Veritas Technologies LLC

United States of America

Back to Profile

1-100 of 1,584 for Veritas Technologies LLC Sort by
Query
Excluding Subsidiaries
Aggregations Reset Report
IP Type
        Patent 1,530
        Trademark 54
Jurisdiction
        United States 1,494
        World 57
        Europe 17
        Canada 16
Date
2024 January 1
2023 December 3
2024 (YTD) 1
2023 23
2022 19
See more
IPC Class
G06F 17/30 - Information retrieval; Database structures therefor 406
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result 236
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures 201
G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled 180
G06F 11/00 - Error detection; Error correction; Monitoring 176
See more
NICE Class
09 - Scientific and electric apparatus and instruments 48
42 - Scientific, technological and industrial services, research and design 29
16 - Paper, cardboard and goods made from these materials 10
39 - Transport, packaging, storage and travel services 5
35 - Advertising and business services 4
See more
Status
Pending 13
Registered / In Force 1,571
  1     2     3     ...     16        Next Page

1.

Methods and systems for affinity aware container prefetching

      
Application Number 16836472
Grant Number 11868214
Status In Force
Filing Date 2020-03-31
First Publication Date 2024-01-09
Grant Date 2024-01-09
Owner Veritas Technologies LLC (USA)
Inventor
  • Qin, Yaobin
  • Zhang, Xianbo

Abstract

Disclosed are techniques that provide for deduplication in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include generating new feature information for one or more portions of a new backup image, generating first container range information by performing a container range calculation using the new feature information, generating existing feature information for one or more portions of an existing backup image, generating second container range information by performing the container range calculation using the existing feature information, determining a container range affinity between the first container range information and the second container range information, identifying at least one portion of the one or more portions of the existing backup image using a result of the determining, and prefetching the one or more fingerprints corresponding to the at least one portion of the one or more portions of the existing backup image.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06N 20/00 - Machine learning

2.

Method and system for data consistency across failure and recovery of infrastructure

      
Application Number 16836288
Grant Number 11853575
Status In Force
Filing Date 2020-03-31
First Publication Date 2023-12-26
Grant Date 2023-12-26
Owner Veritas Technologies LLC (USA)
Inventor
  • Patil, Rushikesh
  • Thakur, Vishal
  • Hasbe, Sunil

Abstract

A method and system for data consistency across failure and recovery of infrastructure. In one embodiment of the method, copies of first data blocks stored in a source memory are sent to a target site via a data link. While sending one or more of the copies of the first data blocks to the target site, source hashes for second data blocks stored in the source memory are calculated, wherein the first data blocks are distinct from the second data blocks. While sending one or more of the copies of the first data blocks to the target site, target hashes of data blocks stored in a target memory of the target site are received. While sending one or more of the copies of the first data blocks to the target site, the source hashes are compared with the target hashes, respectively. After sending the first data blocks to the target site via the data link, copies of only those second data blocks are sent to the target site with source hashes that do not compare equally with respective target hashes.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

3.

Methods and systems for data resynchronization in a replication environment

      
Application Number 17897583
Grant Number 11847139
Status In Force
Filing Date 2022-08-29
First Publication Date 2023-12-19
Grant Date 2023-12-19
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Patil, Rushikesh
  • Thakur, Vishal

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for scalable deduplication in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include determining, at a source site, whether metadata has been received from a target site, and, in response to a determination that the metadata has been received at the source site, retrieving the at least one unit of the source data from the source data store using the metadata and sending, from the source site, the at least one unit of source data to the target site.

IPC Classes  ?

  • G06F 16/00 - Information retrieval; Database structures therefor; File system structures therefor
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

4.

METHOD AND SYSTEM FOR DATA CONSISTENCY ACROSS FAILURE AND RECOVERY OF INFRASTRUCTURE

      
Application Number 18237296
Status Pending
Filing Date 2023-08-23
First Publication Date 2023-12-07
Owner Veritas Technologies LLC (USA)
Inventor
  • Patil, Rushikesh
  • Thakur, Vishal
  • Hasbe, Sunil

Abstract

A method and system for data consistency across failure and recovery of infrastructure. In one embodiment of the method, copies of first data blocks stored in a source memory are sent to a target site via a data link. While sending one or more of the copies of the first data blocks to the target site, source hashes for second data blocks stored in the source memory are calculated, wherein the first data blocks are distinct from the second data blocks. While sending one or more of the copies of the first data blocks to the target site, target hashes of data blocks stored in a target memory of the target site are received. While sending one or more of the copies of the first data blocks to the target site, the source hashes are compared with the target hashes, respectively. After sending the first data blocks to the target site via the data link, copies of only those second data blocks are sent to the target site with source hashes that do not compare equally with respective target hashes.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

5.

Systems and methods for identifying possible leakage paths of sensitive information

      
Application Number 16740997
Grant Number 11822684
Status In Force
Filing Date 2020-01-13
First Publication Date 2023-11-21
Grant Date 2023-11-21
Owner Veritas Technologies LLC (USA)
Inventor
  • Athavale, Anand
  • Dargude, Shailesh A.
  • Grandhi, Satish

Abstract

A computer-implemented method for identifying possible leakage paths of sensitive information may include (i) discovering an original set of users having permission to read the sensitive information at an originating storage device in an originating location via an original set of information transfer paths and (ii) performing a security action. The security action may include (A) determining an additional set of information transfer paths having information transfer paths other than the information transfer paths already discovered, via which the original set of users can write the sensitive information and (B) identifying an additional set of users having permission to read the sensitive information via the additional set of information transfer paths.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • H04L 9/40 - Network security protocols
  • G06F 21/31 - User authentication
  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards

6.

METHODS AND SYSTEMS FOR SCALABLE DEDUPLICATION

      
Application Number 18347395
Status Pending
Filing Date 2023-07-05
First Publication Date 2023-11-02
Owner Veritas Technologies LLC (USA)
Inventor
  • Yang, Yong
  • Zhang, Xianbo
  • Wu, Weibao
  • Lei, Chao
  • Wang, Yafeng
  • Wang, Haigang
  • Wei, Lulu

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for scalable deduplication. Such methods, computer program products, and computer systems can include, in response to receiving a request to perform a lookup operation, performing the lookup operation and, in response to the signature not being found, forwarding the request to a remote node. Further, in response to receiving an indication that the signature was not found at the remote node, processing the subunit of data as a unique subunit of data.

IPC Classes  ?

  • G06F 16/215 - Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors

7.

Systems and methods for normalizing data store classification information

      
Application Number 16116522
Grant Number 11782965
Status In Force
Filing Date 2018-08-29
First Publication Date 2023-10-10
Grant Date 2023-10-10
Owner Veritas Technologies LLC (USA)
Inventor
  • Dargude, Shailesh A.
  • Grandhi, Satish
  • Stageberg, Joshua V.

Abstract

The disclosed computer-implemented method for normalizing data store classification information may include (1) receiving, at the computing device, classification information from multiple data store content classification sources, (2) training a continuous bag of words (CBOW) classification model with the classification information, (3) receiving a classification tag from a data store for which respectively stored data is classified by one of the data store content classification sources, and (4) classifying, with the trained CBOW classification model, the received classification tag to a corresponding command tag, wherein the command tag represents a meaning of the classification tag. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 16/35 - Clustering; Classification
  • G06N 20/00 - Machine learning
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 16/33 - Querying
  • G06F 18/214 - Generating training patterns; Bootstrap methods, e.g. bagging or boosting

8.

Methods and systems for improved backup performance

      
Application Number 17459612
Grant Number 11775396
Status In Force
Filing Date 2021-08-27
First Publication Date 2023-10-03
Grant Date 2023-10-03
Owner Veritas Technologies LLC (USA)
Inventor
  • Bharadwaj, Vaijayanti Rakshit
  • Dalal, Chirag

Abstract

Methods, computer program products, computer systems, and the like for improved performance, when backing up objects, are disclosed, which can include assigning a top-level entity to a backup host of a number of backup hosts and performing a backup operation on a number of objects. The objects are associated with the top-level entity. The backup operation is performed by the backup host. The backup operation includes determining whether one of the objects includes at least one new data segment or at least one modified data segment, and, in response to a determination that the object includes at least one new data segment or at least one modified data segment, writing information regarding the at least one new data segment or at least one modified data segment in a tracklog dedicated to the top-level entity.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

9.

METHODS AND SYSTEMS FOR AFFINITY AWARE CONTAINER PRETECHING

      
Application Number 18326092
Status Pending
Filing Date 2023-05-31
First Publication Date 2023-09-28
Owner Veritas Technologies LLC (USA)
Inventor
  • Qin, Yaobin
  • Zhang, Xianbo

Abstract

Disclosed are techniques that provide for deduplication in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include retrieving container information for a first one or more containers of a plurality of containers of one or more backup images (where the one or more backup images were produced under an existing backup policy), generating pre-processed container information (where the generating the pre-processed container information comprises performing data pre-processing on the container information), determining a plurality of container ranges for the first one or more containers, generating container range affinity information for the one or more backup images (where the generating the container range affinity information comprises performing a container range operation using the plurality of container ranges, and storing the container range affinity information in a container range data structure.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06N 20/00 - Machine learning

10.

Methods and systems for network configuration in storage environments

      
Application Number 17086974
Grant Number 11750450
Status In Force
Filing Date 2020-11-02
First Publication Date 2023-09-05
Grant Date 2023-09-05
Owner Veritas Technologies LLC (USA)
Inventor
  • Tian, Hui
  • Dong, Hao
  • Zhang, Qing

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for storage network configuration and maintenance in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include selecting a selected network interface of a plurality of network interfaces of a node, generating a configuration package, and sending the configuration package on the selected network interface. In such embodiments, the node is one of a plurality of nodes in a storage cluster, and communicates with one or more other nodes of the plurality of nodes via the selected network interface. The configuration package includes a node identifier and node configuration information. The node identifier uniquely identifies the node among the plurality of nodes.

IPC Classes  ?

  • H04L 12/70 - Packet switching systems
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
  • H04L 61/50 - Address allocation

11.

Distributed data classification

      
Application Number 15826814
Grant Number 11748306
Status In Force
Filing Date 2017-11-30
First Publication Date 2023-09-05
Grant Date 2023-09-05
Owner Veritas Technologies LLC (USA)
Inventor
  • Chaudhary, Abhishek Sureshchandra
  • Murugappan, Muthukannan
  • Thakur, Parag V.

Abstract

Disclosed herein are methods, systems, and processes for source side classification of five and active data. Operating system calls associated with files being accessed or files recently accessed by an endpoint computing device are intercepted. A list including the files is generated and sent to a server computing device. A confirmation is received that a request to classify the files has been received from the server computing device.

IPC Classes  ?

  • G06F 16/17 - File systems; File servers - Details of further file system functions
  • G06F 16/13 - File access structures, e.g. distributed indices
  • G06F 16/182 - Distributed file systems

12.

Method and system for classification of unstructured data items

      
Application Number 16147822
Grant Number 11741145
Status In Force
Filing Date 2018-09-30
First Publication Date 2023-08-29
Grant Date 2023-08-29
Owner Veritas Technologies LLC (USA)
Inventor
  • Pandit, Bhushan
  • Kane, Surashree
  • Shinde, Abhishek

Abstract

Methods, computer program products, and computer systems for the classification of unstructured data items are disclosed. Such methods, computer program products, and computer systems include ingesting an item into a classification engine, performing term processing on one or more terms of the item, and processing a relational similarity index. The classification engine is implemented in the computer system. The relational similarity index represents a similarity of the item to a reference item, and the relational similarity index is determined using the one or more terms.

IPC Classes  ?

  • G06F 16/00 - Information retrieval; Database structures therefor; File system structures therefor
  • G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
  • G06F 16/35 - Clustering; Classification
  • G06F 16/31 - Indexing; Data structures therefor; Storage structures

13.

Intelligent and automatic load balancing of workloads on replication appliances based on appliance load scores

      
Application Number 17117796
Grant Number 11704164
Status In Force
Filing Date 2020-12-10
First Publication Date 2023-07-18
Grant Date 2023-07-18
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Dhaka, Pramila
  • Hooda, Parikshit

Abstract

Various systems and methods are provided in which a replication process is initiated between a primary site and a recovery site, each having plurality of gateway appliances. Replication loads are evaluated for each given gateway appliance of the plurality of gateway appliances. If a determination is made that at least one gateway appliance of the plurality of gateway appliances is not overloaded, the plurality of gateway appliances are sorted based on replication loads respectively associated with each gateway appliance, and a determination is made as to whether a relative difference in replication loads between a gateway appliance having a highest replication load and a gateway appliance having a lowest replication load exceeds a difference threshold to determine whether the replication workloads between the gateway appliances should be rebalanced.

IPC Classes  ?

  • G06F 16/00 - Information retrieval; Database structures therefor; File system structures therefor
  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
  • G06F 16/182 - Distributed file systems
  • H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

14.

METHOD AND SYSTEM FOR IMPROVING EFFICIENCY IN THE MANAGEMENT OF DATA REFERENCES

      
Application Number 18161592
Status Pending
Filing Date 2023-01-30
First Publication Date 2023-06-15
Owner Veritas Technologies LLC (USA)
Inventor
  • Zhang, Xianbo
  • Liu, Jialun
  • Wu, Weibao

Abstract

Methods, computer program products, and computer systems for the management of data references in an efficient and effective manner are disclosed. Such methods, computer program products, and computer systems include receiving a change tracking stream at the computer system, identifying a data object group, and performing a deduplication management operation on the data object group. The change tracking stream is received from a client computing system. The change tracking stream identifies one or more changes made to a plurality of data objects of the client computing system. The identifying is based, at least in part, on at least a portion of the change tracking stream. The data object group represents the plurality of data objects.

IPC Classes  ?

  • G06F 16/215 - Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
  • G06F 16/23 - Updating

15.

Methods and systems for the movement of metadata between different storage types

      
Application Number 18158201
Grant Number 11829651
Status In Force
Filing Date 2023-01-23
First Publication Date 2023-05-25
Grant Date 2023-11-28
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Liu, Jialun
  • Zhang, Xianbo
  • Wu, Weibao

Abstract

Methods, computer program products, computer systems, and the like for efficient metadata management are disclosed, which can include determining whether a change in a status of data has occurred. In response to a determination that the change has occurred, such methods, computer program products, and computer systems can include determining whether a move condition has been met, and, in response to a determination that the move condition has been met, moving the metadata from the first storage unit to a second storage unit.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers

16.

Systems and methods for producing message search recommendations

      
Application Number 16906204
Grant Number 11657093
Status In Force
Filing Date 2020-06-19
First Publication Date 2023-05-23
Grant Date 2023-05-23
Owner Veritas Technologies LLC (USA)
Inventor Parikh, Mirang

Abstract

The disclosed computer-implemented method for producing message search recommendations may include (i) providing a search bar for searching a corpus of network messages such that the search bar is configured to enable a user to search the network messages by specifying both a specialized keyword that designates a separate common field for searching the network messages and a value that corresponds to the separate common field, (ii) detecting, as the user types the specialized keyword that the user is inputting the specialized keyword, and (iii) presenting, in response to detecting that the user is inputting the specialized keyword, a recommended different specialized keyword that has been used in conjunction with the detected specialized keyword in search queries rather than simply recommending a value that corresponds to the detected specialized keyword. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 16/9032 - Query formulation
  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/2457 - Query processing with adaptation to user needs

17.

Systems and methods for consistently applying rules to messages

      
Application Number 16774585
Grant Number 11659051
Status In Force
Filing Date 2020-01-28
First Publication Date 2023-05-23
Grant Date 2023-05-23
Owner Veritas Technologies LLC (USA)
Inventor Vijayvargiya, Rashmi

Abstract

The disclosed computer-implemented method for consistently applying rules to messages may include (i) identifying a user account on a message server that comprises both unarchived messages to which message rules are applied by default and archived messages to which the message rules are not applied by default, (ii) detecting a new message rule that specifies an action to be performed on relevant messages within the user account on the message server, (iii) locating at least one archived message within the user account on the message server to which the new message rule applies, and (iv) applying the new message rule to the at least one archived message by performing the specified action on the at least one archived message. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • H04L 67/00 - Network arrangements or protocols for supporting network services or applications
  • H04L 67/306 - User profiles
  • H04L 51/04 - Real-time or near real-time messaging, e.g. instant messaging [IM]
  • H04L 51/216 - Handling conversation history, e.g. grouping of messages in sessions or threads

18.

METHODS AND SYSTEMS FOR DATA RESYNCHRONIZATION IN A REPLICATION ENVIRONMENT

      
Application Number 18068774
Status Pending
Filing Date 2022-12-20
First Publication Date 2023-04-20
Owner Veritas Technologies LLC (USA)
Inventor
  • Patil, Rushikesh
  • Hasbe, Sunil

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for scalable deduplication in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include determining whether a source data store and a replicated data store are unsynchronized and, in response to a determination that the source data store and the replicated data store are unsynchronized, performing a resynchronization operation. The source data stored in the source data store is replicated to replicated data in the replicated data store. The resynchronization operation resynchronizes the source data and the replicated data.

IPC Classes  ?

  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
  • G06F 16/907 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 3/06 - Digital input from, or digital output to, record carriers

19.

VERITAS ALTA

      
Application Number 018856665
Status Registered
Filing Date 2023-03-31
Registration Date 2023-09-16
Owner Veritas Technologies LLC (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer software; Downloadable software; Cloud-based software; Computer utility software; software for use in file, disk and systems management; software for use in data storage management and storage area networks; software for backing up and restoring computer data; software for use in disaster recovery; software for use in removable storage media management; software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; software for use in the field of enterprise information management; software for use in the field of online analytical processing (OLAP); software for generating reports from databases; software for scheduling automated processes; software for use in the central management of computer attached to a computer network; software for replicating and archiving files from one data store to another; software for metering the use of the other computer software; software for use in developing data analysis applications and other computer software; Instruction manuals supplied as a unit with the foregoing; electronic publications, namely, work books, quick reference guides, technical reference manuals, computer user manuals, evaluation guides and conference materials in the field of computers; electronic publications on magnetic and optical computer-readable media; downloadable electronic publications. Software-as-a-service (SaaS) services; Providing non-downloadable cloud-based software; Cloud hosting provider services; Cloud computing; Software as a service (SAAS) featuring computer software for managing cloud-based services; Computer disaster recovery consulting and planning services; Electronic data back-up services; electronic data storage; Electronic storage services for archiving electronic data and files; Computer services, namely, data recovery services; Management of information technology systems; Cloud storage services; Updating and maintaining cloud-based computer software; Providing non-downloadable computer utility software; Providing non-downloadable software for use in file, disk and systems management; Providing non-downloadable software for use in data storage management and storage area networks; Providing non-downloadable software for backing up and restoring computer data; Providing non-downloadable software for use in disaster recovery; Providing non-downloadable software for use in removable storage media management; Providing non-downloadable software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; Providing non-downloadable software for use in the field of enterprise information management; Providing non-downloadable software for use in the field of online analytical processing (OLAP); Providing non-downloadable software for generating reports from databases; Providing non-downloadable software for scheduling automated processes; Providing non-downloadable software for use in the central management of computer attached to a computer network; Providing non-downloadable software for replicating and archiving files from one data store to another; Providing non-downloadable software for metering the use of the other computer software; Providing non-downloadable software for use in developing data analysis applications and other computer software; Software-as-a-service (SaaS) featuring computer utility software; Software-as-a-service (SaaS) featuring computer software for use in file, disk and systems management; Software-as-a-service (SaaS) featuring computer software for use in data storage management and storage area networks; Software-as-a-service (SaaS) featuring computer software for backing up and restoring computer data; Software-as-a-service (SaaS) featuring computer software for use in disaster recovery; Software-as-a-service (SaaS) featuring computer software for use in removable storage media management; Software-as-a-service (SaaS) featuring computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; Software-as-a-service (SaaS) featuring computer software for use in the field of enterprise information management; Software-as-a-service (SaaS) featuring computer software for use in the field of online analytical processing (OLAP); Software-as-a-service (SaaS) featuring computer software for generating reports from databases; Software-as-a-service (SaaS) featuring computer software for scheduling automated processes; Software-as-a-service (SaaS) featuring computer software for use in the central management of computer attached to a computer network; Software-as-a-service (SaaS) featuring computer software for replicating and archiving files from one data store to another; Software-as-a-service (SaaS) featuring computer software for metering the use of the other computer software; Software-as-a-service (SaaS) featuring computer software for use in developing data analysis applications and other computer software.

20.

Systems and methods for backing-up an eventually-consistent database in a production cluster

      
Application Number 17096610
Grant Number 11609825
Status In Force
Filing Date 2020-11-12
First Publication Date 2023-03-21
Grant Date 2023-03-21
Owner Veritas Technologies LLC (USA)
Inventor
  • Bharadwaj, Vaijayanti
  • Dalal, Chirag
  • Sharma, Vinay

Abstract

The disclosed computer-implemented method for backing-up an eventually-consistent database in a production cluster may include (1) forming, on a production node, a stable copy of production data, (2) provisioning storage on a backup node based on an amount of data in the stable copy and a replication factor, (3) transferring information from the stable copy to a backup copy on the backup node, (4) performing record synthesis on the backup copy to merge record updates into complete backup records, (5) identifying and discarding any stale records and any redundant records in the complete backup records, and (6) transferring the complete backup records from the backup node to a cloud storage device. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

21.

METHODS AND SYSTEMS FOR MAINTAINING CACHE COHERENCY BETWEEN NODES IN A CLUSTERED ENVIRONMENT BY PERFORMING A BITMAP LOOKUP IN RESPONSE TO A READ REQUEST FROM ONE OF THE NODES

      
Application Number 18055174
Status Pending
Filing Date 2022-11-14
First Publication Date 2023-03-09
Owner Veritas Technologies LLC (USA)
Inventor
  • Jagtap, Bhushan
  • Hemment, Mark
  • Banerjee, Anindya
  • Noronha, Ranjit
  • Patidar, Jitendra
  • Kumar, Kundan
  • Pawar, Sneha

Abstract

Disclosed herein are methods, systems, and processes to provide coherency across disjoint caches in clustered environments. It is determined whether a data object is owned by an owner node, where the owner node is one of multiple nodes of a cluster. If the owner node for the data object is identified by the determining, a request is sent to the owner node for the data object. However, if the owner node for the data object is not identified by the determining, selects a node in the cluster is selected as the owner node, and the request for the data object is sent to the owner node.

IPC Classes  ?

22.

A SYSTEM AND METHOD TO CREATE AN APPLICATION CONSISTENT RECOVERY POINT IN DISASTER RECOVERY SOLUTION WITHOUT KNOWLEDGE OF I/Os

      
Application Number US2022074359
Publication Number 2023/015148
Status In Force
Filing Date 2022-08-01
Publication Date 2023-02-09
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Aherkar, Shrijeet
  • Thakur, Vishal
  • Bandopadhyay, Tushar

Abstract

A system and method is disclosed to create an application consistent recovery point in disaster recovery solution without knowledge of I/Os. The method in one embodiment includes a first application sequentially issuing first write commands for writing data to memory via a file system. The first application receives a command to pause after issuing the first write commands. The first application pauses in response to the first application receiving the command. All of the first write commands that are pending are completed after the first application is paused. After the all the first write commands are completed, a module issues a read command to read a marker.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 16/18 - File system types

23.

Methods and systems for efficient metadata management

      
Application Number 16953432
Grant Number 11561728
Status In Force
Filing Date 2020-11-20
First Publication Date 2023-01-24
Grant Date 2023-01-24
Owner Veritas Technologies LLC (USA)
Inventor
  • Liu, Jialun
  • Zhang, Xianbo
  • Wu, Weibao

Abstract

Methods, computer program products, computer systems, and the like for efficient metadata management are disclosed, which can include receiving a subunit of storage, storing a first metadata portion of the subunit of storage in a first unit of storage, and storing a second metadata portion of the subunit of storage in a second unit of storage.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers

24.

METHODS AND SYSTEMS FOR EVENTUALLY-COMPLETE BACKUPS

      
Application Number 17936230
Status Pending
Filing Date 2022-09-28
First Publication Date 2023-01-19
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Bharadwaj, Vaijayanti Rakshit
  • Dalal, Chirag

Abstract

Disclosed are techniques that provide for eventually-complete backups, and restoration thereof. For example, such methods, computer program products, and computer systems can include initiating a backup operation (where the backup operation is configured back up a dataset), detecting termination of the backup operation, detecting termination of the backup operation, and determining whether the backup operation backed up the dataset completely. In response to a determination that the backup operation did not backup the dataset completely, generating an indication that the backup is not complete. In response to a determination that the backup operation did not backup the dataset completely, generating an indication that the backup is complete.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

25.

Systems and methods for prioritizing cache objects for deletion

      
Application Number 17138086
Grant Number 11513967
Status In Force
Filing Date 2020-12-30
First Publication Date 2022-11-29
Grant Date 2022-11-29
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Patidar, Jitendra
  • Banerjee, Anindya

Abstract

Provided computer-implemented methods for prioritizing cache objects for deletion may include (1) tracking, at a computing device, a respective time an externally-accessed object spends in an external cache, (2) queuing, when the externally-accessed object is purged from the external cache, the externally-accessed object in a first queue, (3) queuing, when an internally-accessed object is released, the internally-accessed object in a second queue, (4) prioritizing objects within the first queue, based on a cache-defined internal age factor and on respective times the objects spend in the external cache and respective times the objects spend in an internal cache, (5) prioritizing objects within the second queue based on respective times the objects spend in the internal cache, (6) selecting an oldest object having a longest time in any of the first queue and the second queue, and (7) deleting the oldest object. Various other methods, systems, and computer-readable media are disclosed.

IPC Classes  ?

  • G06F 12/08 - Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
  • G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
  • G06F 12/0895 - Caches characterised by their organisation or structure of parts of caches, e.g. directory or tag array

26.

Systems and methods for prioritizing and detecting file datasets based on metadata

      
Application Number 16374568
Grant Number 11487825
Status In Force
Filing Date 2019-04-03
First Publication Date 2022-11-01
Grant Date 2022-11-01
Owner Veritas Technologies LLC (USA)
Inventor
  • Dargude, Shailesh
  • Shah, Harshit
  • Athavale, Anand
  • Grandhi, Satish

Abstract

The disclosed computer-implemented method for prioritizing and detecting file datasets based on metadata may include (i) receive a group of files from a data storage, (ii) train a machine-learning model utilizing a set of properties derived from metadata associated with the files, (iii) identify, utilizing the machine-learning model, a dataset including at least one candidate file that performs an action in a set of predetermined actions, and (iv) prioritize the action based on the dataset. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 16/907 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
  • G06F 16/14 - File systems; File servers - Details of searching files based on file metadata
  • G06N 20/00 - Machine learning
  • G06F 16/906 - Clustering; Classification
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 16/9035 - Filtering based on additional data, e.g. user or group profiles

27.

VERITAS ALTA

      
Serial Number 97639316
Status Pending
Filing Date 2022-10-19
Owner Veritas Technologies LLC ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable computer software for data storage, data management, data backup, data recovery, information management and information retention; Downloadable software for data storage, data management, data backup, data recovery, information management and information retention; Downloadable cloud-based software for data storage, data management, data backup, data recovery, information management, information retention and cloud data protection; Downloadable computer utility software for maintaining and operating computer systems and software applications; downloadable computer utility software for improving computer system performance, diagnosing computer operational problems, managing data files and detecting computer software threats; Downloadable software for use in file, disk and systems management; Downloadable software for use in data storage management and storage area networks; Downloadable software for backing up and restoring computer data; Downloadable software for use in disaster recovery; Downloadable software for use in removable storage media management; Downloadable software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; Downloadable software for use in the field of enterprise information management; Downloadable software for use in processing and organizing data for use in the field of online analytical processing (OLAP); Downloadable software for generating reports from databases; Downloadable software for scheduling automated processes; Downloadable software for use in the central management of computer attached to a computer network; Downloadable software for replicating and archiving files from one data store to another; Downloadable software for metering the use of the other computer software; Downloadable software for use in developing data analysis applications and other computer software; Downloadable instruction manuals supplied as a unit with the foregoing; Electronic publications, namely, work books, quick reference guides, technical reference manuals, computer user manuals, evaluation guides and conference materials, all of the foregoing being in the field of computers and being recorded on computer media; Downloadable electronic publications, namely, work books, quick reference guides, technical reference manuals, computer user manuals, evaluation guides and conference materials in the field of computers, computer software, computer peripherals, and computer network on magnetic and optical computer-readable media; Downloadable electronic publications, namely, work books, quick reference guides, technical reference manuals, computer user manuals, evaluation guides and conference materials in the field of computers, computer software, computer peripherals, and computer network recorded on computer media and downloadable via the Internet and computer and communication networks Software-as-a-service (SaaS) services featuring software for data storage, data management, data backup, data recovery, information management and information retention; Providing temporary use of non-downloadable cloud-based software featuring software for data storage, data management, data backup, data recovery, information management, information retention and cloud data protection; computer services, namely, cloud hosting provider services; Cloud computing providing temporary use of on-line non-downloadable cloud computing software for data and information management, retention, storage, backup, recovery, availability, visibility, insight, continuity, archiving, discovery and analysis; Software as a service (SAAS) services featuring computer software for managing cloud-based services; Computer disaster recovery consulting and planning services; Electronic data back-up services; electronic data storage; Electronic storage services for archiving electronic data and files; Computer services, namely, data recovery services; computer services, namely, on-site and remote management of information technology systems of others; Cloud storage services for electronic data and files; Updating and maintaining cloud-based computer software through monitoring, online updates, enhancements and patches; providing temporary use of non-downloadable computer utility software for maintaining and operating computer systems and software applications; providing temporary use of non-downloadable computer utility software for improving system performance, diagnosing operational problems, managing data files and detecting threats; providing temporary use of non-downloadable software for use in file, disk and systems management; providing temporary use of non-downloadable software for use in data storage management and storage area networks; providing temporary use of non-downloadable software for backing up and restoring computer data; providing temporary use of non-downloadable software for use in disaster recovery, namely, computer disaster recovery planning; providing temporary use of non-downloadable software for use in removable storage media management; providing temporary use of non-downloadable software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; providing temporary use of non-downloadable software for information management, data analytics, data protection, and data management for use in the field of enterprise information management; providing temporary use of non-downloadable software for online analytical processing; providing temporary use of non-downloadable software for analyzing and processing information and data in the field of online analytical processing (OLAP); providing temporary use of non-downloadable software for generating reports from databases; providing temporary use of non-downloadable software for scheduling automated processes; providing temporary use of non-downloadable software for use in the central management of computer attached to a computer network; providing temporary use of non-downloadable software for replicating and archiving files from one data store to another; providing temporary use of non-downloadable software for metering the use of the other computer software; providing temporary use of non-downloadable software for use in developing data analysis applications and other computer software; Software-as-a-service (SaaS) services featuring computer utility software for maintaining and operating computer systems and software applications; Software-as-a-service (SaaS) services featuring computer utility software for improving system performance, diagnosing operational problems, managing data files and detecting threats; Software-as-a-service (SaaS) services featuring computer software for use in file, disk and systems management; Software-as-a-service (SaaS) services featuring computer software for use in data storage management and storage area networks; Software-as-a-service (SaaS) services featuring computer software for backing up and restoring computer data; Software-as-a-service (SaaS) services featuring computer software for use in disaster recovery, namely, computer disaster recovery planning; Software-as-a-service (SaaS) services featuring computer software for use in removable storage media management; Software-as-a-service (SaaS) services featuring computer software for monitoring, identifying, and rectifying file, disk, system, and computer network problems and errors; Software-as-a-service (SaaS) services featuring computer software for use in the field of enterprise information management for information management, data analytics, data protection, and data management; Software-as-a-service (SaaS) services featuring computer software for online analytical processing; Software-as-a-service (SaaS) services featuring computer software for analyzing and processing information and data in the field of online analytical processing (OLAP); Software-as-a-service (SaaS) services featuring computer software for generating reports from databases; Software-as-a-service (SaaS) services featuring computer software for scheduling automated processes; Software-as-a-service (SaaS) services featuring computer software for use in the central management of computer attached to a computer network; Software-as-a-service (SaaS) services featuring computer software for replicating and archiving files from one data store to another; Software-as-a-service (SaaS) services featuring computer software for metering the use of the other computer software; Software-as-a-service (SaaS) services featuring computer software for use in developing data analysis applications and other computer software; providing temporary use of non-downloadable cloud-based software for data storage, data management, data backup, data recovery, information management and information retention

28.

Methods and systems for eventually-complete backups

      
Application Number 16993717
Grant Number 11474731
Status In Force
Filing Date 2020-08-14
First Publication Date 2022-10-18
Grant Date 2022-10-18
Owner Veritas Technologies LLC (USA)
Inventor
  • Bharadwaj, Vaijayanti Rakshit
  • Dalal, Chirag

Abstract

Disclosed are techniques that provide for eventually-complete backups, and restoration thereof. For example, such methods, computer program products, and computer systems can include initiating a backup operation (where the backup operation is configured back up a dataset), detecting termination of the backup operation, detecting termination of the backup operation, and determining whether the backup operation backed up the dataset completely. In response to a determination that the backup operation did not backup the dataset completely, generating an indication that the backup is not complete. In response to a determination that the backup operation did not backup the dataset completely, generating an indication that the backup is complete.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers

29.

Storage optimization of pre-allocated units of storage

      
Application Number 16028615
Grant Number 11409604
Status In Force
Filing Date 2018-07-06
First Publication Date 2022-08-09
Grant Date 2022-08-09
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Paulzagade, Sudhakar
  • Dalal, Chirag

Abstract

Disclosed herein are systems, methods, and processes to optimize the storage of pre-allocated units of storage during a backup operation. Null units of storage are identified in pre-allocated units of storage prior to the backup operation. Upon being identified, the null units of storage are inhibited from being written to a backup image during the backup operation.

IPC Classes  ?

  • G06F 16/00 - Information retrieval; Database structures therefor; File system structures therefor
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 16/188 - Virtual file systems

30.

Context-driven data backup and recovery

      
Application Number 16836997
Grant Number 11409610
Status In Force
Filing Date 2020-04-01
First Publication Date 2022-08-09
Grant Date 2022-08-09
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Janakiraman, Viswesvaran
  • Kayyoor, Ashwin

Abstract

Disclosed herein are systems, methods, and processes to perform context-driven (or context-based) data backup and recovery operations. A request to perform a backup operation on a dataset is received. Current external context datasets related to the dataset and generated based on prioritization techniques are collected from computing devices. a saved context dataset is generated based on the current external context datasets. The backup operation is performed by storing a backup image that includes at least a portion of the dataset and the saved context dataset.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

31.

Tracking access pattern of inodes and pre-fetching inodes

      
Application Number 16559686
Grant Number 11392545
Status In Force
Filing Date 2019-09-04
First Publication Date 2022-07-19
Grant Date 2022-07-19
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Patel, Bhautik
  • James, Freddy
  • Kothari, Mitul
  • Banerjee, Anindya

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for the tracking of access patterns of inodes, and the issuing of inode read-ahead instructions, in order to pre-fetch inodes. Such a method can include, for example, identifying a unit of metadata in a file system, identifying a file system structure in the file system, determining whether a file structure of the file system structure is non-sequential, and, in response to a determination that the file structure is non-sequential, retrieving a list of units of metadata. In such embodiments, the file system structure is associated with the unit of metadata, and the determining includes accessing the file system structure. Further, in certain embodiments, the units of metadata identified in the list of units of metadata are stored in a storage device of the computer system.

IPC Classes  ?

  • G06F 16/13 - File access structures, e.g. distributed indices
  • G06F 16/172 - Caching, prefetching or hoarding of files
  • G06F 16/14 - File systems; File servers - Details of searching files based on file metadata

32.

Method to use previously-occupied inodes and associated data structures to improve file creation performance

      
Application Number 16837046
Grant Number 11392546
Status In Force
Filing Date 2020-04-01
First Publication Date 2022-07-19
Grant Date 2022-07-19
Owner Veritas Technologies LLC (USA)
Inventor
  • Gopalka, Abhishek Kumar
  • Banerjee, Anindya
  • Mahadik, Pooja
  • Jain, Sanjay Kumar
  • Vijayvargiya, Shirish

Abstract

Various systems and methods are provided for using various in-core and on-disk data structures to improve the file creation process through the use of previously-occupied inodes. For example, one method involves updating an in-core data structure in response to receiving a command to delete a first file, such that a first node is assigned to the first file, the in-core data structure is stored in a non-persistent computer-readable storage medium, the in-core data structure comprises a plurality of entries, each of the entries comprises information identifying a respective inode of a plurality of inodes as being available, and the updating the in-core data structure comprises storing information regarding the first inode in a first entry of the plurality of entries; and creating a second file, where the creating comprises assigning the first inode to the second file using the information regarding the first inode stored in the first entry.

IPC Classes  ?

  • G06F 16/00 - Information retrieval; Database structures therefor; File system structures therefor
  • G06F 16/13 - File access structures, e.g. distributed indices
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

33.

Methods and systems for efficient erasure-coded storage systems

      
Application Number 17140108
Grant Number 11385806
Status In Force
Filing Date 2021-01-03
First Publication Date 2022-07-12
Grant Date 2022-07-12
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Banerjee, Anindya
  • Marathe, Shailesh

Abstract

Methods and the like according to the disclosure can include determining an information type of digital information, writing the digital information using a first process (in response to a determination that the information type of the digital information is a first information type), and, in response to a determination that the information type of the digital information is a second information type, determining erasure-coded parity information for the digital information and writing the digital information using a second process (where the digital information is to be written to erasure-coded storage). In the former case, the first process that includes writing the digital information to storage. The second process includes writing the digital information and the erasure-coded parity information to erasure-coded storage, without writing the digital information to a log.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • H03M 13/15 - Cyclic codes, i.e. cyclic shifts of codewords produce other codewords, e.g. codes defined by a generator polynomial, Bose-Chaudhuri-Hocquenghem [BCH] codes
  • G06F 11/10 - Adding special bits or symbols to the coded information, e.g. parity check, casting out nines or elevens
  • H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

34.

Method and system for improved write performance in erasure-coded storage systems

      
Application Number 16557124
Grant Number 11360699
Status In Force
Filing Date 2019-08-30
First Publication Date 2022-06-14
Grant Date 2022-06-14
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Zhang, Xianbo
  • Bai, Changjun
  • Banerjee, Anindya

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for improved write performance in erasure-coded storage systems in an efficient and effective manner. These can include identifying a data segment, identifying metadata, persisting the data segment to a storage system, storing the metadata in the journal, and persisting the metadata to the storage system. In such embodiments, the metadata is associated with the data segment by virtue of the metadata comprising a fingerprint of the data segment. Further, in such embodiments, the persisting the data segment to the storage system is performed without storing the data segment in a journal, and the storage system is an erasure-coded storage system.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

35.

Offset segmentation for improved inline data deduplication

      
Application Number 16839140
Grant Number 11347424
Status In Force
Filing Date 2020-04-03
First Publication Date 2022-05-31
Grant Date 2022-05-31
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Zhang, Xianbo
  • Yang, Yong

Abstract

Systems and methods for processing data segments are disclosed. In one embodiment, such functionality includes buffering data received from a node (where the data is stored in a buffer as buffered data, an offset value is associated with the data, and a segment size is associated with the buffer), and determining whether the offset value is an integer multiple of the segment size. In response to determination that the offset value is an integer multiple of the segment size, processing the data in the buffer as a segment. Such functionality also includes determining whether the segment is a duplicate of data stored in a deduplicated data store and, in response to a determination that the segment is not a duplicate of data stored in the deduplicated data store, storing the segment in the deduplicated data store.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 3/06 - Digital input from, or digital output to, record carriers

36.

Systems and methods for producing access control list caches including effective information access permissions across disparate storage devices

      
Application Number 16780115
Grant Number 11336650
Status In Force
Filing Date 2020-02-03
First Publication Date 2022-05-17
Grant Date 2022-05-17
Owner Veritas Technologies LLC (USA)
Inventor
  • Dargude, Shailesh
  • Grandhi, Satish
  • Shah, Harshit

Abstract

The disclosed computer-implemented method for producing access control list caches including effective information access permissions across disparate storage devices may include (i) receiving, at a computing device, an instruction to prepare an access control list (ACL) cache and (ii) performing a security action. The security action may include (A) recursively parsing, at the computing device, at least one respective ACL for information stored on at least two disparate storage devices, (B) identifying, at each step of recursion, each direct user and each indirect user having information access permissions in at least one of the respective ACLs, (C) determining, for each unique user in the respective ACLs, per-control point effective permissions, and (D) storing the per-control point effective information access permissions in the ACL cache. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 7/04 - Identity comparison, i.e. for like or unlike values
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

37.

Efficient space reclamation in deduplication systems

      
Application Number 15885323
Grant Number 11307937
Status In Force
Filing Date 2018-01-31
First Publication Date 2022-04-19
Grant Date 2022-04-19
Owner Veritas Technologies LLC (USA)
Inventor
  • Cheng, Shuai
  • Zhang, Xianbo

Abstract

A method, computer program product, computer system, and the like that provide for the efficient reclamation of storage space in a deduplication system are disclosed. The method, for example, includes identifying one or more storage constructs of a number of storage constructs and generating an indication that a reclamation operation is to be performed with respect to the one or more storage constructs. In an embodiment, each of the plurality of storage constructs includes metadata and a number of units of data. The one or more storage constructs are identified, at least in part, by determining that a portion of the number of units of data of each of the one or more storage constructs is in a state, wherein the determining is based, at least in part, on at least a portion of the metadata.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

38.

Systems and methods for computing a risk score for stored information

      
Application Number 16116490
Grant Number 11301568
Status In Force
Filing Date 2018-08-29
First Publication Date 2022-04-12
Grant Date 2022-04-12
Owner Veritas Technologies LLC (USA)
Inventor
  • Dargude, Shailesh
  • Grandhi, Satish
  • Athavale, Anand
  • Nath, Rohit

Abstract

The disclosed computer-implemented method for computing a risk score for stored information may include (1) extracting factor-specific information from metadata describing characteristics of files stored on multiple storage devices, (2) assigning at least one respective factor score to at least one respective factor based at least in part on the factor-specific information, and (3) calculating the risk score from the at least one factor score. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

39.

Systems and methods for emulating local storage

      
Application Number 15942070
Grant Number 11263032
Status In Force
Filing Date 2018-03-30
First Publication Date 2022-03-01
Grant Date 2022-03-01
Owner Veritas Technologies LLC (USA)
Inventor
  • Nallamalli, Nalini Kumari
  • Naiknaware, Utkarsh
  • Jadhav, Raosaheb
  • Kumaran, Kushal
  • Banerjee, Anindya

Abstract

The disclosed computer-implemented method for emulating local storage may include (i) exposing a cloud storage as a local block storage device by providing a translation service that translates commands formatted according to an operating system compatibility standard protocol into commands formatted according to a cloud storage application programming interface protocol, the cloud storage dividing a cloud storage volume into multiple objects, (ii) receiving a command that is formatted according to the operating system compatibility standard protocol and that specifies a length and offset of the cloud storage volume, (iii) translating the command into a translated command formatted according to the cloud storage application programming interface protocol, and (iv) returning a result of executing the translated command. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 3/06 - Digital input from, or digital output to, record carriers

40.

Securing external access to runtime services in appliances

      
Application Number 15813482
Grant Number 11245679
Status In Force
Filing Date 2017-11-15
First Publication Date 2022-02-08
Grant Date 2022-02-08
Owner Veritas Technologies LLC (USA)
Inventor
  • Su, Zhi
  • You, Li Zhen
  • Liu, Xiaohong

Abstract

Disclosed herein are methods, systems, and processes to secure external access to runtime systems in appliances. A request to register a security token configured to permit access to a computing system is received at the computing system. An authorization response authenticating the security token is sent. Another request to access the computing system based on the authenticated security token is received, and access is permitted to the computing system.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code

41.

Techniques for automated policy analysis

      
Application Number 13800356
Grant Number 11238009
Status In Force
Filing Date 2013-03-13
First Publication Date 2022-02-01
Grant Date 2022-02-01
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Dhakras, Nilesh Ramesh
  • Bhimani, Akashkumar Vinodray
  • Agrawal, Saurabh Kailash
  • Kotwal, Mayuri Dhananjay

Abstract

Techniques for automated policy analysis are disclosed. In one particular embodiment, the techniques may be realized as a method for automated policy analysis comprising processing system configuration information for a system, processing policy configuration information for the system, analyzing at least one policy configuration change to the policy configuration information, recommending the at least one policy configuration change based on the analysis of the at least one policy configuration change, and updating the policy configuration information for the system based on the recommendation of the at least one policy configuration change.

IPC Classes  ?

  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 3/06 - Digital input from, or digital output to, record carriers

42.

Systems and methods for distributing information across failure domains in servers

      
Application Number 16784012
Grant Number 11226861
Status In Force
Filing Date 2020-02-06
First Publication Date 2022-01-18
Grant Date 2022-01-18
Owner Veritas Technologies LLC (USA)
Inventor
  • Banerjee, Anindya
  • Marathe, Shailesh

Abstract

The disclosed computer-implemented method for distributing information across failure domains in servers may include (1) dividing, at a computing device, each of a quantity of “K” failure domains (FDs) in a plurality of FDs into a quantity of “P” portions, where the “K” FDs in the plurality of FDs are constituent parts of respective servers in a plurality of servers, “P” is less than “K,” and “P” is a sum of a quantity of “M” data portions and a quantity of “N” parity portions, (2) creating a quantity of “K” erasure-coded volumes in the “K” FDs, where each erasure-coded volume includes “M” data portions and “N” parity portions, and each portion in each erasure-coded volume is stored in a different FD and (3) combining the “K” volumes to create a file system. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 11/10 - Adding special bits or symbols to the coded information, e.g. parity check, casting out nines or elevens
  • G06F 3/06 - Digital input from, or digital output to, record carriers

43.

Executing custom scripts from the host during disaster recovery

      
Application Number 15238937
Grant Number 11223537
Status In Force
Filing Date 2016-08-17
First Publication Date 2022-01-11
Grant Date 2022-01-11
Owner Veritas Technologies LLC (USA)
Inventor
  • Jain, Ankit
  • Parmar, Sumeet
  • Kulkarni, Ashwini
  • Vaidya, Swanand

Abstract

Systems, apparatuses, methods, and computer readable mediums for executing scripts within migrated hosts. The system enables a user to generate a task to execute a script on a host after the host has been migrated from a first data center to a second data center. This task may identify the host using a first ID of the host on the first data center. The host may be migrated to the second data center, with the host being identified on the second data center using a second ID. The system stores a correlation between the first ID and the second ID of the host. The system utilizes the second ID to retrieve a third ID for communicating with the host on the second data center to cause the host to execute the script on the second data center.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

44.

Protecting virtual machine data in cloud environments

      
Application Number 16520462
Grant Number 11200327
Status In Force
Filing Date 2019-07-24
First Publication Date 2021-12-14
Grant Date 2021-12-14
Owner Veritas Technologies LLC (USA)
Inventor
  • Tripathy, Soumya
  • Ghosh, Subhadeep

Abstract

Disclosed are methods and systems that include receiving updated operating system information, encrypting the updated operating system information, and updating a map file. The updated operating system information is received at an encryption virtual machine. The encrypting the updated operating system information results in the encrypted updated operating system information. The encrypting the updated operating system information is managed by the encryption virtual machine. The updated operating system information is encrypted in response to receipt of the updated operating system information. The updated operating system information is encrypted using an encryption key. In certain embodiments, the updating includes storing operating system metadata in the map file (where the operating system metadata is associated with the encrypted updated operating system information) and storing the encryption key in the map file (where the storing the encryption key in the map file associates the encryption key with the operating system metadata).

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/4401 - Bootstrapping

45.

Fingerprint backward compatibility in deduplication backup systems

      
Application Number 15798540
Grant Number 11163748
Status In Force
Filing Date 2017-10-31
First Publication Date 2021-11-02
Grant Date 2021-11-02
Owner Veritas Technologies LLC (USA)
Inventor
  • Cheng, Shuai
  • Zhang, Xianbo
  • Shan, Cheng
  • Zhang, Chunzhong
  • Zhang, Jinchang
  • Jiang, Wen Feng
  • Sun, Dongxu
  • Jin, Xinbao

Abstract

Disclosed herein are methods, systems, and processes to optimize and manage fingerprint backward compatibility in deduplication backup computing systems. A new fingerprint is generated for a segment object stored in a data container based on a new fingerprinting process. A header file is modified by replacing an old fingerprint for the segment object based on an old fingerprinting process with the new fingerprint. An entry including information indicating an association between the old fingerprint and the new fingerprint is created in a fingerprint map file.

IPC Classes  ?

  • G06F 16/23 - Updating
  • G06F 16/21 - Design, administration or maintenance of databases
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

46.

Method for providing an indication of the exact search hit within a large universe of contextual information

      
Application Number 13920584
Grant Number 11151103
Status In Force
Filing Date 2013-06-18
First Publication Date 2021-10-19
Grant Date 2021-10-19
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Ranade, Rujuta
  • Coyle, Michael J.

Abstract

A search system obtains a search result comprising an entry. The search result is based on a set of search constraints. The search system generates a hit index based on the search result and each constraint in the set of search constraints. The hit index includes identification information of an element associated with the entry that caused the entry to be included in the search result. The search system updates the search result to comprise an indication of the element associated with the entry based on the hit index.

IPC Classes  ?

  • G06F 16/22 - Indexing; Data structures therefor; Storage structures

47.

OPTIMIZE BACKUP FROM UNIVERSAL SHARE

      
Application Number US2021024850
Publication Number 2021/202503
Status In Force
Filing Date 2021-03-30
Publication Date 2021-10-07
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Zhang, Shuangmin
  • Zhang, Xianbo
  • Li, Shengzhao
  • Jiang, Xu
  • Wu, Weibao

Abstract

A method and apparatus is disclosed for optimized backups. In one embodiment, the method includes creating a deduplicated universal share of data objects, which in turn includes receiving a universal share of the data objects, deduplicating the universal share, wherein deduplicating the universal share includes: hashing segments of the universal share to generate respective universal share segment fingerprints; comparing the universal share segment fingerprints to fingerprints for respective segments held in deduplication storage in order to identify segments in the deduplication storage that equate to the universal share segments, respectively, of the universal share; storing identifiers that directly or indirectly identify locations, respectively, of the segments, respectively, in the deduplication storage that equate to the universal share segments, respectively, of the universal share. After creating the deduplicated universal share, a deduplicated backup of the universal share is created without reassembling the universal share from segments held in the deduplication storage, the creating the deduplicated backup including: creating a list that comprises copies of the stored identifiers, and storing the list.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

48.

Systems and methods for automatic storage tiering

      
Application Number 15941926
Grant Number 11137926
Status In Force
Filing Date 2018-03-30
First Publication Date 2021-10-05
Grant Date 2021-10-05
Owner Veritas Technologies LLC (USA)
Inventor
  • Pendharkar, Niranjan
  • Banerjee, Anindya
  • Ramachandrappa, Naveen
  • Mula, Ramya

Abstract

The disclosed computer-implemented method for automatic storage tiering may include (1) receiving characteristics of previous accesses to storage system objects stored in a data storage system including multiple storage tiers, (2) generating, based on the characteristics of previous accesses to the storage system objects, a model that predicts characteristics of future accesses to the storage system objects, (3) selecting, based on the model, a next storage tier of the multiple storage tiers for each of the storage system objects, and (4) relocating at least some of the storage system objects from a current storage tier to the next storage tier selected for each of the at least some of the storage system objects. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06N 20/00 - Machine learning

49.

Optimize backup from universal share

      
Application Number 16835657
Grant Number 11928030
Status In Force
Filing Date 2020-03-31
First Publication Date 2021-09-30
Grant Date 2024-03-12
Owner Veritas Technologies LLC (USA)
Inventor
  • Zhang, Shuangmin
  • Zhang, Xianbo
  • Li, Shengzhao
  • Jiang, Xu
  • Wu, Weibao

Abstract

A method includes creating a deduplicated universal share (US) of data objects, which in turn includes receiving a US of the data objects, deduplicating the US, wherein deduplicating the US includes: hashing segments of the US to generate respective US segment fingerprints; comparing US segment fingerprints to fingerprints for respective segments held in deduplication storage in order to identify segments in the deduplication storage that equate to the US segments, respectively, of the US; storing identifiers that directly or indirectly identify locations, respectively, of the segments, respectively, in the deduplication storage that equate to the US segments, respectively, of the US. After creating the deduplicated universal share, a deduplicated backup of the US is created without reassembling the US from segments held in the deduplication storage, the creating the deduplicated backup including: creating a list that comprises copies of the stored identifiers, and storing the list.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

50.

Sharing services between deduplication systems

      
Application Number 16574707
Grant Number 11132338
Status In Force
Filing Date 2019-09-18
First Publication Date 2021-09-28
Grant Date 2021-09-28
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Zhang, Xianbo
  • Yin, Zhuhua

Abstract

Disclosed herein are methods, systems, and processes to share data storage-related services between multiple deduplication systems. In one embodiment, the method comprises receiving an indication that a local file corresponds to a shared file; virtually segmenting the shared file into a plurality of data segments, where virtually segmenting the shared file generates data segment fingerprints and library virtual mapping metadata, and the library virtual mapping metadata comprises fingerprint information corresponding to each of the plurality of data segments, and at least one of a unique file identifier, an offset of each data segment, and a size of each data segment; and transmitting the library virtual mapping metadata, where the library virtual mapping metadata is configured to be used in a subsequent deduplication operation.

IPC Classes  ?

  • G06F 16/174 - Redundancy elimination performed by the file system
  • G06F 16/13 - File access structures, e.g. distributed indices
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

51.

SYSTEMS AND METHODS FOR PROTECTING A FOLDER FROM UNAUTHORIZED FILE MODIFICATION

      
Application Number 16822821
Status Pending
Filing Date 2020-03-18
First Publication Date 2021-09-23
Owner Veritas Technologies LLC (USA)
Inventor
  • Subramanian, Narayan
  • Panna, Arindam
  • Sridharan, Srineet

Abstract

The disclosed computer-implemented method for protecting a folder from unauthorized file modification may include receiving, from a remote device, a modify request for a target file in a folder and determining whether the folder is a protected folder. The method may also include determining, in response to determining the folder is the protected folder, whether the remote device is a trusted host. The method may further include allowing, in response to determining that the remote device is the trusted host, the modify request for the target file. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 16/176 - Support for shared access to files; File sharing support
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

52.

SYSTEMS AND METHODS FOR PROTECTING A FOLDER FROM UNAUTHORIZED FILE MODIFICATION

      
Application Number US2021022822
Publication Number 2021/188716
Status In Force
Filing Date 2021-03-17
Publication Date 2021-09-23
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Subramanian, Narayan
  • Panna, Arindam
  • Sridharan, Srineet

Abstract

The disclosed computer-implemented method for protecting a folder from unauthorized file modification may include receiving, from a remote device, a modify request for a target file in a folder and determining whether the folder is a protected folder. The method may also include determining, in response to determining the folder is the protected folder, whether the remote device is a trusted host. The method may further include allowing, in response to determining that the remote device is the trusted host, the modify request for the target file. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

53.

Systems and methods for using dynamic templates to create application containers

      
Application Number 16744092
Grant Number 11126448
Status In Force
Filing Date 2020-01-15
First Publication Date 2021-09-21
Grant Date 2021-09-21
Owner Veritas Technologies LLC (USA)
Inventor Christensen, Aaron

Abstract

The disclosed computer-implemented method for using dynamic templates to create application containers may include (i) identifying an application that is to be deployed in a container, (ii) creating a dynamic template that comprises at least one variable parameter and that defines at least a portion of an operating environment of the container (iii) generating a value of the variable parameter during deployment of the application, (iv) processing the dynamic template to create a configuration file that comprises the value of the variable parameter, and (v) triggering a container initialization system to create, based on the configuration file, the container such that the container isolates a user space of the application from other software on a host system while sharing a kernel space with the other software. Various other methods systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 9/445 - Program loading or initiating
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 8/60 - Software deployment

54.

Routing I/O requests to improve read/write concurrency

      
Application Number 15150649
Grant Number 11113247
Status In Force
Filing Date 2016-05-10
First Publication Date 2021-09-07
Grant Date 2021-09-07
Owner Veritas Technologies LLC (USA)
Inventor
  • Jia, Yingsong
  • Liu, Xiangrui
  • Jia, Hong Yu
  • Li, Shengzhao

Abstract

Systems, apparatuses, methods, and computer readable mediums for implementing an I/O router to route requests based on characteristics of the requests. The I/O router may receive requests targeting a single file, and the I/O router may route requests to multiple extent maps based on characteristics of the requests. For example, requests of a first size may be mapped to a first extent map, requests of a second size may be mapped to a second extent map, requests of a third size may be mapped to a third extent map, and so on. Additionally, the system may utilize different deduplication policies for the different types of requests which are mapped to different extent maps.

IPC Classes  ?

  • G06F 16/176 - Support for shared access to files; File sharing support
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 16/182 - Distributed file systems
  • G06F 16/174 - Redundancy elimination performed by the file system

55.

Methods and systems for data resynchronization in a replication environment

      
Application Number 16805294
Grant Number 11531604
Status In Force
Filing Date 2020-02-28
First Publication Date 2021-09-02
Grant Date 2022-12-20
Owner Veritas Technologies LLC (USA)
Inventor
  • Patil, Rushikesh
  • Hasbe, Sunil

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for scalable deduplication in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include determining whether a source data store and a replicated data store are unsynchronized and, in response to a determination that the source data store and the replicated data store are unsynchronized, performing a resynchronization operation. The source data stored in the source data store is replicated to replicated data in the replicated data store. The resynchronization operation resynchronizes the source data and the replicated data.

IPC Classes  ?

  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
  • G06F 16/907 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 3/06 - Digital input from, or digital output to, record carriers

56.

METHODS AND SYSTEMS FOR DATA RESYNCHRONIZATION IN A REPLICATION ENVIRONMENT

      
Application Number US2021015384
Publication Number 2021/173293
Status In Force
Filing Date 2021-01-28
Publication Date 2021-09-02
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Patil, Rushikesh
  • Thakur, Vishal

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for scalable deduplication in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include tracking one or more write operations executed on a target data store and sending metadata regarding the one or more write operations to a source site. The tracking comprises storing information regarding the one or more write operations in a data structure. The one or more write operations cause one or more units of data to be written to the target data store. The target data store is at a target site. The metadata comprises the information.

IPC Classes  ?

  • G06F 11/16 - Error detection or correction of the data by redundancy in hardware
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

57.

Methods and systems for data resynchronization in a replication environment

      
Application Number 16805292
Grant Number 11429640
Status In Force
Filing Date 2020-02-28
First Publication Date 2021-09-02
Grant Date 2022-08-30
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Patil, Rushikesh
  • Thakur, Vishal

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for scalable deduplication in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include tracking one or more write operations executed on a target data store and sending metadata regarding the one or more write operations to a source site. The tracking comprises storing information regarding the one or more write operations in a data structure. The one or more write operations cause one or more units of data to be written to the target data store. The target data store is at a target site. The metadata comprises the information.

IPC Classes  ?

  • G06F 16/00 - Information retrieval; Database structures therefor; File system structures therefor
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

58.

METHODS AND SYSTEMS FOR DATA RESYNCHRONIZATION IN A REPLICATION ENVIRONMENT

      
Application Number US2021015379
Publication Number 2021/173292
Status In Force
Filing Date 2021-01-28
Publication Date 2021-09-02
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Patil, Rushikesh
  • Hasbe, Sunil

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for scalable deduplication in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include determining whether a source data store and a replicated data store are unsynchronized and, in response to a determination that the source data store and the replicated data store are unsynchronized, performing a resynchronization operation. The source data stored in the source data store is replicated to replicated data in the replicated data store. The resynchronization operation resynchronizes the source data and the replicated data.

IPC Classes  ?

  • G06F 11/16 - Error detection or correction of the data by redundancy in hardware
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

59.

SYSTEMS AND METHODS FOR AGENTLESS AND ACCELERATED BACKUP OF A DATABASE

      
Application Number US2021019346
Publication Number 2021/173620
Status In Force
Filing Date 2021-02-24
Publication Date 2021-09-02
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Bharadwaj, Vaijayanti
  • Dalal, Chirag

Abstract

The disclosed computer-implemented method for agentless and accelerated backup of a database may include, receiving, by a data backup device from a data server, blocks of data that provide a full backup of data of the data server. The method additionally includes receiving, by the data backup device from the data server, one or more native logs indicating one or more transactions performed by the data server. The method also includes determining, by the data backup device and based on the native logs, one or more changed blocks of the blocks of data. The method further includes providing, by the data backup device, a point in time restore of the data server by creating a synthetic full backup that overlays one or more of the blocks of data with the one or more changed blocks, and that shares remaining blocks of the blocks of data with the full backup.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

60.

Systems and methods for replicating information with information retention systems

      
Application Number 16893219
Grant Number 11106546
Status In Force
Filing Date 2020-06-04
First Publication Date 2021-08-31
Grant Date 2021-08-31
Owner Veritas Technologies LLC (USA)
Inventor
  • Thakur, Vishal
  • Patil, Rushikesh
  • Hasbe, Sunil

Abstract

The disclosed computer-implemented method for replicating information with information retention systems may include (1) queueing information communicated between a virtual machine and a source storage device, (2) initiating creating a clone of the virtual machine, (3) sending update information sets, (4) inserting a flush marker into a network queue, (5) stopping the queueing of the information communicated between the virtual machine and the source storage device, (6) sending, after sending the update information sets, the flush marker via a source replication gateway to the target server computing device, (7) pausing replication of the source storage device, (8) resuming replication of the source storage device responsive to completing creating the clone of the virtual machine, and (9) sending, to the target server computing device, additional information communicated between the virtual machine and the source storage device after stopping the queueing. Various other methods, systems, and computer readable media are also disclosed.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/54 - Interprogram communication
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

61.

Systems and methods for agentless and accelerated backup of a database

      
Application Number 16800322
Grant Number 11372732
Status In Force
Filing Date 2020-02-25
First Publication Date 2021-08-26
Grant Date 2022-06-28
Owner Veritas Technologies LLC (USA)
Inventor
  • Bharadwaj, Vaijayanti
  • Dalal, Chirag

Abstract

The disclosed computer-implemented method for agentless and accelerated backup of a database may include, receiving, by a data backup device from a data server, blocks of data that provide a full backup of data of the data server. The method additionally includes receiving, by the data backup device from the data server, one or more native logs indicating one or more transactions performed by the data server. The method also includes determining, by the data backup device and based on the native logs, one or more changed blocks of the blocks of data. The method further includes providing, by the data backup device, a point in time restore of the data server by creating a synthetic full backup that overlays one or more of the blocks of data with the one or more changed blocks, and that shares remaining blocks of the blocks of data with the full backup.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 16/182 - Distributed file systems

62.

Application performance in replication environments

      
Application Number 16458255
Grant Number 11099752
Status In Force
Filing Date 2019-07-01
First Publication Date 2021-08-24
Grant Date 2021-08-24
Owner Veritas Technologies LLC (USA)
Inventor
  • Dighe, Sumit
  • Marathe, Shailesh

Abstract

Disclosed herein are methods, systems, and processes to improve application performance in replication environments. In one embodiment, first application input/output (I/O) throughput and second application I/O throughput are associated with a data volume and are both sampled, with the first application I/O throughput being sampled while the data volume is set to an asynchronous write acknowledgement mode and the second application I/O throughput being sampled while the data volume is set to a synchronous write acknowledgement mode. A determination is made as to whether the asynchronous write acknowledgement mode or the synchronous write acknowledgement mode provides a higher application I/O throughput for the data volume. The data volume is then set to a preferred write acknowledgement mode that is selected, based on a result of the determining, from the asynchronous write acknowledgement mode and the synchronous write acknowledgement mode, and in certain embodiments, a mixed write acknowledgement mode.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

63.

Systems and methods for selectively restoring files from virtual machine backup images

      
Application Number 15717560
Grant Number 11068353
Status In Force
Filing Date 2017-09-27
First Publication Date 2021-07-20
Grant Date 2021-07-20
Owner Veritas Technologies LLC (USA)
Inventor Ved, Amber

Abstract

The disclosed computer-implemented method for selectively restoring files from virtual machine backup images phrase may include (i) exposing a virtual disk image included in a target virtual machine backup image to an operating system of a host computing system, (ii) mounting the virtual disk image included in the target virtual machine backup image to the host computing system, (iii) determining at least one extent of a target file included in a file system included in the virtual disk image, (iv) associating the extent of the target file with a storage location included in the target virtual machine backup image, (v) generating a catalog comprising the extent of the target file associated with the storage location included in the target virtual machine backup image, and (vi) restoring the target file from the target virtual machine backup image by using the generated catalog.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

64.

Systems and methods for managing user entitlements of objects from heterogeneous content sources

      
Application Number 16374409
Grant Number 11070560
Status In Force
Filing Date 2019-04-03
First Publication Date 2021-07-20
Grant Date 2021-07-20
Owner Veritas Technologies LLC (USA)
Inventor
  • Dargude, Shailesh
  • Grandhi, Satish
  • Kavuri, Srinivas

Abstract

The disclosed computer-implemented method for managing user entitlements of objects from heterogeneous content sources may include (i) obtaining a user identifier from a user profile associated with a user, (ii) determining an entitlement for the user in an access control list (ACL) for an object of a content source, (iii) determining another entitlement for the user in another ACL for another object of another content source, wherein the content source and the other content source are associated with different systems, (iv) generating an effective entitlement of the user by associating the user identifier, the entitlement for the user in the ACL for the object, and the other entitlement for the user in the other ACL for the other object, and (v) storing the effective entitlement of the user. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

65.

System and method for downloading a file

      
Application Number 14133432
Grant Number 11070609
Status In Force
Filing Date 2013-12-18
First Publication Date 2021-07-20
Grant Date 2021-07-20
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor Kumar, Rajesh D.

Abstract

A method and system that performs file download at a client computing device after a determination that the file does not already exist on the client computing device is provided. The file download is initiated but suspended until a determination has been made that the file does not exist on the client computing device. If the file already exists (i.e., the file is a duplicate file), the user is prompted to either cancel the file download or continue the file download. However, if the file does not exist, the file download is resumed.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

66.

System for dynamically determining access constraints of data-repository objects

      
Application Number 15819864
Grant Number 11061586
Status In Force
Filing Date 2017-11-21
First Publication Date 2021-07-13
Grant Date 2021-07-13
Owner Veritas Technologies LLC (USA)
Inventor
  • Ahuja, Ruchika
  • Pandit, Bhushan

Abstract

Various systems and methods are provided for calculating a data criticality score upon ingesting a data object into a data storage system. This data criticality score can be used to control subsequent access requests for the data object. In one embodiment, a computer system receives a data object at a first node comprising a decision engine. The decision engine generates a data criticality score based, at least in part, on one or more inputs related to the data object. After calculating the data criticality score, the system uses the data criticality score to determine whether a given action is allowable for the data object. After determining whether the given action is allowable, the system receives a user request to perform a first action on the data object. The system then determines whether the user request should be granted with respect to the first action, and if allowable, performs the first action.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 13/16 - Handling requests for interconnection or transfer for access to memory bus
  • G06F 13/18 - Handling requests for interconnection or transfer for access to memory bus with priority control

67.

Systems and methods for switching replication modes in a volume replication system

      
Application Number 16695325
Grant Number 11061603
Status In Force
Filing Date 2019-11-26
First Publication Date 2021-07-13
Grant Date 2021-07-13
Owner Veritas Technologies LLC (USA)
Inventor
  • Bankar, Pritam
  • Dighe, Sumit
  • Marathe, Shailesh

Abstract

The disclosed computer-implemented method for switching replication modes in a volume replication system may include (i) in response to deciding to switch from a synchronous replication mode of a volume replication system to an asynchronous replication mode, changing, by a computing device, to the asynchronous replication mode, (ii) associating a new write request to write data to storage, (iii) determining, based on metadata of the existing write request, that the existing write request was issued in the synchronous replication mode, (iv) in response to determining that the existing write request was issued in the synchronous replication mode, processing the existing write request via the synchronous replication, and (v) processing the new write request via the asynchronous replication based on the metadata of the new write request. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

68.

Discovery and configuration of disaster recovery information

      
Application Number 14882955
Grant Number 11057264
Status In Force
Filing Date 2015-10-14
First Publication Date 2021-07-06
Grant Date 2021-07-06
Owner Veritas Technologies LLC (USA)
Inventor
  • Ghare, Shrikant
  • Mukherjee, Arindam

Abstract

Various systems and methods related to disaster recovery (DR). For example, one method involves automatically discovering infrastructure information for one or more assets located in one or more primary sites and/or one or more recovery sites. The method also involves storing the infrastructure information in a database. The method also involves generating DR configuration information.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/14 - Counter-measures to a fault

69.

Method and system for executing workload orchestration across data centers

      
Application Number 17141703
Grant Number 11748319
Status In Force
Filing Date 2021-01-05
First Publication Date 2021-07-01
Grant Date 2023-09-05
Owner Veritas Technologies LLC (USA)
Inventor
  • Bandopadhyay, Tushar
  • Dighe, Bharat

Abstract

Methods, computer program products, computer systems, and the like providing for executing orchestration operations across data center infrastructures are disclosed. In one embodiment, the method includes analyzing a property graph to determine whether a node representing at least one entity in a first data center infrastructure has a contact point with a node representing one or more entities representing one or more core physical or hardware-based resources in a second data center infrastructure. If a contact point exist between nodes of associated with the first and second data centers, the orchestration operation is executed on the at least one entity in the first data center and a corresponding orchestration operation is executed on at least another entity in the second data center infrastructure represented at a contact point in the dependency relationships of the property graph.

IPC Classes  ?

  • G06F 7/02 - Comparing digital values
  • G06F 16/00 - Information retrieval; Database structures therefor; File system structures therefor
  • G06F 16/215 - Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
  • G06F 16/23 - Updating
  • G06F 16/901 - Indexing; Data structures therefor; Storage structures
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements

70.

Systems and methods for clustering data to improve data analytics

      
Application Number 15141868
Grant Number 11036800
Status In Force
Filing Date 2016-04-29
First Publication Date 2021-06-15
Grant Date 2021-06-15
Owner Veritas Technologies LLC (USA)
Inventor
  • Kayyoor, Ashwin
  • Aloysius, Henry
  • Tca, Bashyam

Abstract

A computer-implemented method for clustering data to improve data analytics may include (1) extracting a social graph from a data set of messages, the social graph indicating messages as edges such that nodes of the edges indicate corresponding senders and recipients in sender-recipient relationships, (2) detecting communities of collaborators by identifying clusters of nodes within the social graph, (3) applying the identified clusters of nodes within the social graph to a grouping calculation to group the messages of the data set into groups of messages, and (4) providing, through a computing interface, results of a data analytics operation to an end user based at least in part on applying the identified clusters of nodes within the social graph to the grouping calculation. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 16/00 - Information retrieval; Database structures therefor; File system structures therefor
  • G06F 16/901 - Indexing; Data structures therefor; Storage structures
  • H04L 12/58 - Message switching systems
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

71.

METHODS AND SYSTEMS FOR SCALABLE DEDUPLICATION

      
Application Number US2020061912
Publication Number 2021/108344
Status In Force
Filing Date 2020-11-24
Publication Date 2021-06-03
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Yang, Yong
  • Zhang, Xianbo
  • Wu, Weibao
  • Lei, Chao
  • Wang, Yafeng
  • Wang, Haigang
  • Wei, Lulu

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for scalable deduplication in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include receiving a data object at an assigned node, determining whether the data object includes a sub-data object, and processing the sub-data object. The assigned node is a node of a plurality of nodes of a cluster, where the data object includes a data segment, and a signature. The signature is generated based, at least in part, on data of the data segment. The processing includes sending the sub-data object to a remote node. The remote node is another node of the plurality of nodes of the cluster.

IPC Classes  ?

  • G06F 16/174 - Redundancy elimination performed by the file system
  • G06F 16/215 - Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors

72.

Methods and systems for scalable deduplication

      
Application Number 16698288
Grant Number 11741060
Status In Force
Filing Date 2019-11-27
First Publication Date 2021-05-27
Grant Date 2023-08-29
Owner Veritas Technologies LLC (USA)
Inventor
  • Yang, Yong
  • Zhang, Xianbo
  • Wu, Weibao
  • Lei, Chao
  • Wang, Yafeng
  • Wang, Haigang
  • Wei, Lulu

Abstract

Methods, computer program products, computer systems, and the like are disclosed that provide for scalable deduplication in an efficient and effective manner. For example, such methods, computer program products, and computer systems can include receiving a data object at an assigned node, determining whether the data object includes a sub-data object, and processing the sub-data object. The assigned node is a node of a plurality of nodes of a cluster, where the data object includes a data segment, and a signature. The signature is generated based, at least in part, on data of the data segment. The processing includes sending the sub-data object to a remote node. The remote node is another node of the plurality of nodes of the cluster.

IPC Classes  ?

  • G06F 16/215 - Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors

73.

Low cost, heterogeneous method of transforming replicated data for consumption in the cloud

      
Application Number 17161765
Grant Number 11366724
Status In Force
Filing Date 2021-01-29
First Publication Date 2021-05-27
Grant Date 2022-06-21
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Sarda, Pooja
  • Vaidya, Anish A.
  • Mageswaran, Manjunath

Abstract

Disclosed are methods and the like that provide for transforming replicated data for consumption in the cloud, for example. Such methods can include attaching a target gateway node at a secondary site to a storage device at the secondary site, searching for an identifier stored in the storage device, and storing replicated data in the replication volume. The identifier is associated with an offset stored in the storage device, and the offset identifies a starting location of a replication volume in the storage device. The replicated data is received by the target gateway node from a source gateway node at a primary site. A starting location is received with the replicated data. The target gateway node stores the replicated data at a first location in the storage volume, and the first location is determined based, at least in part, on the starting location and the first storage location.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

74.

HACKERTRACK

      
Application Number 210887400
Status Registered
Filing Date 2021-05-21
Registration Date 2023-07-26
Owner Veritas Technologies LLC (USA)
NICE Classes  ? 41 - Education, entertainment, sporting and cultural services

Goods & Services

(1) Entertainment services, namely, providing online video games

75.

Container-based upgrades for appliances

      
Application Number 15907489
Grant Number 11010259
Status In Force
Filing Date 2018-02-28
First Publication Date 2021-05-18
Grant Date 2021-05-18
Owner Veritas Technologies LLC (USA)
Inventor
  • Geng, Chao
  • Wang, Xi

Abstract

Disclosed herein are methods, systems, and processes to perform container-based upgrades to an appliance operating system. An upgraded container is generated by producing a container image. Producing the container image includes generating a checkpoint of a portion of a file system associated with an appliance that includes a portion of an operating system. The container includes the container image and is designated for an upgrade operation that upgrades the portion of the operating system.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 8/65 - Updates
  • G06F 8/658 - Incremental updates; Differential updates
  • G06F 9/445 - Program loading or initiating

76.

Methods and systems relating to network based storage retention

      
Application Number 17125054
Grant Number 11630744
Status In Force
Filing Date 2020-12-17
First Publication Date 2021-05-13
Grant Date 2023-04-18
Owner Veritas Technologies LLC (USA)
Inventor
  • Bourgeois, Geoffrey
  • Campbell, Greg

Abstract

Cloud storage provides accessible interfaces, near-instant elasticity, scalability, multi-tenancy, and metered resources in a distributed framework providing fault tolerant solutions with high data durability. Stored data may have legal or compliance requirements defining retention periods ensuring the data is preserved without modification for a period of time. However, data privacy rules such as the European Union's General Data Protection Regulation can require modification or destruction of records at any point. Further, many retention structures are user driven but users make mistakes requiring a change to the record's associated retention period. Retention period mechanism enforced with immutable storage can satisfy compliance requirements but run contrary to data privacy rules as well as blocking adjustments. Accordingly, processes, methods and systems are required allowing retention policy application to data being stored within network based storage as well as allowing retention policies to be applied to stored data thereby facilitating retention period adjustments.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • H04L 9/40 - Network security protocols
  • G06F 16/33 - Querying
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 16/35 - Clustering; Classification
  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

77.

Extent map performance

      
Application Number 15445184
Grant Number 10996857
Status In Force
Filing Date 2017-02-28
First Publication Date 2021-05-04
Grant Date 2021-05-04
Owner Veritas Technologies LLC (USA)
Inventor
  • Yang, Yong
  • Wu, Weibao
  • Liu, Gallen

Abstract

Disclosed are methods, systems, and processes to improve extent map performance A request for a data block is received. In response to detecting a cache miss, a temporary table is searched for the data block. If the data block is not found in the temporary table, a base table is searched for the data block.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 12/10 - Address translation

78.

Systems and methods for file system metadata analytics

      
Application Number 15594471
Grant Number 10997499
Status In Force
Filing Date 2017-05-12
First Publication Date 2021-05-04
Grant Date 2021-05-04
Owner Veritas Technologies LLC (USA)
Inventor
  • Kayyoor, Ashwin
  • Vaidya, Meetali
  • Dargude, Shailesh
  • Ashwani, Himanshu

Abstract

The disclosed computer-implemented method for file system metadata analytics may include (i) creating a set of training data to train a machine learning model to analyze tokens that describe files within a file system, the set of training data comprising a first set of vectors, wherein each vector represents tokens that describes files that are frequently accessed by a common set of users, and a second set of vectors, wherein each vector represents tokens that describes files with common file path ancestors, (ii) training, using the set of training data, the machine learning model, (iii) determining, by providing at least one input token to the machine learning model, that the input token is related to at least one additional token, and (iv) performing an action responsive to observing the input token and involving the additional token and the file system. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

79.

Storage tier selection for replication and recovery

      
Application Number 17132877
Grant Number 11463518
Status In Force
Filing Date 2020-12-23
First Publication Date 2021-04-22
Grant Date 2022-10-04
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Gorantla, Hrudil
  • Ghosh, Subhadeep
  • Hasbe, Sunil
  • Rajaa, Subash

Abstract

Disclosed herein are methods, systems, and processes for migration between storage tiers. Such a method, for example, can include extracting one or more characteristics of a replication workload, determining one or more storage costs of each storage tier of a plurality of storage tiers (where the one or more storage costs are determined for the replication workload and the one or more storage costs are determined based, at least in part, on the one or more characteristics), identifying one or more storage tiers of the plurality of storage tiers (where the identifying is based, at least in part, on the one or more storage costs), and migrating at least a portion of the replication workload from a target storage unit in an initial storage tier to a storage unit in the one or more storage tiers.

IPC Classes  ?

  • H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
  • H04L 41/5019 - Ensuring fulfilment of SLA
  • G06F 3/06 - Digital input from, or digital output to, record carriers

80.

Fingerprint change during data operations

      
Application Number 15959489
Grant Number 10983867
Status In Force
Filing Date 2018-04-23
First Publication Date 2021-04-20
Grant Date 2021-04-20
Owner Veritas Technologies LLC (USA)
Inventor
  • Zhang, Xianbo
  • Wang, Haigang

Abstract

Various systems, methods, and processes for caching and referencing multiple fingerprints while data operations are ongoing are disclosed. A first fingerprint is generated based on a first fingerprinting process. The first fingerprint is stored in association with a second fingerprint, which is based on a second fingerprinting process. The first fingerprint and the second fingerprint are associated with the same data segment. Data operations such as a backup operation, a restore operation, or a replication operation can be performed while the conversion of the data segment from the second fingerprint to the first fingerprint is ongoing.

IPC Classes  ?

  • G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 16/22 - Indexing; Data structures therefor; Storage structures
  • G06F 16/245 - Query processing

81.

Storage device sharing among virtual machines

      
Application Number 16449746
Grant Number 10970106
Status In Force
Filing Date 2019-06-24
First Publication Date 2021-04-06
Grant Date 2021-04-06
Owner Veritas Technologies LLC (USA)
Inventor Vemuri, Hari Krishna

Abstract

Disclosed herein are various systems, methods, and processes for sharing a storage device with multiple virtual machines. A pseudo-identity is created for a storage device. Information in a hypervisor is configured to modify a response to a command issued to the storage device by a virtual machine. Physical characteristics of the storage device are determined and it is also determined whether the physical characteristics are acceptable. If the physical characteristics are acceptable, a virtual disk associated with the virtual machine is used. If the physical characteristics are unacceptable, a mapping of the virtual machine is migrated to another storage device.

IPC Classes  ?

  • G06F 12/10 - Address translation
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

82.

SYSTEMS AND METHODS FOR EFFICIENTLY BACKING UP LARGE DATASETS

      
Application Number US2020052294
Publication Number 2021/061831
Status In Force
Filing Date 2020-09-23
Publication Date 2021-04-01
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Bharadwaj, Vaijayanti
  • Dalal, Chirag

Abstract

A computer-implemented method for efficiently backing up large datasets may include (i) identifying data on an application server to be deduplicated by a deduplication server and then stored on a backup server, (ii) dividing the data into subsets, and (iii) for each subset of data subsequent to an initial subset of data, (a) transferring the subset of data to the deduplication server in response to detecting that a previous subset of data has completed transfer to the deduplication server, (b) deduplicating the subset of data in response to detecting that the previous subset of data has completed deduplication, and (c) transferring a deduplicated version of the subset of data to the backup server in response to detecting that the subset of data has completed deduplication and the previous subset of data has completed transfer to the backup server. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 16/174 - Redundancy elimination performed by the file system

83.

Systems and methods for generating a topic tree for digital information

      
Application Number 15582625
Grant Number 10963501
Status In Force
Filing Date 2017-04-29
First Publication Date 2021-03-30
Grant Date 2021-03-30
Owner Veritas Technologies LLC (USA)
Inventor
  • Ramachandrappa, Naveen
  • Mula, Ramya
  • Kayyoor, Ashwin
  • Tca, Bashyam

Abstract

The disclosed computer-implemented method for generating a topic tree for digital information may include parsing the digital information and extracting a set of keywords. This method may also include comparing the set of keywords to an ontology and extracting hierarchies from the ontology that match the set of keywords. The extracted ontology entries may then be pruned and sorted. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 16/00 - Information retrieval; Database structures therefor; File system structures therefor
  • G06F 16/33 - Querying
  • G06F 7/08 - Sorting, i.e. grouping record carriers in numerical or other ordered sequence according to the classification of at least some of the information they carry
  • G06F 16/31 - Indexing; Data structures therefor; Storage structures

84.

Systems and methods for efficiently backing up large datasets

      
Application Number 16582027
Grant Number 11829250
Status In Force
Filing Date 2019-09-25
First Publication Date 2021-03-25
Grant Date 2023-11-28
Owner Veritas Technologies LLC (USA)
Inventor
  • Bharadwaj, Vaijayanti
  • Dalal, Chirag

Abstract

A computer-implemented method for efficiently backing up large datasets may include (i) identifying data on an application server to be deduplicated by a deduplication server and then stored on a backup server, (ii) dividing the data into subsets, and (iii) for each subset of data subsequent to an initial subset of data, (a) transferring the subset of data to the deduplication server in response to detecting that a previous subset of data has completed transfer to the deduplication server, (b) deduplicating the subset of data in response to detecting that the previous subset of data has completed deduplication, and (c) transferring a deduplicated version of the subset of data to the backup server in response to detecting that the subset of data has completed deduplication and the previous subset of data has completed transfer to the backup server. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 16/215 - Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
  • G06F 16/22 - Indexing; Data structures therefor; Storage structures
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

85.

Flexible associativity in multitenant clustered environments

      
Application Number 17109642
Grant Number 11271999
Status In Force
Filing Date 2020-12-02
First Publication Date 2021-03-25
Grant Date 2022-03-08
Owner Veritas Technologies LLC (USA)
Inventor
  • Yadav, Sunil
  • Sarwate, Pranav

Abstract

Disclosed herein are methods, systems, and processes to provide flexible associativity for multitenant applications operating in clustered computing environments. One such method involves updating a configuration file to produce an updated configuration file by generating new relationship information based on associations between a dependent application represented by a parent object and a dependee application represented by a child object. In certain embodiments, the new relationship information is stored in a metadata object.

IPC Classes  ?

  • G06F 15/177 - Initialisation or configuration control
  • H04L 67/1034 - Reaction to server failures by a load balancer
  • H04L 67/00 - Network arrangements or protocols for supporting network services or applications
  • H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network

86.

Lazy bare metal restore

      
Application Number 14874669
Grant Number 10956174
Status In Force
Filing Date 2015-10-05
First Publication Date 2021-03-23
Grant Date 2021-03-23
Owner Veritas Technologies LLC (USA)
Inventor
  • Patil, Dhanashri Parasharam
  • Katlamudi, Narendra
  • Kulkarni, Anay Shrikant
  • Mhetre, Amar

Abstract

Systems, apparatuses, methods, and computer readable mediums for performing a lazy bare metal restore process. A system may boot into a mini-OS environment and recover only the OS volumes while running in the mini-OS environment. Then, the system may boot into the target OS in restricted mode, using the recovered OS volumes, wherein restricted mode is utilized so as to prevent any applications from running. While the system is running the target OS in restricted mode, the system may restore the remainder of the backup data. Then, once all of the data has been recovered, the system may boot into the target OS in normal mode.

IPC Classes  ?

  • G06F 9/4401 - Bootstrapping
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

87.

Securing internal services in a distributed environment

      
Application Number 16577346
Grant Number 10958767
Status In Force
Filing Date 2019-09-20
First Publication Date 2021-03-23
Grant Date 2021-03-23
Owner Veritas Technologies LLC (USA)
Inventor Goel, Vikas

Abstract

Disclosed herein are methods, systems, and processes to secure internal services in a distributed computing environment. A service packet that includes a service call from a source appliance is intercepted at a server. A determination is made that the service call is for an internal service provided by the source appliance and includes client information with client process properties. The service packet is demultiplexed. A determination is made that rule attributes associated with the internal service match the client process properties. The client information is removed from the service packet and the service call is forwarded to the server.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake

88.

Systems and methods for marking application-consistent points-in-time

      
Application Number 16563611
Grant Number 11226870
Status In Force
Filing Date 2019-09-06
First Publication Date 2021-03-11
Grant Date 2022-01-18
Owner Veritas Technologies LLC (USA)
Inventor
  • Dalal, Chirag
  • Bharadwaj, Vaijayanti
  • Kulkarni, Pradip

Abstract

The disclosed computer-implemented method for marking application-consistent points-in-time may include intercepting, by an I/O filter, a write request from a guest virtual machine to a virtual machine disk and queueing the write request in an I/O filter queue. The method may include sending the write request to the virtual machine disk and receiving a write completion message from the virtual machine disk. The method may also include sending, in response to the write completion message, the write request to an I/O daemon, and queueing the write request in an I/O daemon queue. The method may further include sending the write completion message to the guest virtual machine, and sending the write request to a backup gateway such that the backup gateway mimics writes to the virtual machine disk. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

89.

SYSTEMS AND METHODS FOR MARKING APPLICATION-CONSISTENT POINTS-IN-TIME

      
Application Number US2020049020
Publication Number 2021/046098
Status In Force
Filing Date 2020-09-02
Publication Date 2021-03-11
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Dalal, Chirag
  • Bharadwaj, Vaijayanti
  • Kulkarni, Pradip

Abstract

The disclosed computer-implemented method for marking application-consistent points-in-time may include intercepting, by an I/O filter, a write request from a guest virtual machine to a virtual machine disk and queueing the write request in an I/O filter queue. The method may include sending the write request to the virtual machine disk and receiving a write completion message from the virtual machine disk. The method may also include sending, in response to the write completion message, the write request to an I/O daemon, and queueing the write request in an I/O daemon queue. The method may further include sending the write completion message to the guest virtual machine, and sending the write request to a backup gateway such that the backup gateway mimics writes to the virtual machine disk. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

90.

Methods and systems relating to network based storage

      
Application Number 17098773
Grant Number 11789828
Status In Force
Filing Date 2020-11-16
First Publication Date 2021-03-11
Grant Date 2023-10-17
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor
  • Bourgeois, Geoffrey
  • Campbell, Greg

Abstract

Cloud storage provides for accessible interfaces, near-instant elasticity and scalability, multi-tenancy, and metered resources within a framework of distributed resources acing to provide highly fault tolerant solutions with high data durability. However, cloud storage also has drawbacks and limitations with information uploading and how information is subsequently accessed.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • H04L 9/40 - Network security protocols
  • G06F 16/33 - Querying
  • G06F 16/35 - Clustering; Classification
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

91.

Low cost, heterogeneous method of transforming replicated data for consumption in the cloud

      
Application Number 16416387
Grant Number 10942817
Status In Force
Filing Date 2019-05-20
First Publication Date 2021-03-09
Grant Date 2021-03-09
Owner Veritas Technologies LLC (USA)
Inventor
  • Sarda, Pooja
  • Vaidya, Anish A.
  • Mageswaran, Manjunath

Abstract

Presented herein is functionality for using a recovery computing system to perform a failover where the recovery computing system is communicatively coupled to a homogeneous and/or heterogeneous primary computing system. In one embodiment, this functionality allows the recovery computing system to disconnect a first recovery application node from a contiguous storage volume after the contiguous storage volume had been created by the first recovery application node, and to then use a recovery gateway node to store replicated data on the continguous storage volume, where the recovery gateway node and the contiguous storage volume are both coupled to the recovery computing system. In response to detecting a failure on the primary computing system, performing a failover to the recovery computing system, where performing the failover comprises attaching the contiguous storage volume to a second recovery application node and bringing the second recovery application node online.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

92.

Systems and methods for updating email analytics databases

      
Application Number 15067227
Grant Number 10936617
Status In Force
Filing Date 2016-03-11
First Publication Date 2021-03-02
Grant Date 2021-03-02
Owner Veritas Technologies LLC (USA)
Inventor
  • Searls, Kirk L.
  • Christensen, Aaron

Abstract

The disclosed computer-implemented method for updating email analytics databases may include (1) identifying an email database with a native format and an email analytics database that stores a copy of data in the email database in an analytics-friendly format that is denormalized relative to the native format of the email database, (2) capturing a log file comprising information that is about at least one recent change to the email database and that is formatted using the native format of the email database, (3) extracting the information about the recent change to the email database from the log file by transforming the information from the native format of the email database into the analytics-friendly format, and (4) updating the email analytics database to reflect the recent change to the email database by using the extracted information. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/23 - Updating
  • G06F 16/17 - File systems; File servers - Details of further file system functions

93.

Systems and methods for preparing email databases for analysis

      
Application Number 15067222
Grant Number 10938765
Status In Force
Filing Date 2016-03-11
First Publication Date 2021-03-02
Grant Date 2021-03-02
Owner Veritas Technologies LLC (USA)
Inventor
  • Schroeder, Ryan
  • Nguyen, Sinh
  • Christensen, Aaron
  • Searls, Kirk L.

Abstract

The disclosed computer-implemented method for preparing email databases for analysis may include (1) identifying an email database that stores a plurality of emails in a plurality of tables that are formatted to be managed by a specific email application, (2) using a component of the specific email application to retrieve the plurality of emails from the database, (3) creating a denormalized dataset for the plurality of emails by combining email data from at least one table from the plurality of tables with email data from at least one other table from the plurality of tables, and (4) exporting at least a portion of the data from the denormalized dataset into at least one file in an interoperable format that is capable of being read by a plurality of applications. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

94.

Cloud replication based on adaptive quality of service

      
Application Number 15252487
Grant Number 10929424
Status In Force
Filing Date 2016-08-31
First Publication Date 2021-02-23
Grant Date 2021-02-23
Owner VERITAS TECHNOLOGIES LLC (USA)
Inventor Vaidya, Anish A.

Abstract

Disclosed herein are methods, systems, and processes to perform cloud replication based on adaptive Quality of Service. A replication stream is monitored over a period of time. The replication stream includes write operations issued by an application, and is associated with preset parameters. Replication parameters applicable to the replication stream are determined. The replication parameters are configured to be used in a replication operation. The preset parameters and the replication parameters are stored.

IPC Classes  ?

  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

95.

Systems and methods for write-once-read-many storage

      
Application Number 17088938
Grant Number 11461282
Status In Force
Filing Date 2020-11-04
First Publication Date 2021-02-18
Grant Date 2022-10-04
Owner Veritas Technologies LLC (USA)
Inventor
  • Mahadik, Pooja
  • Boyer, Brad
  • Banerjee, Anindya

Abstract

The disclosed computer-implemented method for write-once-read-many storage may include (1) receiving, at a file system on the computing device, a request to assign a write-once-read-many (WORM) attribute to a file, wherein the request is received from an application, (2) setting, in response to the request to assign the WORM attribute to the file, a WORM flag in an extended attribute associated with the file, and (3) associating with the file, in response to the setting of the WORM flag, a retention period attribute and read-only access until the end of the retention period. The provided systems and methods may provide per-file WORM support at a file system level using extended attributes of the file system. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06F 16/18 - File system types
  • G06F 16/13 - File access structures, e.g. distributed indices
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems

96.

Container reclamation using probabilistic data structures

      
Application Number 17080320
Grant Number 11409766
Status In Force
Filing Date 2020-10-26
First Publication Date 2021-02-11
Grant Date 2022-08-09
Owner Veritas Technologies LLC (USA)
Inventor
  • Jia, Yingsong
  • Wang, Xin
  • Zhang, Guangbin

Abstract

Disclosed herein is the creation of probabilistic data structures for container reclamation. One method involves retrieving a segment object list of a data container and creating a probabilistic data structure. The segment object list comprises a plurality of segment objects, the data container comprises the plurality of segment objects and a plurality of data objects, and each segment object of the plurality of segment objects comprises a hash value determined by performing a hashing function on a corresponding data object of the plurality of data objects. The creating includes, for each segment object in the segment object list, identifying an element of a plurality of elements of the probabilistic data structure using a hash value of the each segment object and setting the element to indicate the segment object references a corresponding data object of the plurality of data objects.

IPC Classes  ?

  • G06F 16/22 - Indexing; Data structures therefor; Storage structures
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
  • G06F 17/18 - Complex mathematical operations for evaluating statistical data

97.

Dual-mode deduplication based on backup history

      
Application Number 15964309
Grant Number 10915260
Status In Force
Filing Date 2018-04-27
First Publication Date 2021-02-09
Grant Date 2021-02-09
Owner Veritas Technologies LLC (USA)
Inventor
  • Lei, Chao
  • Yuan, Hui
  • Dong, Qing Fu

Abstract

Disclosed herein are methods, systems, and processes to perform dual-mode deduplication based on backup history. A fingerprint of a data segment of a data stream is calculated and a determination is made as to whether the fingerprint of the data segment matches a corresponding fingerprint in a cache. If the fingerprint matches the corresponding fingerprint, another fingerprint of a subsequent data segment of the data stream is calculated. If the fingerprint does not match the corresponding fingerprint, a segment boundary of the data stream is calculated based on a hash value, a determination is made that a new fingerprint calculated based on the segment boundary does not match the corresponding fingerprint, segment boundaries and new fingerprints are calculated, and a determination is made that a first fingerprint matches another corresponding fingerprint in the cache.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 16/907 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
  • G06F 12/0893 - Caches characterised by their organisation or structure
  • G06F 16/13 - File access structures, e.g. distributed indices
  • G06F 16/174 - Redundancy elimination performed by the file system

98.

Systems and methods for automatically linking data analytics to storage

      
Application Number 15428134
Grant Number 10909136
Status In Force
Filing Date 2017-02-08
First Publication Date 2021-02-02
Grant Date 2021-02-02
Owner Veritas Technologies LLC (USA)
Inventor
  • Schroeder, Ryan
  • Christensen, Aaron
  • Searls, Kirk

Abstract

The disclosed computer-implemented method for automatically linking data analytics to storage may include (1) identifying a request to provision storage for a data analytics task, (2) collecting information relating to the data analytics task, the information comprising at least one of a data type of the data being used as input for the data analytics task and a characteristic of the data analytics task, (3) using a self-service provisioning tool to automatically compute, based on the collected information, a suggested type and size of data storage for the data analytics task, and (4) automatically provisioning data storage for the data analytics task based on the suggested type and size. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

99.

Systems and methods for categorizing electronic messages for compliance reviews

      
Application Number 16562404
Grant Number 10909198
Status In Force
Filing Date 2019-09-05
First Publication Date 2021-02-02
Grant Date 2021-02-02
Owner Veritas Technologies LLC (USA)
Inventor
  • Gharmalkar, Ramesh
  • Chaudhari, Nitin
  • Patil, Ujwala

Abstract

The disclosed computer-implemented method for categorizing electronic messages for compliance reviews may include (1) identifying, as part of a compliance review for an organization, an uncategorized electronic message sent or received by a supervised user within the organization, (2) comparing the uncategorized electronic message with information gathered from previously categorized electronic messages sent or received by supervised users within the organization, (3) determining, based at least in part on the comparison, a relevance level of the uncategorized electronic message with respect to the compliance review, (4) receiving, from a compliance reviewer, feedback indicating whether the determined relevance level is correct, and (5) updating the previously gathered information based on the feedback from the compliance reviewer. Various other methods, systems, and computer-readable media are also disclosed.

IPC Classes  ?

  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06F 16/2457 - Query processing with adaptation to user needs
  • H04L 12/58 - Message switching systems

100.

Systems and methods for prioritizing cache objects for deletion

      
Application Number 15980770
Grant Number 10896132
Status In Force
Filing Date 2018-05-16
First Publication Date 2021-01-19
Grant Date 2021-01-19
Owner Veritas Technologies LLC (USA)
Inventor
  • Patidar, Jitendra
  • Banerjee, Anindya

Abstract

Provided computer-implemented methods for prioritizing cache objects for deletion may include (1) tracking, at a computing device, a respective time an externally-accessed object spends in an external cache, (2) queuing, when the externally-accessed object is purged from the external cache, the externally-accessed object in a first queue, (3) queuing, when an internally-accessed object is released, the internally-accessed object in a second queue, (4) prioritizing objects within the first queue, based on a cache-defined internal age factor and on respective times the objects spend in the external cache and respective times the objects spend in an internal cache, (5) prioritizing objects within the second queue based on respective times the objects spend in the internal cache, (6) selecting an oldest object having a longest time in any of the first queue and the second queue, and (7) deleting the oldest object. Various other methods, systems, and computer-readable media are disclosed.

IPC Classes  ?

  • G06F 12/08 - Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
  • G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
  • G06F 12/0895 - Caches characterised by their organisation or structure of parts of caches, e.g. directory or tag array
  1     2     3     ...     16        Next Page