241996-11-12International Business Machines CorporationSystem and method for reducing storage requirement in backup subsystems utilizing segmented compression and differencing
US5559957A (en)1995-05-311996-09-24Lucent Technologies Inc.File system for a data storage device having a power fail recovery mechanism for write/replace operations
US5734718A (en)*1995-07-051998-03-31Sun Microsystems, Inc.NIS+ password update protocol
US5699361A (en)1995-07-181997-12-16Industrial Technology Research InstituteMultimedia channel formulation mechanism
US5813009A (en)1995-07-281998-09-22Univirtual Corp.Computer based records management system method
JP3502200B2 (en)1995-08-302004-03-02株式会社日立製作所 Cryptographic communication system
US5619644A (en)1995-09-181997-04-08International Business Machines CorporationSoftware directed microcode state save for distributed storage controller
US5819020A (en)1995-10-161998-10-06Network Specialists, Inc.Real time backup system
US5778395A (en)1995-10-231998-07-07Stac, Inc.System for backing up files from disk volumes on multiple nodes of a computer network
US5761677A (en)1996-01-031998-06-02Sun Microsystems, Inc.Computer system method and apparatus providing for various versions of a file without requiring data copy or log operations
KR970076238A (en)1996-05-231997-12-12포만 제프리 엘 Servers, methods and program products thereof for creating and managing multiple copies of client data files
US5901327A (en)1996-05-281999-05-04Emc CorporationBundling of write data from channel commands in a command chain for transmission over a data link between data storage systems for remote data mirroring
US5812398A (en)1996-06-101998-09-22Sun Microsystems, Inc.Method and system for escrowed backup of hotelled world wide web sites
US5758359A (en)1996-10-241998-05-26Digital Equipment CorporationMethod and apparatus for performing retroactive backups in a computer system
US5875478A (en)1996-12-031999-02-23Emc CorporationComputer backup using a file system, network, disk, tape and remote archiving repository media system
US6131095A (en)1996-12-112000-10-10Hewlett-Packard CompanyMethod of accessing a target entity over a communications network
AU5929398A (en)1997-01-231998-08-18Overland Data, Inc.Virtual media library
US6658526B2 (en)1997-03-122003-12-02Storage Technology CorporationNetwork attached virtual data storage subsystem
US5924102A (en)1997-05-071999-07-13International Business Machines CorporationSystem and method for managing critical files
US6094416A (en)1997-05-092000-07-25I/O Control CorporationMulti-tier architecture for control network
US5887134A (en)1997-06-301999-03-23Sun MicrosystemsSystem and method for preserving message order while employing both programmed I/O and DMA operations
EP0899662A1 (en)1997-08-291999-03-03Hewlett-Packard CompanyBackup and restore system for a computer network
DE69802294T2 (en)1997-08-292002-05-16Hewlett-Packard Company, Palo Alto SYSTEMS FOR DATA BACKUP AND RECOVERY
US5950205A (en)1997-09-251999-09-07Cisco Technology, Inc.Data transmission over the internet using a cache memory file system
US6275953B1 (en)1997-09-262001-08-14Emc CorporationRecovery from failure of a data processor in a network server
US6052735A (en)1997-10-242000-04-18Microsoft CorporationElectronic mail object synchronization between a desktop computer and mobile device
US6021415A (en)1997-10-292000-02-01International Business Machines CorporationStorage management system with file aggregation and space reclamation within aggregated files
US7581077B2 (en)1997-10-302009-08-25Commvault Systems, Inc.Method and system for transferring data in a storage operation
US7209972B1 (en)1997-10-302007-04-24Commvault Systems, Inc.High speed data transfer mechanism
US6418478B1 (en)1997-10-302002-07-09Commvault Systems, Inc.Pipelined high speed data transfer mechanism
JPH11143754A (en)1997-11-051999-05-28Hitachi Ltd Version information / configuration information display method and apparatus, and computer-readable recording medium recording version information / configuration information display program
US6131190A (en)1997-12-182000-10-10Sidwell; Leland P.System for modifying JCL parameters to optimize data storage allocations
US6076148A (en)1997-12-262000-06-13Emc CorporationMass storage subsystem and backup arrangement for digital data processing system which permits information to be backed up while host computer(s) continue(s) operating in connection with information stored on mass storage subsystem
US6154787A (en)1998-01-212000-11-28Unisys CorporationGrouping shared resources into one or more pools and automatically re-assigning shared resources from where they are not currently needed to where they are needed
US6260069B1 (en)1998-02-102001-07-10International Business Machines CorporationDirect data retrieval in a distributed computing system
EP0945800B1 (en)1998-03-022003-07-16Hewlett-Packard Company, A Delaware CorporationData backup system
US6026414A (en)1998-03-052000-02-15International Business Machines CorporationSystem including a proxy client to backup files in a distributed computing environment
US7277941B2 (en)1998-03-112007-10-02Commvault Systems, Inc.System and method for providing encryption in a storage network by storing a secured encryption key with encrypted archive data in an archive storage device
US7739381B2 (en)1998-03-112010-06-15Commvault Systems, Inc.System and method for providing encryption in storage operations in a storage network, such as for use by application service providers that provide data storage services
US6161111A (en)1998-03-312000-12-12Emc CorporationSystem and method for performing file-handling operations in a digital data processing system using an operating system-independent file map
US6167402A (en)1998-04-272000-12-26Sun Microsystems, Inc.High performance message store
US6421711B1 (en)1998-06-292002-07-16Emc CorporationVirtual ports for data transferring of a data storage system
US6269431B1 (en)1998-08-132001-07-31Emc CorporationVirtual storage and block level direct access of secondary storage for recovery of backup data
GB2341249A (en)1998-08-172000-03-08Connected Place LimitedA method of generating a difference file defining differences between an updated file and a base file
US6487561B1 (en)1998-12-312002-11-26Emc CorporationApparatus and methods for copying, backing up, and restoring data using a backup segment size larger than the storage block size
US6212512B1 (en)1999-01-062001-04-03Hewlett-Packard CompanyIntegration of a database into file management software for protecting, tracking and retrieving data
US6324581B1 (en)1999-03-032001-11-27Emc CorporationFile server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems
US6973444B1 (en)*1999-03-272005-12-06Microsoft CorporationMethod for interdependently validating a digital content package and a corresponding digital license
US6389432B1 (en)1999-04-052002-05-14Auspex Systems, Inc.Intelligent virtual volume access
GB9913165D0 (en)*1999-06-081999-08-04Secr DefenceAccess control in a web environment
US6519679B2 (en)1999-06-112003-02-11Dell Usa, L.P.Policy based storage configuration
US7035880B1 (en)1999-07-142006-04-25Commvault Systems, Inc.Modular backup and retrieval system used in conjunction with a storage area network
US7395282B1 (en)1999-07-152008-07-01Commvault Systems, Inc.Hierarchical backup and retrieval system
US7389311B1 (en)1999-07-152008-06-17Commvault Systems, Inc.Modular backup and retrieval system
US6538669B1 (en)1999-07-152003-03-25Dell Products L.P.Graphical user interface for configuration of a storage system
US6496949B1 (en)1999-08-062002-12-17International Business Machines Corp.Emergency backup system, method and program product therefor
US6886098B1 (en)*1999-08-132005-04-26Microsoft CorporationSystems and methods for compression of key sets having multiple keys
US6343324B1 (en)1999-09-132002-01-29International Business Machines CorporationMethod and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices
SE9904094D0 (en)*1999-11-121999-11-12Protegrity Research & Dev Method for reencryption of a database
US6564228B1 (en)2000-01-142003-05-13Sun Microsystems, Inc.Method of enabling heterogeneous platforms to utilize a universal file system in a storage area network
US6542972B2 (en)2000-01-312003-04-01Commvault Systems, Inc.Logical view and access to physical storage in modular data and storage management system
US7003641B2 (en)2000-01-312006-02-21Commvault Systems, Inc.Logical view with granular access to exchange data managed by a modular data and storage management system
US6760723B2 (en)2000-01-312004-07-06Commvault Systems Inc.Storage management across multiple time zones
US6721767B2 (en)2000-01-312004-04-13Commvault Systems, Inc.Application specific rollback in a computer system
US6658436B2 (en)2000-01-312003-12-02Commvault Systems, Inc.Logical view and access to data managed by a modular data and storage management system
US6356801B1 (en)2000-05-192002-03-12International Business Machines CorporationHigh availability work queuing in an automated data storage library
CN100401667C (en)*2000-06-212008-07-09索尼公司 Information recording/reproducing device and method
US6330642B1 (en)2000-06-292001-12-11Bull Hn Informatin Systems Inc.Three interconnected raid disk controller data processing system architecture
US6959327B1 (en)2000-08-292005-10-25International Business Machines CorporationSystem and method for dispatching and scheduling network transmissions with feedback
US8972590B2 (en)*2000-09-142015-03-03Kirsten AldrichHighly accurate security and filtering software
US7120254B2 (en)2000-10-302006-10-10Geocodex LlcCryptographic system and method for geolocking and securing digital information
US20070079119A1 (en)*2000-11-162007-04-05Ulf MattssonEncryption key rotation
WO2002044970A1 (en)*2000-11-282002-06-06Sanyo Electric Co., Ltd.Data terminal for managing ciphered content data and license acquired by software
US20020071564A1 (en)*2000-12-112002-06-13Kurn David MichaelScalable computer system using password-based private key encryption
US7069433B1 (en)*2001-02-202006-06-27At&T Corp.Mobile host using a virtual single account client and server system for network access and management
CN100435161C (en)*2001-03-292008-11-19索尼公司Information processing appts
US7171557B2 (en)*2001-10-312007-01-30Hewlett-Packard Development Company, L.P.System for optimized key management with file groups
GB0129928D0 (en)2001-12-142002-02-06IbmMethod and apparatus for encryption of data
US7373364B1 (en)*2002-03-052008-05-13Network Appliance, Inc.System and method for creating a point-in-time restoration of a database file
CA2498174C (en)2002-09-092010-04-13Commvault Systems, Inc.Dynamic storage device pooling in a computer system
AU2003272457A1 (en)2002-09-162004-04-30Commvault Systems, Inc.System and method for blind media support
GB2409553B (en)2002-09-162007-04-04Commvault Systems IncSystem and method for optimizing storage operations
US8369525B2 (en)*2002-10-242013-02-05At&T Mobility Ii LlcDynamic password update for wireless encryption system
EP1558983A4 (en)*2002-10-252010-07-14Cambridge Interactive Dev CorpPassword encryption key
US7313238B2 (en)*2003-01-312007-12-25Hewlett-Packard Development Company, L.P.Method and system for relating cryptographic keys
US7596251B2 (en)2003-01-312009-09-29Nexus Biosystems, Inc.Automated sample analysis system and method
JP4517578B2 (en)2003-03-112010-08-04株式会社日立製作所 Peer-to-peer communication apparatus and communication method
JP4792196B2 (en)2003-03-272011-10-12三洋電機株式会社 Data input / output method, and storage device and host device capable of using the method
AU2004227949B9 (en)2003-04-032010-07-22Commvault Systems, Inc.System and method for dynamically performing storage operations in a computer network
JP4370800B2 (en)2003-04-212009-11-25ヤマハ株式会社 Music content utilization apparatus and program
US7454569B2 (en)2003-06-252008-11-18Commvault Systems, Inc.Hierarchical system and method for performing storage operations in a computer network
JP4085028B2 (en)2003-06-262008-04-30株式会社リコー Portable information recording medium, data recording method, data reproducing method, data recording program, and data reproducing program
US7697690B2 (en)*2003-07-212010-04-13Hewlett-Packard Development Company, L.P.Windowed backward key rotation
GB2404489A (en)*2003-07-312005-02-02Sony Uk LtdAccess control for digital storage medium content
GB2404538A (en)2003-07-312005-02-02Sony Uk LtdAccess control for digital content
US20050108526A1 (en)2003-08-112005-05-19Gavin RobertsonQuery server system security and privacy access profiles
US7631361B2 (en)*2003-08-202009-12-08Panasonic CorporationContent reproduction system
US7243234B2 (en)*2003-08-292007-07-10Motorola, Inc.Encryption key rekeying apparatus and method
US20050091535A1 (en)2003-10-242005-04-28Microsoft CorporationApplication identity for software products
WO2005050489A1 (en)2003-11-132005-06-02Commvault Systems, Inc.System and method for stored data archive verification
US7546324B2 (en)2003-11-132009-06-09Commvault Systems, Inc.Systems and methods for performing storage operations using network attached storage
US7613748B2 (en)2003-11-132009-11-03Commvault Systems, Inc.Stored data reverification management system and method
CA2544063C (en)2003-11-132013-09-10Commvault Systems, Inc.System and method for combining data streams in pilelined storage operations in a storage network
WO2005048085A2 (en)2003-11-132005-05-26Commvault Systems, Inc.System and method for performing an image level snapshot and for restoring partial volume data
US7162647B2 (en)*2004-03-112007-01-09Hitachi, Ltd.Method and apparatus for cryptographic conversion in a data storage system
JPWO2005101215A1 (en)*2004-04-142007-08-16松下電器産業株式会社 Terminal device and copyright protection system
WO2005109212A2 (en)2004-04-302005-11-17Commvault Systems, Inc.Hierarchical systems providing unified of storage information
US7480803B1 (en)2004-07-232009-01-20Sprint Communications Company L.P.System and method for securing system content by automated device authentication
JP4324053B2 (en)2004-08-162009-09-02キヤノン株式会社 Data communication apparatus, control method thereof, and program
JP2006094241A (en)2004-09-242006-04-06Fuji Xerox Co LtdEncryption apparatus, encryption processing method, program, and information protecting system using encryption apparatus
US7500053B1 (en)2004-11-052009-03-03Commvvault Systems, Inc.Method and system for grouping storage system components
US7536291B1 (en)2004-11-082009-05-19Commvault Systems, Inc.System and method to support simulated storage operations
US8775823B2 (en)2006-12-292014-07-08Commvault Systems, Inc.System and method for encrypting secondary copies of data
US7627776B2 (en)2004-11-162009-12-01Petruzzo Stephen EData backup method
US20060126831A1 (en)*2004-12-142006-06-15Cerruti Julian ASystems, methods, and media for adding an additional level of indirection to title key encryption
US20080288786A1 (en)*2004-12-202008-11-20Michael Stephen FiskeSystem with access keys
US20060136389A1 (en)*2004-12-222006-06-22Cover Clay HSystem and method for invocation of streaming application
US8045714B2 (en)*2005-02-072011-10-25Microsoft CorporationSystems and methods for managing multiple keys for file encryption and decryption
US20060242296A1 (en)2005-04-072006-10-26Woolard Leamon MMethod of adding new users to a web based portal server
WO2006109307A2 (en)*2005-04-132006-10-19Discretix Technologies Ltd.Method, device, and system of selectively accessing data
WO2006134269A1 (en)2005-06-142006-12-21Patrice GuichardData and a computer system protecting method and device
TWI268081B (en)*2005-06-242006-12-01Hitrust Com IncData-encrypting/decrypting method, data-saving media using the method, and data-encrypting/decrypting module
US8295492B2 (en)*2005-06-272012-10-23Wells Fargo Bank, N.A.Automated key management system
US8069256B2 (en)2005-08-232011-11-29Mehran Randall RastiSystem and method to curb identity theft
US7805600B2 (en)2005-09-152010-09-28Sas Institute Inc.Computer-implemented systems and methods for managing images
DE602006021217D1 (en)*2005-10-122011-05-19Datacastle Corp METHOD AND SYSTEM FOR DATA BACKUP
US20070124583A1 (en)*2005-11-252007-05-31Sony Ericsson Mobile Communications AbMethod for storing and transfer of rights objects between devices and device exploiting the method
US7668884B2 (en)2005-11-282010-02-23Commvault Systems, Inc.Systems and methods for classifying and transferring information in a storage network
US7636743B2 (en)2005-12-192009-12-22Commvault Systems, Inc.Pathname translation in a data replication system
US7651593B2 (en)2005-12-192010-01-26Commvault Systems, Inc.Systems and methods for performing data replication
US7620710B2 (en)2005-12-192009-11-17Commvault Systems, Inc.System and method for performing multi-path storage operations
US7543125B2 (en)2005-12-192009-06-02Commvault Systems, Inc.System and method for performing time-flexible calendric storage operations
US7617253B2 (en)2005-12-192009-11-10Commvault Systems, Inc.Destination systems and methods for performing data replication
US7606844B2 (en)2005-12-192009-10-20Commvault Systems, Inc.System and method for performing replication copy storage operations
EP1974296B8 (en)2005-12-192016-09-21Commvault Systems, Inc.Systems and methods for performing data replication
US7617262B2 (en)2005-12-192009-11-10Commvault Systems, Inc.Systems and methods for monitoring application data in a data replication system
US20080005380A1 (en)2006-02-212008-01-03Pacific Star Communications, Inc.Integrated configuration and management of hardware devices
US7506102B2 (en)2006-03-282009-03-17Cisco Technology, Inc.Method and apparatus for local access authorization of cached resources
WO2007117636A2 (en)2006-04-062007-10-18Smobile Systems, Inc.Malware detection system and method for comprssed data on mobile platforms
JP4787055B2 (en)2006-04-122011-10-05富士通株式会社 Information processing apparatus with information division recording function
US9002018B2 (en)*2006-05-092015-04-07Sync Up Technologies CorporationEncryption key exchange system and method
US8074078B2 (en)*2006-05-152011-12-06Research In Motion LimitedSystem and method for remote reset of password and encryption key
US7882077B2 (en)2006-10-172011-02-01Commvault Systems, Inc.Method and system for offline indexing of content and classifying stored data
US8655914B2 (en)2006-10-172014-02-18Commvault Systems, Inc.System and method for storage operation access security
WO2008070688A1 (en)2006-12-042008-06-12Commvault Systems, Inc.Systems and methods for creating copies of data, such as archive copies
US7734669B2 (en)2006-12-222010-06-08Commvault Systems, Inc.Managing copies of data
US7945586B1 (en)2007-03-292011-05-17Trend Micro IncorporatedMethods and apparatus to protect data
US8756673B2 (en)2007-03-302014-06-17Ricoh Company, Ltd.Techniques for sharing data
US8429424B2 (en)2007-04-202013-04-23Ca, Inc.Method and system for encrypting files based on security rules
US8429425B2 (en)*2007-06-082013-04-23Apple Inc.Electronic backup and restoration of encrypted data
EP2171856A4 (en)2007-07-192010-08-04Research In Motion LtdMethod and system for reducing contexts for context based compression systems
US7877602B2 (en)*2007-07-272011-01-25International Business Machines CorporationTransparent aware data transformation at file system level for efficient encryption and integrity validation of network files
US8396838B2 (en)*2007-10-172013-03-12Commvault Systems, Inc.Legal compliance, electronic discovery and electronic document handling of online and offline copies of data
US8494167B2 (en)*2007-10-302013-07-23International Business Machines CorporationMethod and apparatus for restoring encrypted files to an encrypting file system based on deprecated keystores
US8281145B2 (en)2007-12-142012-10-02Mehran Randall RastiDoing business without SSN, EIN, and charge card numbers
US9830278B1 (en)*2008-03-062017-11-28EMC IP Holding Company LLCTracking replica data using key management
US9098495B2 (en)2008-06-242015-08-04Commvault Systems, Inc.Application-aware and remote single instance data management
US8307177B2 (en)2008-09-052012-11-06Commvault Systems, Inc.Systems and methods for management of virtualization data
EP2330533B1 (en)*2008-09-242021-02-17Panasonic Intellectual Property Management Co., Ltd.Recording/reproducing system, recording medium device, and recording/reproducing device
US20100306176A1 (en)2009-01-282010-12-02Digitiliti, Inc.Deduplication of files
US8245037B1 (en)*2009-02-172012-08-14Amazon Technologies, Inc.Encryption key management
US8364984B2 (en)*2009-03-132013-01-29Microsoft CorporationPortable secure data files
US8799671B2 (en)*2009-05-062014-08-05Empire Technology Development LlcTechniques for detecting encrypted data
US8578120B2 (en)2009-05-222013-11-05Commvault Systems, Inc.Block-level single instancing
US8762348B2 (en)*2009-06-092014-06-24Emc CorporationSegment deduplication system with compression of segments
US8407190B2 (en)2009-06-302013-03-26Commvault Systems, Inc.Performing data storage operations with a cloud environment, including containerized deduplication, data pruning, and data transfer
US8306931B1 (en)2009-08-062012-11-06Data Fusion & Neural Networks, LLCDetecting, classifying, and tracking abnormal data in a data stream
US20110037766A1 (en)2009-08-172011-02-17Nexidia Inc.Cluster map display
US8190647B1 (en)2009-09-152012-05-29Symantec CorporationDecision tree induction that is sensitive to attribute computational complexity
US8281181B2 (en)*2009-09-302012-10-02Cleversafe, Inc.Method and apparatus for selectively active dispersed storage memory device utilization
CN101763397B (en)2009-12-232013-05-08中兴通讯股份有限公司Device and method for processing expanding information in image file
US8740625B2 (en)2009-12-312014-06-03Konica Minolta Laboratory U.S.A., Inc.Systems and methods for stochastic regression testing of page description language processors
US8520842B2 (en)2010-01-072013-08-27Microsoft CorporationMaintaining privacy during user profiling
US8401982B1 (en)2010-01-142013-03-19Symantec CorporationUsing sequencing and timing information of behavior events in machine learning to detect malware
US20110258461A1 (en)*2010-04-162011-10-20Twinstrata, IncSystem and method for resource sharing across multi-cloud arrays
GB201004449D0 (en)2010-02-222010-05-05Corbett SeanData accelerator
WO2011127440A2 (en)*2010-04-082011-10-13University Of Washington Through Its Center For CommercializationSystems and methods for file access auditing
US8555377B2 (en)*2010-04-292013-10-08High Cloud SecuritySecure virtual machine
US8751789B2 (en)*2010-09-172014-06-10International Business Machines CorporationGeneral purpose distributed encrypted file system
US8538912B2 (en)2010-09-222013-09-17Hewlett-Packard Development Company, L.P.Apparatus and method for an automatic information integration flow optimizer
US9244779B2 (en)2010-09-302016-01-26Commvault Systems, Inc.Data recovery operations, such as recovery from modified network data management protocol data
US8577851B2 (en)2010-09-302013-11-05Commvault Systems, Inc.Content aligned block-based deduplication
US8413244B1 (en)2010-11-112013-04-02Symantec CorporationUsing temporal attributes to detect malware
US20120150818A1 (en)2010-12-142012-06-14Commvault Systems, Inc.Client-side repository in a networked deduplicated storage system
US9020900B2 (en)2010-12-142015-04-28Commvault Systems, Inc.Distributed deduplicated storage system
US8751828B1 (en)*2010-12-232014-06-10Emc CorporationSharing encryption-related metadata between multiple layers in a storage I/O stack
US8538020B1 (en)2010-12-292013-09-17Amazon Technologies, Inc.Hybrid client-server cryptography for network applications
US8528099B2 (en)*2011-01-272013-09-03Oracle International CorporationPolicy based management of content rights in enterprise/cross enterprise collaboration
JP5002719B1 (en)*2011-03-102012-08-15株式会社東芝 Information processing device, external storage device, host device, relay device, control program, and information processing device control method
WO2012138804A2 (en)2011-04-042012-10-11Nextlabs, Inc.Protecting information using policies and encryption
EP2710510A4 (en)*2011-05-142015-05-06Bitcasa Inc CLOUD FILES SYSTEM WITH DEDUPLICATION SERVER SIDE OF INDEPENDENT USER INTEGRATED FILE FILES
US10387267B2 (en)*2011-06-082019-08-20International Business Machines CorporationFast copy using file system block mappings
US8751807B2 (en)*2011-06-232014-06-10Azuki Systems Inc.Method and system for secure over-the-top live video delivery
US8713314B2 (en)*2011-08-302014-04-29Comcast Cable Communications, LlcReoccuring keying system
US9094212B2 (en)2011-10-042015-07-28Microsoft Technology Licensing, LlcMulti-server authentication token data exchange
WO2013069770A1 (en)*2011-11-112013-05-16日本電気株式会社Database device, method and program
TW201344488A (en)2012-04-202013-11-01Hon Hai Prec Ind Co LtdMethod and system for protecting PHP program
US9141647B2 (en)*2012-04-262015-09-22Sap SeConfiguration protection for providing security to configuration files
US9218374B2 (en)*2012-06-132015-12-22Commvault Systems, Inc.Collaborative restore in a networked storage system
US20140053252A1 (en)2012-08-142014-02-20Opera Solutions, LlcSystem and Method for Secure Document Distribution
EP2891108A4 (en)2012-08-312016-11-30Pkware Inc SYSTEM AND METHODS FOR DATA VERIFICATION AND PROTECTION AGAINST REVERSE
US20150139559A1 (en)2012-09-142015-05-21Google Inc.System and method for shape clustering using hierarchical character classifiers
US9292688B2 (en)2012-09-262016-03-22Northrop Grumman Systems CorporationSystem and method for automated machine-learning, zero-day malware detection
US9185081B2 (en)2012-10-222015-11-10Symantec CorporationFormat friendly encryption
US8874908B2 (en)2012-11-072014-10-28Wolfgang RaudaschlProcess for storing data on a central server
US20140281518A1 (en)2013-03-122014-09-18Commvault Systems, Inc.Multi-tier file restoration
US9081978B1 (en)2013-05-302015-07-14Amazon Technologies, Inc.Storing tokenized information in untrusted environments
US9185087B2 (en)2013-10-242015-11-10Medtronic, Inc.Medical device communication using encryption based on correlated motion
US20150178660A1 (en)2013-12-192015-06-25Avaya Inc.System and method for automated optimization of operations in a contact center
US9208348B1 (en)*2014-01-152015-12-08Symantec CorporationSystems and methods for managing encrypted files within application packages
US9792447B2 (en)2014-06-302017-10-17Nicira, Inc.Method and apparatus for differently encrypting different flows
US9405928B2 (en)2014-09-172016-08-02Commvault Systems, Inc.Deriving encryption rules based on file content

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7171558B1 (en)*2000-09-222007-01-30International Business Machines CorporationTransparent digital rights management for extendible content viewers
US20030046572A1 (en)*2001-08-302003-03-06Newman Aaron CharlesCryptographic infrastructure for encrypting a database
US8140847B1 (en)*2007-09-182012-03-20Jianqing WuDigital safe

Cited By (19)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9411986B2 (en)2004-11-152016-08-09Commvault Systems, Inc.System and method for encrypting secondary copies of data
US9633232B2 (en)2004-11-152017-04-25Commvault Systems, Inc.System and method for encrypting secondary copies of data
US9990512B2 (en)2013-03-122018-06-05Commvault Systems, Inc.File backup with selective encryption
US9734348B2 (en)2013-03-122017-08-15Commvault Systems, Inc.Automatic file encryption
US9483655B2 (en)2013-03-122016-11-01Commvault Systems, Inc.File backup with selective encryption
US11928229B2 (en)2013-03-122024-03-12Commvault Systems, Inc.Automatic file encryption
US11042663B2 (en)2013-03-122021-06-22Commvault Systems, Inc.Automatic file encryption
US10445518B2 (en)2013-03-122019-10-15Commvault Systems, Inc.Automatic file encryption
US9367702B2 (en)2013-03-122016-06-14Commvault Systems, Inc.Automatic file encryption
US9984006B2 (en)2014-09-172018-05-29Commvault Systems, Inc.Data storage systems and methods
US9727491B2 (en)2014-09-172017-08-08Commvault Systems, Inc.Token-based encryption determination process
US9720849B2 (en)2014-09-172017-08-01Commvault Systems, Inc.Token-based encryption rule generation process
US9405928B2 (en)2014-09-172016-08-02Commvault Systems, Inc.Deriving encryption rules based on file content
US20160253529A1 (en)*2015-02-262016-09-01Whitecanyon Software, Inc.Selective Storage Device Wiping System and Method
US10445534B2 (en)2015-02-262019-10-15Whitecanyon Software, Inc.Selective storage device wiping system and method
US9665743B2 (en)*2015-02-262017-05-30Whitecanyon Software, Inc.Selective storage device wiping system and method
US9858427B2 (en)2016-02-262018-01-02International Business Machines CorporationEnd-to-end encryption and backup in data protection environments
US10121012B2 (en)2016-02-262018-11-06International Business Machines CorporationEnd-to-end encryption and backup in data protection environments
CN110692223A (en)*2017-07-142020-01-14日立数据管理有限公司Method, apparatus and system for controlling user access to a data storage system

Also Published As

Publication numberPublication date
US20140281514A1 (en)2014-09-18
US9990512B2 (en)2018-06-05
US20210271771A1 (en)2021-09-02
US20180107834A1 (en)2018-04-19
US9483655B2 (en)2016-11-01
US20190303606A1 (en)2019-10-03
US20140281515A1 (en)2014-09-18
US20140281517A1 (en)2014-09-18
US9367702B2 (en)2016-06-14
US20140281516A1 (en)2014-09-18
US20170116433A1 (en)2017-04-27
US20140281545A1 (en)2014-09-18
US10445518B2 (en)2019-10-15
US11928229B2 (en)2024-03-12
US9734348B2 (en)2017-08-15
US20240256694A1 (en)2024-08-01
US20170004320A1 (en)2017-01-05
US20140281518A1 (en)2014-09-18
US11042663B2 (en)2021-06-22

Similar Documents

PublicationPublication DateTitle
US11928229B2 (en)Automatic file encryption
US11500751B2 (en)Log monitoring
US20220155964A1 (en)Filtered reference copy of secondary storage data in a data storage system
US9984006B2 (en)Data storage systems and methods
US9928146B2 (en)Data storage system utilizing proxy device for storage operations
HK40035867A (en)Filtered reference copy of secondary storage data in a data storage system

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:COMMVAULT SYSTEMS, INC., NEW JERSEY

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:EROFEEV, ANDREI;PAWAR, RAHUL S.;REEL/FRAME:031735/0938

Effective date:20131115

ASAssignment

Owner name:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, NORTH CAROLINA

Free format text:SECURITY INTEREST;ASSIGNOR:COMMVAULT SYSTEMS, INC.;REEL/FRAME:033266/0678

Effective date:20140630

Owner name:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, NO

Free format text:SECURITY INTEREST;ASSIGNOR:COMMVAULT SYSTEMS, INC.;REEL/FRAME:033266/0678

Effective date:20140630

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:COMMVAULT SYSTEMS, INC., NEW JERSEY

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:054913/0905

Effective date:20180209


[8]ページ先頭

©2009-2025 Movatter.jp