Movatterモバイル変換


[0]ホーム

URL:


US20220292196A1 - Detecting ransomware in monitored data - Google Patents

Detecting ransomware in monitored data
Download PDF

Info

Publication number
US20220292196A1
US20220292196A1US17/242,656US202117242656AUS2022292196A1US 20220292196 A1US20220292196 A1US 20220292196A1US 202117242656 AUS202117242656 AUS 202117242656AUS 2022292196 A1US2022292196 A1US 2022292196A1
Authority
US
United States
Prior art keywords
data
computing device
client computing
file system
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/242,656
Inventor
Sri Karthik Bhagi
Pratima Laxman GADHAVE
Marcelo DOS REIS MANSANO
Mrityunjay UPADHYAY
PurnaChandra Sekhar BEDHAPUDI
Shyam Sundar Ramkumar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Commvault Systems Inc
Original Assignee
Commvault Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Commvault Systems IncfiledCriticalCommvault Systems Inc
Priority to US17/242,656priorityCriticalpatent/US20220292196A1/en
Assigned to JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENTreassignmentJPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENTSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: COMMVAULT SYSTEMS, INC.
Publication of US20220292196A1publicationCriticalpatent/US20220292196A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

An information management system includes one or more client computing devices in communication with a storage manager and a secondary storage computing device. The storage manager manages the primary data of the one or more client computing devices and the secondary storage computing device manages secondary copies of the primary data of the one or more client computing devices. Each client computing device may be configured with a ransomware protection monitoring application that monitors for changes in their primary data. The ransomware protection monitoring application may input the changes detected in the primary data into a machine-learning classifier, where the classifier generates an output indicative of whether a client computing device has been affected by malware and/or ransomware. Using a virtual machine host, a virtual machine copy of an affected client computing device may be instantiated using a secondary copy of primary data of the affected client computing device.

Description

Claims (20)

We claim:
1. A method for protecting file system data of a client computing device being managed by a storage manager, the method comprising:
training an anomaly detection model based on file system data obtained from one or more backup operations;
monitoring file system data of a client computing device being managed by a storage manager, wherein the client computing device is in communication with a secondary storage computing device for storing a secondary copy of data of the client computing device;
determining that there are one or more changes to the file system data of the client computing device;
providing the one or more changes of the file system data to the anomaly detection model to determine whether there is an anomaly in the file system data;
determining that there is an anomaly in the file system data based on the anomaly detection model; and,
generating a notification to a user that there is an anomaly in the file system data based on the determination that there is an anomaly in the file system data.
2. The method ofclaim 1, further comprising transmitting the notification to the user and providing a graphical user interface for viewing the determined anomaly in response to a selection of the generated notification.
3. The method ofclaim 1, wherein the graphical user interface displays:
an activity summary of the file system data based on the determined anomaly;
a type of the determined anomaly in the activity summary; and,
a detected time when the determined anomaly was detected.
4. The method ofclaim 1, further comprising:
displaying at least one file system directory based on the determined anomaly in the file system data;
displaying at least one option to restore a prior version of the at least one file system directory stored as a secondary copy managed by the secondary storage computing device;
receiving an input of the at least one option to restore to the prior version; and,
restoring the prior version of the at least one file system directory to the client computing device.
5. The method ofclaim 1, further comprising:
displaying an identifier representing the client computing device in the graphical user interface based on the determined anomaly in the file system data with at least one option to create a virtual machine copy of the client computing device;
receiving an input of the at least one option to create the virtual machine copy of the client computing device; and,
creating the virtual machine copy of the client computing device.
6. The method ofclaim 1, further comprising:
determining a backup copy of the client computing device to use in creating a virtual machine copy of the client computing device, wherein:
the backup copy is stored as a secondary copy managed by the secondary storage computing device,
the determined backup copy originated from the client computing device prior to the detected anomaly in the file system data, and,
creating the virtual machine copy of the client computing device comprises creating the virtual machine copy from the determined backup copy.
7. The method ofclaim 1, further comprising displaying a geographic location of the client computing device having the detected anomaly in the file system data on a geographic map displayed by the graphical user interface.
8. A system for protecting file system data of a client computing device, the system comprising:
one or more non-transitory, computer-readable mediums having computer-executable instructions stored thereon; and,
one or more processors that, having executed the computer-executable instructions, configures the system to perform a plurality of operations comprising:
training an anomaly detection model based on file system data obtained from one or more backup operations;
monitoring file system data of a client computing device being managed by a storage manager, wherein the client computing device is in communication with a secondary storage computing device for storing a secondary copy of data of the client computing device;
determining that there are one or more changes to the file system data of the client computing device;
providing the one or more changes of the file system data to the anomaly detection model to determine whether there is an anomaly in the file system data;
determining that there is an anomaly in the file system data based on the anomaly detection model; and,
generating a notification to a user that there is an anomaly in the file system data based on the determination that there is an anomaly in the file system data.
9. The system ofclaim 8, wherein the plurality of operations further includes transmitting the notification to the user and providing a graphical user interface for viewing the determined anomaly in response to a selection of the generated notification.
10. The system ofclaim 8, wherein the graphical user interface displays:
an activity summary of the file system data based on the determined anomaly;
a type of the determined anomaly in the activity summary; and,
a detected time when the determined anomaly was detected.
11. The system ofclaim 8, wherein the plurality of operations further includes:
displaying at least one file system directory based on the determined anomaly in the file system data;
displaying at least one option to restore a prior version of the at least one file system directory stored as a secondary copy managed by the secondary storage computing device;
receiving an input of the at least one option to restore to the prior version; and,
restoring the prior version of the at least one file system directory to the client computing device.
12. The system ofclaim 8, wherein the plurality of operations further includes:
displaying an identifier representing the client computing device in the graphical user interface based on the determined anomaly in the file system data with at least one option to create a virtual machine copy of the client computing device;
receiving an input of the at least one option to create the virtual machine copy of the client computing device; and,
creating the virtual machine copy of the client computing device.
13. The system ofclaim 8, wherein the plurality of operations further includes:
determining a backup copy of the client computing device to use in creating a virtual machine copy of the client computing device, wherein:
the backup copy is stored as a secondary copy managed by the secondary storage computing device,
the determined backup copy originated from the client computing device prior to the detected anomaly in the file system data, and
creating the virtual machine copy of the client computing device comprises creating the virtual machine copy from the determined backup copy.
14. The system ofclaim 8, wherein the plurality of operations further includes displaying a geographic location of the client computing device having the detected anomaly in the file system data on a geographic map displayed by the graphical user interface.
15. A non-transitory, computer-readable medium having computer-executable instructions stored that, when executed by one or more processors, configures a system to perform a plurality of operations that comprises:
training an anomaly detection model based on file system data obtained from one or more backup operations;
monitoring file system data of a client computing device being managed by a storage manager, wherein the client computing device is in communication with a secondary storage computing device for storing a secondary copy of data of the client computing device;
determining that there are one or more changes to the file system data of the client computing device;
providing the one or more changes of the file system data to the anomaly detection model to determine whether there is an anomaly in the file system data;
determining that there is an anomaly in the file system data based on the anomaly detection model; and,
generating a notification to a user that there is an anomaly in the file system data based on the determination that there is an anomaly in the file system data.
16. The non-transitory, computer-readable medium ofclaim 15, wherein the plurality of operations further comprises transmitting the notification to the user and providing a graphical user interface for viewing the determined anomaly in response to a selection of the generated notification.
17. The non-transitory, computer-readable medium ofclaim 15, wherein the graphical user interface displays:
an activity summary of the file system data based on the determined anomaly;
a type of the determined anomaly in the activity summary; and,
a detected time when the determined anomaly was detected.
18. The non-transitory, computer-readable medium ofclaim 15, wherein the plurality of operations further comprises:
displaying at least one file system directory based on the determined anomaly in the file system data;
displaying at least one option to restore a prior version of the at least one file system directory stored as a secondary copy managed by the secondary storage computing device; and,
receiving an input of the at least one option to restore to the prior version, and restoring the prior version of the at least one file system directory to the client computing device.
19. The non-transitory, computer-readable medium ofclaim 15, wherein the plurality of operations further comprises:
displaying an identifier representing the client computing device in the graphical user interface based on the determined anomaly in the file system data with at least one option to create a virtual machine copy of the client computing device;
receiving an input of the at least one option to create the virtual machine copy of the client computing device; and,
creating the virtual machine copy of the client computing device.
20. The non-transitory, computer-readable medium ofclaim 15, wherein the plurality of operations further comprises:
determining a backup copy of the client computing device to use in creating a virtual machine copy of the client computing device, wherein:
the backup copy is stored as a secondary copy managed by the secondary storage computing device,
the determined backup copy originated from the client computing device prior to the detected anomaly in the file system data, and
creating the virtual machine copy of the client computing device comprises creating the virtual machine copy from the determined backup copy.
US17/242,6562021-03-122021-04-28Detecting ransomware in monitored dataAbandonedUS20220292196A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/242,656US20220292196A1 (en)2021-03-122021-04-28Detecting ransomware in monitored data

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US202163160636P2021-03-122021-03-12
US202163160459P2021-03-122021-03-12
US17/242,656US20220292196A1 (en)2021-03-122021-04-28Detecting ransomware in monitored data

Publications (1)

Publication NumberPublication Date
US20220292196A1true US20220292196A1 (en)2022-09-15

Family

ID=83193912

Family Applications (5)

Application NumberTitlePriority DateFiling Date
US17/233,230ActiveUS11574050B2 (en)2021-03-122021-04-16Media agent hardening against ransomware attacks
US17/243,188Active2041-11-23US12026252B2 (en)2021-03-122021-04-28Detecting ransomware in secondary copies of client computing devices
US17/242,656AbandonedUS20220292196A1 (en)2021-03-122021-04-28Detecting ransomware in monitored data
US18/443,896ActiveUS12333007B2 (en)2021-03-122024-02-16Detecting ransomware in monitored data
US19/207,599PendingUS20250272394A1 (en)2021-03-122025-05-14Detecting ransomware in monitored data

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US17/233,230ActiveUS11574050B2 (en)2021-03-122021-04-16Media agent hardening against ransomware attacks
US17/243,188Active2041-11-23US12026252B2 (en)2021-03-122021-04-28Detecting ransomware in secondary copies of client computing devices

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US18/443,896ActiveUS12333007B2 (en)2021-03-122024-02-16Detecting ransomware in monitored data
US19/207,599PendingUS20250272394A1 (en)2021-03-122025-05-14Detecting ransomware in monitored data

Country Status (1)

CountryLink
US (5)US11574050B2 (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20220292188A1 (en)*2021-03-122022-09-15Commvault Systems, Inc.Detecting ransomware in secondary copies of client computing devices
US20220358235A1 (en)*2021-05-052022-11-10EMC IP Holding Company LLCAccess Control of Protected Data Using Storage System-Based Multi-Factor Authentication
US20220398169A1 (en)*2021-06-112022-12-15Qnap Systems, Inc.Method, system and computer-readable medium for synthetic incremental data backup
US20230022044A1 (en)*2021-07-212023-01-26Certo Software LimitedANALYSIS DEVICE, AND METHOD FOR DETECTING MALWARE IN AN iOS DEVICE
US20230021309A1 (en)*2021-07-232023-01-26Backoffice Associates, LlcStoring Versions of Data Assets in Knowledge Graphs
US20230033253A1 (en)*2020-06-092023-02-02China National Digital Switching System Engineering & Technological R&D CenterNetwork security defense method and related device applied to network security defense system
US20230107209A1 (en)*2021-10-062023-04-06AVAST Software s.r.o.Reducing malware signature redundancy
US20230169166A1 (en)*2021-12-012023-06-01Dell Products L.P.System and method for monitoring and detecting of encryption based threats
US20230297681A1 (en)*2022-03-162023-09-21Bank Of America CorporationSystem and Method for Automatic Identification of Unauthorized Updates to Internet of Things Devices
US20240004993A1 (en)*2022-06-292024-01-04International Business Machines CorporationMalware detection in containerized environments
US20240070034A1 (en)*2022-08-312024-02-29Cohesity, Inc.Fortified backup of anomaly detection
US12058169B1 (en)2021-12-102024-08-06Amazon Technologies, Inc.Automated ransomware recovery using log-structured storage
US12086250B1 (en)*2021-12-102024-09-10Amazon Technologies, Inc.Detecting anomalous I/O patterns indicative of ransomware attacks
US12093386B2 (en)2017-09-142024-09-17Commvault Systems, Inc.Ransomware detection and data pruning management
US20240419797A1 (en)*2021-10-282024-12-19Imanage LlcRansomware detection and mitigation
US12197578B1 (en)2021-12-102025-01-14Amazon Technologies, Inc.Automated virtualized storage snapshotting responsive to ransomware detection
US12229249B1 (en)*2022-05-172025-02-18Deloitte Development LlcProtection of process memory against foreign code injection
US12229298B2 (en)*2023-03-102025-02-18Dell Products L.P.Method and system for generating an automatic service request based on metadata
US12259977B2 (en)2021-11-152025-03-25Commvault Systems, Inc.Entropy-based ransomware detection
US12292974B2 (en)2022-10-272025-05-06Commvault Systems, Inc.Analysis of backup copies to identify malware-encrypted primary data
US12292991B2 (en)*2023-03-102025-05-06Dell Products L.P.Method and system for reconfiguring a data protection module based on metadata
US12346214B2 (en)*2023-09-292025-07-01Dell Products L.P.Generating data block mapping in incremental image backups for post processing
US12381912B2 (en)*2023-04-042025-08-05Dell Products L.P.Vault overwriting after PLC (protection lifecycle) designation disallowance by transmission to public vault
US12417284B2 (en)*2023-01-202025-09-16Dell Products L.P.System and method for software-defined network attached storage (SDNAS) ransomware attack detection and prevention

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20230141909A1 (en)*2021-11-102023-05-11Accenture Global Solutions LimitedSecure data backup and recovery from cyberattacks
US12008135B2 (en)*2021-12-212024-06-11Commvault Systems, Inc.Controlling information privacy in a shared data storage management system
US12255769B2 (en)*2022-07-282025-03-18Nutanix, Inc.Disaster recovery pipeline for block storage and dependent applications
US12437064B2 (en)*2023-03-242025-10-07Dell Products L.P.Ransomware detection using inode traversal scoring
CN117709899B (en)*2023-12-282024-06-25云融会展(上海)有限公司Exhibition information management method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20160299934A1 (en)*2015-04-092016-10-13Commvault Systems, Inc.Management of log data
US20190138727A1 (en)*2017-11-072019-05-09Spinbackup Inc.Ransomware Protection for Cloud Storage Systems
US20220019385A1 (en)*2019-07-182022-01-20Pure Storage, Inc.Creating a virtual storage system
US11574050B2 (en)*2021-03-122023-02-07Commvault Systems, Inc.Media agent hardening against ransomware attacks
US11625481B2 (en)*2019-11-222023-04-11Pure Storage, Inc.Selective throttling of operations potentially related to a security threat to a storage system

Family Cites Families (221)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4267568A (en)1975-12-031981-05-12System Development CorporationInformation storage and retrieval system
US4084231A (en)1975-12-181978-04-11International Business Machines CorporationSystem for facilitating the copying back of data in disc and tape units of a memory hierarchial system
GB2035014B (en)1978-11-061982-09-29British Broadcasting CorpCyclic redundancy data check encoding method and apparatus
US4417321A (en)1981-05-181983-11-22International Business Machines Corp.Qualifying and sorting file record data
US4641274A (en)1982-12-031987-02-03International Business Machines CorporationMethod for communicating changes made to text form a text processor to a remote host
JPS59160899A (en)1982-12-091984-09-11セコイア・システムス・インコ−ポレ−テツドMemory backup system
US4686620A (en)1984-07-261987-08-11American Telephone And Telegraph Company, At&T Bell LaboratoriesDatabase backup method
US4827400A (en)1986-04-071989-05-02Honeywell Bull Inc.Segment descriptor present bit recycle and detect logic for a memory management unit
GB8622010D0 (en)1986-09-121986-10-22Hewlett Packard LtdFile backup facility
US5193154A (en)1987-07-101993-03-09Hitachi, Ltd.Buffered peripheral system and method for backing up and retrieving data to and from backup memory device
US5005122A (en)1987-09-081991-04-02Digital Equipment CorporationArrangement with cooperating management server node and network service node
KR890007306A (en)1987-10-301989-06-19제트.엘.더머 Online valve diagnostic monitoring system
JPH0743676B2 (en)1988-03-111995-05-15株式会社日立製作所 Back-up data dump control method and device
US4912637A (en)1988-04-261990-03-27Tandem Computers IncorporatedVersion management tool
US4995035A (en)1988-10-311991-02-19International Business Machines CorporationCentralized management in a computer network
US5093912A (en)1989-06-261992-03-03International Business Machines CorporationDynamic resource pool expansion and contraction in multiprocessing environments
EP0405926B1 (en)1989-06-301996-12-04Digital Equipment CorporationMethod and apparatus for managing a shadow set of storage media
US5454099A (en)1989-07-251995-09-26International Business Machines CorporationCPU implemented method for backing up modified data sets in non-volatile store for recovery in the event of CPU failure
US5133065A (en)1989-07-271992-07-21Personal Computer Peripherals CorporationBackup computer program for networks
US5321816A (en)1989-10-101994-06-14Unisys CorporationLocal-remote apparatus with specialized image storage modules
US5276860A (en)1989-12-191994-01-04Epoch Systems, Inc.Digital data processor with improved backup storage
US5276867A (en)1989-12-191994-01-04Epoch Systems, Inc.Digital data storage system with improved data migration
JPH0410041A (en)1990-04-271992-01-14Toshiba CorpData saving system
GB2246218B (en)1990-07-181994-02-09Stc PlcDistributed data processing systems
US5239647A (en)1990-09-071993-08-24International Business Machines CorporationData storage hierarchy with shared storage level
US5301286A (en)1991-01-021994-04-05At&T Bell LaboratoriesMemory archiving indexing arrangement
US5212772A (en)1991-02-111993-05-18Gigatrend IncorporatedSystem for storing data in backup tape device
US5287500A (en)1991-06-031994-02-15Digital Equipment CorporationSystem for allocating storage spaces based upon required and optional service attributes having assigned piorities
US5347653A (en)1991-06-281994-09-13Digital Equipment CorporationSystem for reconstructing prior versions of indexes using records indicating changes between successive versions of the indexes
US5410700A (en)1991-09-041995-04-25International Business Machines CorporationComputer system which supports asynchronous commitment of data
EP0541281B1 (en)1991-11-041998-04-29Commvault Systems, Inc.Incremental-computer-file backup using signatures
US5241670A (en)1992-04-201993-08-31International Business Machines CorporationMethod and system for automated backup copy ordering in a time zero backup copy session
US5241668A (en)1992-04-201993-08-31International Business Machines CorporationMethod and system for automated termination and resumption in a time zero backup copy process
US5410295A (en)1992-07-221995-04-25Ici Americas Inc.Anti-theft system for currency stored in a vault
US5642496A (en)1993-09-231997-06-24Kanfi; ArnonMethod of making a backup copy of a memory over a plurality of copying sessions
EP0728333A1 (en)1993-11-091996-08-28Arcada SoftwareData backup and restore system for a computer network
US5734817A (en)1995-03-011998-03-31Unisys CorporationMethod for making a data base available to a user program during data base recovery
US5778395A (en)1995-10-231998-07-07Stac, Inc.System for backing up files from disk volumes on multiple nodes of a computer network
KR970076238A (en)1996-05-231997-12-12포만 제프리 엘 Servers, methods and program products thereof for creating and managing multiple copies of client data files
US5781703A (en)1996-09-061998-07-14Candle Distributed Solutions, Inc.Intelligent remote agent for computer performance monitoring
US6073172A (en)1997-07-142000-06-06Freegate CorporationInitializing and reconfiguring a secure network interface
DE69802294T2 (en)1997-08-292002-05-16Hewlett-Packard Company, Palo Alto SYSTEMS FOR DATA BACKUP AND RECOVERY
EP0899662A1 (en)1997-08-291999-03-03Hewlett-Packard CompanyBackup and restore system for a computer network
US6418478B1 (en)1997-10-302002-07-09Commvault Systems, Inc.Pipelined high speed data transfer mechanism
GB2341249A (en)1998-08-172000-03-08Connected Place LimitedA method of generating a difference file defining differences between an updated file and a base file
US6959368B1 (en)1999-06-292005-10-25Emc CorporationMethod and apparatus for duplicating computer backup data
US7035880B1 (en)1999-07-142006-04-25Commvault Systems, Inc.Modular backup and retrieval system used in conjunction with a storage area network
US7389311B1 (en)1999-07-152008-06-17Commvault Systems, Inc.Modular backup and retrieval system
US7395282B1 (en)1999-07-152008-07-01Commvault Systems, Inc.Hierarchical backup and retrieval system
US7003641B2 (en)2000-01-312006-02-21Commvault Systems, Inc.Logical view with granular access to exchange data managed by a modular data and storage management system
US6721767B2 (en)2000-01-312004-04-13Commvault Systems, Inc.Application specific rollback in a computer system
US6760723B2 (en)2000-01-312004-07-06Commvault Systems Inc.Storage management across multiple time zones
US6658436B2 (en)2000-01-312003-12-02Commvault Systems, Inc.Logical view and access to data managed by a modular data and storage management system
US6542972B2 (en)2000-01-312003-04-01Commvault Systems, Inc.Logical view and access to physical storage in modular data and storage management system
US6795856B1 (en)2000-06-282004-09-21Accountability International, Inc.System and method for monitoring the internet access of a computer
US20020186131A1 (en)2001-04-032002-12-12Brad FettisCard security device
US7107298B2 (en)2001-09-282006-09-12Commvault Systems, Inc.System and method for archiving objects in an information store
US9092788B2 (en)2002-03-072015-07-28Compete, Inc.System and method of collecting and analyzing clickstream data
US8910241B2 (en)2002-04-252014-12-09Citrix Systems, Inc.Computer security system
US7020798B2 (en)*2002-06-272006-03-28Microsoft CorporationDetecting low-level data corruption
CA2498174C (en)2002-09-092010-04-13Commvault Systems, Inc.Dynamic storage device pooling in a computer system
AU2003272457A1 (en)2002-09-162004-04-30Commvault Systems, Inc.System and method for blind media support
GB2409553B (en)2002-09-162007-04-04Commvault Systems IncSystem and method for optimizing storage operations
US20040187029A1 (en)2003-03-212004-09-23Ting David M. T.System and method for data and request filtering
AU2004227949B9 (en)2003-04-032010-07-22Commvault Systems, Inc.System and method for dynamically performing storage operations in a computer network
US7454569B2 (en)2003-06-252008-11-18Commvault Systems, Inc.Hierarchical system and method for performing storage operations in a computer network
US7107416B2 (en)2003-09-082006-09-12International Business Machines CorporationMethod, system, and program for implementing retention policies to archive records
US8077341B2 (en)2003-09-252011-12-13Ricoh Co., Ltd.Printer with audio or video receiver, recorder, and real-time content-based processing logic
WO2005050489A1 (en)2003-11-132005-06-02Commvault Systems, Inc.System and method for stored data archive verification
US7546324B2 (en)2003-11-132009-06-09Commvault Systems, Inc.Systems and methods for performing storage operations using network attached storage
CA2544063C (en)2003-11-132013-09-10Commvault Systems, Inc.System and method for combining data streams in pilelined storage operations in a storage network
WO2005048085A2 (en)2003-11-132005-05-26Commvault Systems, Inc.System and method for performing an image level snapshot and for restoring partial volume data
US7213176B2 (en)2003-12-102007-05-01Electronic Data Systems CorporationAdaptive log file scanning utility
US20050138642A1 (en)2003-12-182005-06-23International Business Machines CorporationEvent correlation system and method for monitoring resources
US7194451B2 (en)2004-02-262007-03-20Microsoft CorporationDatabase monitoring system
US7779021B1 (en)2004-03-092010-08-17Versata Development Group, Inc.Session-based processing method and system
WO2005109212A2 (en)2004-04-302005-11-17Commvault Systems, Inc.Hierarchical systems providing unified of storage information
GB2416879B (en)2004-08-072007-04-04Surfcontrol PlcDevice resource access filtering system and method
US7483918B2 (en)2004-08-102009-01-27Microsoft CorporationDynamic physical database design
US7373554B2 (en)2004-09-242008-05-13Oracle International CorporationTechniques for automatic software error diagnostics and correction
US7500053B1 (en)2004-11-052009-03-03Commvvault Systems, Inc.Method and system for grouping storage system components
US7536291B1 (en)2004-11-082009-05-19Commvault Systems, Inc.System and method to support simulated storage operations
US8959299B2 (en)2004-11-152015-02-17Commvault Systems, Inc.Using a snapshot as a data source
EP1684151A1 (en)*2005-01-202006-07-26Grant Rothwell WilliamComputer protection against malware affection
US8527468B1 (en)2005-02-082013-09-03Renew Data Corp.System and method for management of retention periods for content in a computing system
US7895167B2 (en)2005-02-162011-02-22Xpolog Ltd.System and method for analysis and management of logs and events
US7676845B2 (en)*2005-03-242010-03-09Microsoft CorporationSystem and method of selectively scanning a file on a computing device for malware
US7668884B2 (en)2005-11-282010-02-23Commvault Systems, Inc.Systems and methods for classifying and transferring information in a storage network
WO2007069338A1 (en)2005-12-152007-06-21Netstar, Inc.Web access monitoring method and its program
US7617253B2 (en)2005-12-192009-11-10Commvault Systems, Inc.Destination systems and methods for performing data replication
US7617262B2 (en)2005-12-192009-11-10Commvault Systems, Inc.Systems and methods for monitoring application data in a data replication system
US7651593B2 (en)2005-12-192010-01-26Commvault Systems, Inc.Systems and methods for performing data replication
US7606844B2 (en)2005-12-192009-10-20Commvault Systems, Inc.System and method for performing replication copy storage operations
US7620710B2 (en)2005-12-192009-11-17Commvault Systems, Inc.System and method for performing multi-path storage operations
US7543125B2 (en)2005-12-192009-06-02Commvault Systems, Inc.System and method for performing time-flexible calendric storage operations
EP1974296B8 (en)2005-12-192016-09-21Commvault Systems, Inc.Systems and methods for performing data replication
US7636743B2 (en)2005-12-192009-12-22Commvault Systems, Inc.Pathname translation in a data replication system
US20070220602A1 (en)2006-01-062007-09-20Ray RicksMethods and Systems for Comprehensive Management of Internet and Computer Network Security Threats
GB2434461A (en)2006-01-242007-07-25Hawkgrove LtdSystem for monitoring the performance of the components of a software system by detecting the messages between the components and decoding them
US20080022209A1 (en)2006-07-192008-01-24Lyle Ruthie DDynamically controlling content and flow of an electronic meeting
US7882077B2 (en)2006-10-172011-02-01Commvault Systems, Inc.Method and system for offline indexing of content and classifying stored data
US7734669B2 (en)2006-12-222010-06-08Commvault Systems, Inc.Managing copies of data
US7835348B2 (en)2006-12-302010-11-16Extreme Networks, Inc.Method and apparatus for dynamic anomaly-based updates to traffic selection policies in a switch
US20080228998A1 (en)2007-03-162008-09-18Spansion LlcMemory storage via an internal compression algorithm
US20080243882A1 (en)2007-03-272008-10-02International Business Machines CorporationUpdating of link to data repository
US20080300900A1 (en)2007-05-312008-12-04Marc DemarestSystems and methods for distributed sequestration in electronic evidence management
US20090038010A1 (en)2007-07-312009-02-05Microsoft CorporationMonitoring and controlling an automation process
US7975262B2 (en)2007-08-162011-07-05Microsoft CorporationError tracing with context history
US8396838B2 (en)2007-10-172013-03-12Commvault Systems, Inc.Legal compliance, electronic discovery and electronic document handling of online and offline copies of data
US8407673B2 (en)2007-11-272013-03-26International Business Machines CorporationTrace log rule parsing
US7502972B1 (en)2008-03-162009-03-10International Business Machines CorporationReducing log entries using hash keys
US9401839B2 (en)2008-04-042016-07-26Schweitzer Engineering Laboratories, Inc.Generation and control of network events and conversion to SCADA protocol data types
US20090276205A1 (en)2008-05-022009-11-05Jennings Andrew TStablizing operation of an emulated system
US9098495B2 (en)2008-06-242015-08-04Commvault Systems, Inc.Application-aware and remote single instance data management
US20090328119A1 (en)2008-06-252009-12-31Alcatel LucentPacket Recovery Server Based Triggering Mechanism for IPTV Diagnostics
US8307177B2 (en)2008-09-052012-11-06Commvault Systems, Inc.Systems and methods for management of virtualization data
GB0816556D0 (en)2008-09-102008-10-15Univ NapierImprovements in or relating to digital forensics
US8966055B2 (en)2008-11-142015-02-24Qualcomm IncorporatedSystem and method for facilitating capacity monitoring and recommending action for wireless networks
US20100125554A1 (en)2008-11-182010-05-20Unisys CorporationMemory Recovery Across Reboots of an Emulated Operating System
EP2189895A1 (en)2008-11-242010-05-26Deutsche Thomson OHGFlash based memory comprising a Flash translation layer and method for storing a file therein
US8396904B2 (en)2009-01-202013-03-12Clausal Computing OyUtilizing information from garbage collector in serialization of large cyclic data structures
US9391825B1 (en)2009-03-242016-07-12Amazon Technologies, Inc.System and method for tracking service results
US8578120B2 (en)2009-05-222013-11-05Commvault Systems, Inc.Block-level single instancing
US8407190B2 (en)2009-06-302013-03-26Commvault Systems, Inc.Performing data storage operations with a cloud environment, including containerized deduplication, data pruning, and data transfer
US8266159B2 (en)2009-08-182012-09-11Benchworkzz, LLCSystem and method for providing access to log data files
US8595191B2 (en)2009-12-312013-11-26Commvault Systems, Inc.Systems and methods for performing data management operations using snapshots
US8566943B2 (en)2009-10-012013-10-22Kaspersky Lab, ZaoAsynchronous processing of events for malware detection
US8359313B2 (en)2009-10-202013-01-22Google Inc.Extensible custom variables for tracking user traffic
US20150213484A1 (en)2010-03-222015-07-30Ashok AmaraSystem and method for tracking related events
FI20105541A0 (en)2010-05-182010-05-18Vibsolas Oy Control module, system and method
US8548944B2 (en)2010-07-152013-10-01Delphix Corp.De-duplication based backup of file systems
US9244779B2 (en)2010-09-302016-01-26Commvault Systems, Inc.Data recovery operations, such as recovery from modified network data management protocol data
US8572340B2 (en)2010-09-302013-10-29Commvault Systems, Inc.Systems and methods for retaining and using data block signatures in data protection operations
US8577851B2 (en)2010-09-302013-11-05Commvault Systems, Inc.Content aligned block-based deduplication
US8922658B2 (en)2010-11-052014-12-30Tom GalvinNetwork video recorder system
US8495060B1 (en)2010-12-072013-07-23Trend Micro, Inc.Prioritization of reports using content data change from baseline
US8601323B2 (en)2010-12-132013-12-03Sap AgAdvanced management of runtime errors
US9020900B2 (en)2010-12-142015-04-28Commvault Systems, Inc.Distributed deduplicated storage system
US20120150818A1 (en)2010-12-142012-06-14Commvault Systems, Inc.Client-side repository in a networked deduplicated storage system
CN102541482B (en)2010-12-272015-01-21北大方正集团有限公司Method and system for document printing control and document tracing
US9098294B2 (en)2010-12-312015-08-04Verizon Patent And Licensing Inc.Building block based graphical user interface design and development systems and methods
US8732300B2 (en)2011-01-102014-05-20International Business Machines CorporationApplication monitoring in a stream database environment
KR101534995B1 (en)2011-02-052015-07-07애플 인크.Method and apparatus for mobile location determination
US20120203895A1 (en)2011-02-082012-08-09AventuraHQ, Inc.Trending Engine for Virtual Computing Environment
US20120278354A1 (en)2011-04-292012-11-01Microsoft CorporationUser analysis through user log feature extraction
US9229818B2 (en)2011-07-202016-01-05Microsoft Technology Licensing, LlcAdaptive retention for backup data
US20130054635A1 (en)2011-08-302013-02-28Verizon Patent And Licensing Inc.Procuring communication session records
US9466086B2 (en)2011-09-222016-10-11Genband Us LlcMethods, systems, and computer readable media for affecting user associations in over the top (OTT) service platforms
US20130227352A1 (en)2012-02-242013-08-29Commvault Systems, Inc.Log monitoring
US9262449B2 (en)2012-03-082016-02-16Commvault Systems, Inc.Automated, tiered data retention
US8874967B2 (en)2012-03-302014-10-28Ncr CorporationManaging code-tracing data
US9189170B2 (en)2012-06-122015-11-17Commvault Systems, Inc.External storage manager for a data storage cell
US8904243B2 (en)2012-06-292014-12-02Sap SeEvent management systems and methods
US20140025796A1 (en)2012-07-192014-01-23Commvault Systems, Inc.Automated grouping of computing devices in a networked data storage system
US20150242483A1 (en)2012-08-032015-08-27Syddansk UniversitetElastic execution of continuous mapreduce jobs over data streams
US9424271B2 (en)2012-08-302016-08-23International Business Machines CorporationAtomic incremental load for map-reduce systems on append-only file systems
US9542400B2 (en)2012-09-072017-01-10Oracle International CorporationService archive support
US20190205317A1 (en)2012-10-302019-07-04FHOOSH, Inc.Systems and methods for secure storage and retrieval of data objects
US20170277774A1 (en)2012-10-302017-09-28FHOOSH, Inc.Systems and methods for secure storage of user information in a user profile
US8931101B2 (en)2012-11-142015-01-06International Business Machines CorporationApplication-level anomaly detection
US9665591B2 (en)2013-01-112017-05-30Commvault Systems, Inc.High availability distributed deduplicated storage system
US20140201485A1 (en)2013-01-142014-07-17Commvault Systems, Inc.Pst file archiving
KR101795771B1 (en)2013-03-182017-11-09한국전자통신연구원System and method for providing compressed encryption and decryption in homomorphic cryptography based on intergers
JP6126891B2 (en)2013-03-292017-05-10富士通株式会社 Detection method, detection program, and detection apparatus
US9661023B1 (en)2013-07-122017-05-23Symantec CorporationSystems and methods for automatic endpoint protection and policy management
CA2899996C (en)2013-12-112020-04-14Intralinks, Inc.Customizable secure data exchange environment
US20150172120A1 (en)2013-12-122015-06-18Commvault Systems, Inc.Managing non-conforming entities in information management systems, including enforcing conformance with a model entity
US10007795B1 (en)2014-02-132018-06-26Trend Micro IncorporatedDetection and recovery of documents that have been compromised by malware
US9674031B2 (en)2014-02-202017-06-06Linkedin CorporationAutomated management of a distributed computing system
US9251371B2 (en)2014-07-072016-02-02Twilio, Inc.Method and system for applying data retention policies in a computing platform
US9852026B2 (en)2014-08-062017-12-26Commvault Systems, Inc.Efficient application recovery in an information management system based on a pseudo-storage-device driver
US9405928B2 (en)2014-09-172016-08-02Commvault Systems, Inc.Deriving encryption rules based on file content
US9444811B2 (en)2014-10-212016-09-13Commvault Systems, Inc.Using an enhanced data agent to restore backed up data across autonomous storage management systems
US20160142485A1 (en)*2014-11-192016-05-19Commvault Systems, Inc.Migration to cloud storage from backup
US10542031B2 (en)2015-02-202020-01-21Authentic8, Inc.Secure application for accessing web resources
US10366096B2 (en)2015-04-032019-07-30Oracle International CorporationMethod and system for implementing a log parser in a log analytics system
US9639274B2 (en)2015-04-142017-05-02Commvault Systems, Inc.Efficient deduplication database validation
US20160350391A1 (en)2015-05-262016-12-01Commvault Systems, Inc.Replication using deduplicated secondary copy data
US9766825B2 (en)2015-07-222017-09-19Commvault Systems, Inc.Browse and restore for block-level backups
US9471778B1 (en)2015-11-302016-10-18International Business Machines CorporationAutomatic baselining of anomalous event activity in time series data
US10228962B2 (en)2015-12-092019-03-12Commvault Systems, Inc.Live synchronization and management of virtual machines across computing and virtualization platforms and using live synchronization to support disaster recovery
US10387266B2 (en)2015-12-232019-08-20Commvault Systems, Inc.Application-level live synchronization across computing platforms including synchronizing co-resident applications to disparate standby destinations and selectively synchronizing some applications and not others
US20170193003A1 (en)2015-12-302017-07-06Commvault Systems, Inc.Redundant and robust distributed deduplication data storage system
US10742665B2 (en)2016-02-012020-08-11NortonLifeLock Inc.Systems and methods for modifying file backups in response to detecting potential ransomware
US20170235647A1 (en)2016-02-122017-08-17Commvault Systems, Inc.Data protection operations based on network path information
US10684924B2 (en)2016-02-182020-06-16Commvault Systems, Inc.Data restoration operations based on network path information
US10025612B2 (en)2016-03-182018-07-17Airwatch LlcEnforcing compliance rules against hypervisor and host device using guest management components
US20170279720A1 (en)2016-03-222017-09-28Microsoft Technology Licensing, LlcReal-Time Logs
US10218727B2 (en)2016-03-242019-02-26Cisco Technology, Inc.Sanity check of potential learned anomalies
US10009360B1 (en)2016-03-252018-06-26EMC IP Holding Company LLCMalware detection and data protection integration
US10303877B2 (en)2016-06-212019-05-28Acronis International GmbhMethods of preserving and protecting user data from modification or loss due to malware
US20180007069A1 (en)2016-07-012018-01-04Mcafee, Inc.Ransomware Protection For Cloud File Storage
US10831893B2 (en)2016-07-142020-11-10Mcafee, LlcMitigation of ransomware
US10210330B1 (en)2016-09-132019-02-19Symantec CorporationSystems and methods for detecting malicious processes that encrypt files
US10138729B2 (en)2016-10-202018-11-27Deere & CompanyDrive assembly with pressure force aggregating piston arrangement for hydraulic motor speed/torque selector
US10331885B2 (en)2016-12-022019-06-25Microsoft Technology Licensing, LlcIdentification of entity performing operation on local file(s) and notification to reduce misuse risk
IL267241B2 (en)2016-12-112023-03-01Ensilo LtdSystem and methods for detection of cryptoware
US10121003B1 (en)2016-12-202018-11-06Amazon Technologies, Inc.Detection of malware, such as ransomware
US10289844B2 (en)2017-01-192019-05-14International Business Machines CorporationProtecting backup files from malware
JP6341307B1 (en)2017-03-032018-06-13日本電気株式会社 Information processing device
US10902119B1 (en)2017-03-302021-01-26Fireeye, Inc.Data extraction system for malware analysis
US10545699B2 (en)2017-04-112020-01-28International Business Machines CorporationDynamic retention policies and optional deletes
US20190108340A1 (en)2017-09-142019-04-11Commvault Systems, Inc.Ransomware detection
US20190109870A1 (en)*2017-09-142019-04-11Commvault Systems, Inc.Ransomware detection and intelligent restore
US20190108341A1 (en)2017-09-142019-04-11Commvault Systems, Inc.Ransomware detection and data pruning management
US10831888B2 (en)2018-01-192020-11-10International Business Machines CorporationData recovery enhancement system
US10592145B2 (en)2018-02-142020-03-17Commvault Systems, Inc.Machine learning-based data object storage
US20200159624A1 (en)*2018-04-252020-05-21Cloud Daddy, Inc.System, Method and Process for Protecting Data Backup from Cyberattack
US11120131B2 (en)2018-07-302021-09-14Rubrik, Inc.Ransomware infection detection in filesystems
US11010469B2 (en)*2018-09-132021-05-18Palo Alto Networks, Inc.Preventing ransomware from encrypting files on a target machine
US10650146B1 (en)*2018-12-122020-05-12Cohesity, Inc.Malicious software detection
US11019095B2 (en)*2019-01-302021-05-25Cisco Technology, Inc.Ransomware detection using file replication logs
US11301578B2 (en)2019-04-052022-04-12International Business Machines CorporationProtecting data based on a sensitivity level for the data
US11100064B2 (en)2019-04-302021-08-24Commvault Systems, Inc.Automated log-based remediation of an information management system
US11182257B2 (en)2019-08-152021-11-23Datto, Inc.Adaptive data backup scheduling based on reliability metric or metrics
US11249944B2 (en)2019-10-162022-02-15EMC IP Holding Company LLCAnomaly-based retention policies for snapshot-based data protection systems
KR20220085786A (en)*2019-10-212022-06-22필드 이펙트 소프트웨어 아이엔씨. Ransomware Protection
US11218294B2 (en)2020-01-102022-01-04EMC IP Holding Company LLCAnonymized storage of monitoring data
US12079162B2 (en)*2020-03-302024-09-03Pure Storage, Inc.Snapshot management in a storage system
US20210349748A1 (en)*2020-05-112021-11-11Hewlett Packard Enterprise Development LpVirtual machine restoration for anomaly condition evaluation
US12259977B2 (en)2021-11-152025-03-25Commvault Systems, Inc.Entropy-based ransomware detection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20160299934A1 (en)*2015-04-092016-10-13Commvault Systems, Inc.Management of log data
US20190138727A1 (en)*2017-11-072019-05-09Spinbackup Inc.Ransomware Protection for Cloud Storage Systems
US20220019385A1 (en)*2019-07-182022-01-20Pure Storage, Inc.Creating a virtual storage system
US11625481B2 (en)*2019-11-222023-04-11Pure Storage, Inc.Selective throttling of operations potentially related to a security threat to a storage system
US11574050B2 (en)*2021-03-122023-02-07Commvault Systems, Inc.Media agent hardening against ransomware attacks

Cited By (32)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12093386B2 (en)2017-09-142024-09-17Commvault Systems, Inc.Ransomware detection and data pruning management
US20230033253A1 (en)*2020-06-092023-02-02China National Digital Switching System Engineering & Technological R&D CenterNetwork security defense method and related device applied to network security defense system
US20220292188A1 (en)*2021-03-122022-09-15Commvault Systems, Inc.Detecting ransomware in secondary copies of client computing devices
US12333007B2 (en)2021-03-122025-06-17Commvault Systems, Inc.Detecting ransomware in monitored data
US12026252B2 (en)*2021-03-122024-07-02Commvault Systems, Inc.Detecting ransomware in secondary copies of client computing devices
US12229301B2 (en)*2021-05-052025-02-18EMC IP Holding Company LLCAccess control of protected data using storage system-based multi-factor authentication
US20220358235A1 (en)*2021-05-052022-11-10EMC IP Holding Company LLCAccess Control of Protected Data Using Storage System-Based Multi-Factor Authentication
US20220398169A1 (en)*2021-06-112022-12-15Qnap Systems, Inc.Method, system and computer-readable medium for synthetic incremental data backup
US20230022044A1 (en)*2021-07-212023-01-26Certo Software LimitedANALYSIS DEVICE, AND METHOD FOR DETECTING MALWARE IN AN iOS DEVICE
US20230021309A1 (en)*2021-07-232023-01-26Backoffice Associates, LlcStoring Versions of Data Assets in Knowledge Graphs
US12423594B2 (en)*2021-07-232025-09-23Backoffice Associates, LlcStoring versions of data assets in knowledge graphs
US20230107209A1 (en)*2021-10-062023-04-06AVAST Software s.r.o.Reducing malware signature redundancy
US12032695B2 (en)*2021-10-062024-07-09AVAST Software s.r.o.Reducing malware signature redundancy
US20240419797A1 (en)*2021-10-282024-12-19Imanage LlcRansomware detection and mitigation
US12259977B2 (en)2021-11-152025-03-25Commvault Systems, Inc.Entropy-based ransomware detection
US20230169166A1 (en)*2021-12-012023-06-01Dell Products L.P.System and method for monitoring and detecting of encryption based threats
US12265611B2 (en)*2021-12-012025-04-01Dell Products L.P.System and method for monitoring and detecting of encryption based threats
US12058169B1 (en)2021-12-102024-08-06Amazon Technologies, Inc.Automated ransomware recovery using log-structured storage
US12086250B1 (en)*2021-12-102024-09-10Amazon Technologies, Inc.Detecting anomalous I/O patterns indicative of ransomware attacks
US12197578B1 (en)2021-12-102025-01-14Amazon Technologies, Inc.Automated virtualized storage snapshotting responsive to ransomware detection
US12147539B2 (en)*2022-03-162024-11-19Bank Of America CorporationSystem and method for automatic identification of unauthorized updates to internet of things devices
US20230297681A1 (en)*2022-03-162023-09-21Bank Of America CorporationSystem and Method for Automatic Identification of Unauthorized Updates to Internet of Things Devices
US12229249B1 (en)*2022-05-172025-02-18Deloitte Development LlcProtection of process memory against foreign code injection
US20240004993A1 (en)*2022-06-292024-01-04International Business Machines CorporationMalware detection in containerized environments
US20240070034A1 (en)*2022-08-312024-02-29Cohesity, Inc.Fortified backup of anomaly detection
US12393492B2 (en)*2022-08-312025-08-19Cohesity, Inc.Fortified backup of anomaly detection
US12292974B2 (en)2022-10-272025-05-06Commvault Systems, Inc.Analysis of backup copies to identify malware-encrypted primary data
US12417284B2 (en)*2023-01-202025-09-16Dell Products L.P.System and method for software-defined network attached storage (SDNAS) ransomware attack detection and prevention
US12229298B2 (en)*2023-03-102025-02-18Dell Products L.P.Method and system for generating an automatic service request based on metadata
US12292991B2 (en)*2023-03-102025-05-06Dell Products L.P.Method and system for reconfiguring a data protection module based on metadata
US12381912B2 (en)*2023-04-042025-08-05Dell Products L.P.Vault overwriting after PLC (protection lifecycle) designation disallowance by transmission to public vault
US12346214B2 (en)*2023-09-292025-07-01Dell Products L.P.Generating data block mapping in incremental image backups for post processing

Also Published As

Publication numberPublication date
US12333007B2 (en)2025-06-17
US11574050B2 (en)2023-02-07
US12026252B2 (en)2024-07-02
US20250272394A1 (en)2025-08-28
US20220292187A1 (en)2022-09-15
US20220292188A1 (en)2022-09-15
US20240256661A1 (en)2024-08-01

Similar Documents

PublicationPublication DateTitle
US12333007B2 (en)Detecting ransomware in monitored data
US12045140B2 (en)Live browsing of granular mailbox data
US12099414B2 (en)Backup index generation process
US11573862B2 (en)Application aware backup of virtual machines
US20240152647A1 (en)Graphical representation of an information management system
US20220035559A1 (en)Managing subordinate storage operation pod cells using a global repository cell or master storage operation cell
US20220100613A1 (en)Information management cell health monitoring system
US11615002B2 (en)Dynamically allocating streams during restoration of data
US10891198B2 (en)Storing data to cloud libraries in cloud native formats
US11677632B2 (en)Smart network topology systems and methods
US10853195B2 (en)Granular restoration of virtual machine application data
US20200341644A1 (en)Block-level live browsing and private writable snapshots using an iscsi server
US20200097369A1 (en)Data protection operations based on network path information
US20200192572A1 (en)Disk usage growth prediction system
US20180225177A1 (en)Migrating content and metadata from a backup system
US20220021733A1 (en)Archiving mail servers via a simple mail transfer protocol (smtp) server
US20180285210A1 (en)Container image generation process
US12124338B2 (en)Data loss vulnerability detection

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

ASAssignment

Owner name:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, ILLINOIS

Free format text:SECURITY INTEREST;ASSIGNOR:COMMVAULT SYSTEMS, INC.;REEL/FRAME:058496/0836

Effective date:20211213

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp