09 - Scientific and electric apparatus and instruments
16 - Paper, cardboard and goods made from these materials
21 - HouseHold or kitchen utensils, containers and materials; glassware; porcelain; earthenware
25 - Clothing; footwear; headgear
35 - Advertising and business services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Recorded content; Computer databases; Media content; Software; Electronic publications, downloadable; Podcasts; Information technology and audio-visual, multimedia and photographic devices; Downloadable electronic books; Videocasts; Animated cartoons; Downloadable computer graphics; Virtual and augmented reality software; Computer programmes for interactive television and for interactive games and/or quizzes. Printed matter, stationery and educational supplies; Printed books, magazines, newspapers, and other paper-based media; Teaching materials [except apparatus]; Gift cards; Posters made of paper. Tableware, cookware and containers; Glasses, drinking vessels and barware; Drinking bottles; Cups. Clothing, footwear, headgear. Advertising, marketing and promotional services. telecommunication servies; Broadcasting services; Computer communication and Internet access; Access to content, websites and portals; Providing access to platforms on the Internet; Telecommunication services provided via Internet platforms and portals; Providing internet chatrooms. Publishing, reporting, and writing of texts; Providing online electronic publications, not downloadable; Online publication of electronic books and journals; Online publication of electronic newspapers; Training, education, entertainment and sporting activities; Audio, video and multimedia production, and photography; Education; Providing of training; Entertainment; Sporting and cultural activities; Arranging of training courses; Conducting of courses; Conducting of classes; Arranging of classes; Arranging and conducting of tutorials; Provision of online tutorials; Arranging and conducting of lectures; Coaching; Organisation of quizzes, games and competitions; Television show production. IT services; Software development, programming and implementation; Hosting services and software as a service and rental of software; IT consultancy, advisory and information services.
Disclosed herein are systems and method for synthetic file scanning. In one exemplary aspect, a method may comprise, for each respective file in a plurality of files on a storage device, determining a respective likelihood of the respective file being targeted by the malicious activity, and including, in a subset of files, each respective file in the plurality of files with a respective likelihood that is greater than a threshold likelihood. The method may comprise for each respective file in the subset of files, identifying at least one fragment of the respective file that is susceptible to the malicious activity. The method may comprise extracting and storing at least one fragment from each respective file in a synthetic file, and scanning the synthetic file periodically instead of the plurality of files.
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
A method, computer program product, computing system, and system for using hot-plug virtual disks in granular recovery are described. The method may include receiving, at a cloud computing site, a backup configuration including a list of protected resources associated with a cloud computing tenant. The method may further include mounting a hot-plug virtual disk to a virtual machine including the protected resources associated with the cloud computing tenant. The method may also include collecting metadata corresponding to the protected resources associated with the cloud computing tenant. The method may additionally include generating, at the cloud computing site, a backup of the virtual machine including the protected resources associated with the cloud computing tenant. Moreover, the method may include storing the metadata corresponding to the protected resources associated with the cloud computing tenant and storing the backup of the virtual machine including the protected resources associated with the cloud computing tenant.
G06F 3/06 - Digital input from, or digital output to, record carriers
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
4.
Systems and methods for generating tokens using secure multiparty computation engines
Disclosed herein are systems and methods for generating tokens using SMPC compute engines. In one aspect, a method may hash, by a node, a data input with a salt value. The method may split, by the node, the hashed data input into a plurality of secret shares, wherein each respective secret share of the plurality of secret shares is assigned to a respective SMPC compute engine of a plurality of SMPC compute engines. The respective SMPC compute engines may be configured to collectively hash the respective secret share with a secret salt value, unknown to the plurality of SMPC compute engines. The respective SMPC compute engine may further receive a plurality of hashed secret shares from remaining SMPC compute engines of the plurality of SMPC compute engines, and generate a token, wherein the token is a combination of the hashed respective secret share and the plurality of hashed secret shares.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
H04L 29/06 - Communication control; Communication processing characterised by a protocol
A method for remote private key security is described. The method may include generating a private key and may further include generating encrypted data by encrypting data using an encryption algorithm, wherein the data is stored at a first location and the private key is for the encrypted data. The method may also include transmitting the private key to a remote private key deposit at a second location. The method may additionally include transmitting the encrypted data to a remote data center at a third location. Moreover, the method may include permitting access to the private key at the remote private key deposit to an individual at the second location in response to confirming an identity of the individual present at the second location.
Disclosed herein are systems and method for providing data access based on physical proximity between a user and a device. In one aspect, the method may comprise receiving, at the device, a request to access protected data, wherein the request comprises an authentication key for accessing the protected data. In response to verifying both that the authentication key is valid and that the device is being accessed by a proximate user based on the initial biometrics data, the method may comprise retrieving a presence profile that comprises historic biometric attributes of the authorized user. Simultaneous to collecting new biometric attributes of the proximate user, the method may comprise generating and comparing the temporary presence profile with the presence profile of the authorized user. While the temporary presence profile matches the presence profile, the method may comprise enabling access to the protected data.
A method, computer program product, computing system, and system for recovery of virtual machine files are described. The method may include creating a backup archive file, the backup archive file including a backup of a first virtual disk corresponding to a virtual machine hosted by a virtualization host device. The method may further include storing the backup archive file including the backup. The method may also include creating a second virtual disk that emulates the first virtual disk using data from the backup archive file. The method may additionally include communicatively attaching the second virtual disk to the virtual machine hosted by the virtualization host device. Moreover, the method may include transferring data from the second virtual disk to the first virtual disk corresponding to the virtual machine hosted by the virtualization host device.
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
G06F 12/08 - Addressing or allocationRelocation in hierarchically structured memory systems, e.g. virtual memory systems
G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
G06F 3/06 - Digital input from, or digital output to, record carriers
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
8.
SYSTEMS AND METHODS FOR TRAINING PLAYERS IN A SPORTS CONTEST USING ARTIFICIAL INTELLIGENCE
Disclosed herein are systems and method for training a player in a sports contest. In an exemplary aspect, a method may comprise receiving a strategy to be implemented in a sports contest by at least one player. The method may comprise determining a success rate of the strategy based on historical data of the at least one player. In response to determining that the success rate is less than a threshold success rate, the method may comprise identifying game obstacles in instances where the strategy was implemented by the at least one player and did not achieve the goal. The method may comprise determining a modified strategy that minimizes encounters of the at least one player with the game obstacles and achieves the goal of the strategy. The method may comprise outputting a training procedure for implementing the modified strategy for presentation to the at least one player.
A method, computer program product, and computing system for recovery of virtual machines are described. A method may include creating, via a computing device, an image of at least a portion of a virtual machine disk. The method may further include comparing, via the computing device, the image of the portion of the virtual machine disk with the portion of the virtual machine disk that currently exists to determine changed sectors of the portion of the virtual machine disk. The method may additionally include restoring, via the computing device, the changed sectors of the portion of the virtual machine disk.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
10.
Automated disaster recovery and data redundancy management systems and methods
A method, computer program product, computing system, and system for automated disaster recovery are described. The method may include creating, using a backup engine running at a computing device, a backup of a server at a primary computing site; storing the created backup at a storage device at a secondary computing site; monitoring, using a monitoring component, an operating status of the server at the primary computing site; in response to determining, via the monitoring component, that the server at the primary computing site is unavailable based on the operating status, initiating a disaster recovery process at the secondary computing site; and running a copy of the server from the created backup at the secondary computing site.
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
11.
Systems and methods for backup of computing systems
Systems and methods for monitoring backup performance of a computing device are described. In one aspect, the disclosure relates to automatic transparent load-balancing such that there is no or substantially no user involvement and resource usage is optimized. In one aspect, the disclosure relates to customization of backup destination by user using scripting such that backups can be distributed by a rule to different locations or it can use local for agent configuration to resolve backup performance degradation issues.
G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
12.
System and method of determining boot status of recovery servers
Disclosed herein are systems and method for determining a boot status of a failover server. In an exemplary aspect, a method may receive a failover test request for a failover server that provides disaster recovery for a production server, wherein the failover test request queries a successful boot status of the failover server. The method may determine whether a login into the failover server can be performed to execute the failover test request. In response to determining that the login cannot be performed, the method may retrieve server metrics for a failover server from a metric store and may determine a probability of the successful boot status based on both the retrieved server metrics and historic server metrics. In response to determining that the probability is greater than a threshold probability, the method may mark a recovery point of the failover server as validated.
Disclosed herein are systems and methods for fast recovery of backup data. In one aspect, an exemplary method comprises, identifying information related to a computing device performing a backup, identifying a data center where the backup is stored based on the information, identifying patterns of movement of the computing device over a period of time, scheduling a transfer of the backup to a target data center of a plurality of data centers based on the patterns of movement, and transferring the backup to the data center using a secure reliable transport protocol in accordance with the scheduled transfer.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
H04L 29/06 - Communication control; Communication processing characterised by a protocol
14.
System and method for platform-independent migration and replication of computer systems
Systems and methods for migrating and/or replicating computer systems are disclosed. Computer systems may be migrated and/or replicated from physical systems or virtual systems to physical or virtual systems. Migrating/replicating computer systems comprises determining the structure of the source computer system, generating instructions for migrating/replicating the structure of the computer system, and packaging the instructions in an executable package. The instructions may be formatted as a template, such as an OVF template, and be packaged with an executable agent and task list. The executable agent may be received and executed by a destination computer system. Executing the executable package may cause the instructions to be executed, as well as the optional agent, there configuring the destination computer system, possibly copying data present on the source computer system, and possibly rebooting the destination computer system.
A method, computer program product, computing system, and system for increasing speed during synchronization or restore are described. The method may include acquiring list of items to be synchronized or restored. The method may further include defining a set of storage sources available to a client computer. The method may also include mounting the available storage sources to the client computer. The method may additionally include determining a storage intersection of items in the list based on the items being available in more than one mounted storage device. Moreover, the method may include, in response to determining a set of items that has a storage intersection, synchronizing or restoring the items based on at least one of a speed of download and a network latency.
Disclosed herein are systems and method for storing and managing states of a computing device. In one aspect, an exemplary method comprises determining an initial state of the computing device, wherein the initial state includes states of all storage sectors associated with the computing device, storing the determined initial state in an initial blocks storage, for each new state that corresponds to a respective point in time subsequent to a time at which the initial state was determined, creating a snapshot, where the created snapshot includes a difference between the initial state and the new state, for each created snapshot, identifying a set of changed blocks that are in storage, and storing the changed blocks of data to a changed blocks storage, and creating a snap-map for any number of consecutive changes based on the sets of changed blocks corresponding to the respective consecutive changes.
Disclosed herein are systems and method for selectively restoring a computer system to an operational state. In an exemplary aspect, the method may create a backup image of the computer system comprising a set of data blocks and may store the backup image of the computer system in an archive storage database. The method may determine a subset of the data blocks of the backup image that are required to keep the computer system operational. In response to determining that the computer system should be restored, the method may restore the subset of the data blocks such that the computer system is operational during startup, and may restore a remaining set of the data blocks from the backup image after the startup of the computer system.
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
G06F 3/06 - Digital input from, or digital output to, record carriers
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
Disclosed herein are systems and method for deep dynamic analysis for protecting endpoint devices from malware. In one aspect, an exemplary method comprises launching a deep analysis process, by a deep analysis tool, the launching including: injecting a dynamically loaded component into an address space of an application code and initializing, by the dynamically loaded component, to allow an execution activity, by the injected dynamically loaded component, parsing dependencies of run-time linkages, hooking system functions, creating an application memory map with separate application and system code areas, transferring control back to the application code, and performing on-sample-execution activity, obtaining control of exception handler and monitoring attempts to use the exception handler, changing an available area, logging accesses, inspecting exception reasons and applying policies, determining whether or not the application of the sample is a malware, and sending a final verdict.
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
A method, computer program product, computing system, and system for using hot-plug virtual disks in granular recovery are described. The method may include receiving, at a cloud computing site, a backup configuration including a list of protected resources associated with a cloud computing tenant. The method may further include mounting a hot-plug virtual disk to a virtual machine including the protected resources associated with the cloud computing tenant. The method may also include collecting metadata corresponding to the protected resources associated with the cloud computing tenant. The method may additionally include generating, at the cloud computing site, a backup of the virtual machine including the protected resources associated with the cloud computing tenant. Moreover, the method may include storing the metadata corresponding to the protected resources associated with the cloud computing tenant and storing the backup of the virtual machine including the protected resources associated with the cloud computing tenant.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
Disclosed are systems and methods for recovering cryptocurrency assets which may be tied to a lost personal private encryption key. The disclosed system deploys a multi-signature wallet formed from a set of keys including the user's personal key, the key of an organization provides blockchain service for the user, and a reserve key stored by third-party escrow organization. To recover a lost user private key, the system generates and digitally signs with the appropriate private keys a blockchain transaction that includes a script configured, when executed by a node in a blockchain network, to replace the user key with a replacement key.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Various examples are directed to systems and methods for backing up data. A tracking utility may receive a start request and then enter a holding mode until a first modifiable or writable snapshot is created. The tracking utility can track such a first snapshot and determine if any modifications such as writes have been made to the first snapshot. If the first snapshot has not been modified it can be backed up using a read only snapshot scheme. If the first snapshot has been modified, a record of the modifications thereto are used to update the frozen changes and the current changes. The resulting or finalized snapshot is generated and includes all of the modifications, modifications 1 to N made to the first snapshot. This process can be repeated for one or more or all of the modifiable or writable snapshots.
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 16/11 - File system administration, e.g. details of archiving or snapshots
G06F 3/06 - Digital input from, or digital output to, record carriers
22.
Instruments, modules, and methods for improved detection of edited sequences in live cells
The present disclosure provides instruments, modules and methods for improved detection of edited cells following nucleic acid-guided nuclease genome editing. The disclosure provides improved automated instruments that perform methods—including high throughput methods—for screening cells that have been subjected to editing and identifying cells that have been properly edited.
A system and method is provided for detecting ransomware and malicious programs. An exemplary method comprises generating, by a hardware processor, a file honeypot in a directory in a filesystem, wherein the file honeypot is included on a file list of contents of the directory, receiving a directory enumeration request from a process executing in an operating system environment, determining whether the process is identified in a list of trusted processes based on one or more of a certificate, fingerprint, name, and process identifier, when the process is not found in the list of trusted processes, providing, by the filesystem, the file list including the file honeypot to the process responsive to receiving the directory enumeration request and otherwise, providing the file list excluding the file honeypot to the process, intercepting, by a filesystem filter driver, a file modification request for the file honeypot from the process when the file honeypot is included in the file list and identifying the process as a suspicious object responsive to intercepting the file modification request from the process.
Disclosed herein are systems and method storing data. In an exemplary aspect, a method comprises determining a threshold data size for objects in a target data system; generating a data blob that has an allocated size of at least the threshold data size, wherein the data blob comprises at least one data set; identifying a data set stored in a source data system for backup to the target data system; determining whether a size of the data set is less than the threshold data size; and responsive to determining that the size of the data set is less than the threshold data size, inserting the data set into the data blob; and writing the data blob to the target data system.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
Disclosed are systems and methods for proactive disaster recovery. The described technique monitors for events raised by a system of interconnected external sensors and other devices for obtaining data on the external environment of servers. The system uses these events as a chain of triggers according to which preventative or preparatory actions for disaster recovery are performed.
Disclosed herein are systems and method for correlating malware detections by endpoint devices and servers. In one aspect, an exemplary method comprises receiving, by a correlator, from one or more servers, one or more events collected without invasive techniques, one or more events collected using one or more invasive techniques, and one or more final verdicts, correlating the one or more events collected without invasive techniques with one or more events collected using the one or more invasive techniques, creating a suspicious pattern when an event of the one or more events collected without invasive techniques is correlated with an event of the one or more events collected using the one or more invasive techniques, and the event of the one or more events collected using one or more invasive techniques is used to detect a malware, and updating databases of one or more endpoint devices with created suspicious patterns.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
27.
Methods and cloud-based systems for detecting malwares by servers
Disclosed herein are systems and method for detecting malwares by a server of a sandbox. In one aspect, an exemplary method comprises receiving, by a deep dynamic analysis tool of the server, a sample of a process from an endpoint device with a request for a final verdict indicative of whether the process is a malware or clean based on a deep dynamic analysis, collecting events for the sample, the collected events including events collected using at least one invasive technique, analyzing the collected events using one or more detection models of the deep dynamic analysis tool to detect malwares and issue the final verdict, and sending final verdict to the endpoint device from which the sample is received.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06F 12/14 - Protection against unauthorised use of memory
28.
Methods and cloud-based systems for protecting devices from malwares
Disclosed herein are systems and method for protecting an endpoint device from malware. In one aspect, an exemplary method comprises performing, by a light analysis tool of the endpoint, a light static analysis of a sample, terminating the process and notifying the user when the process is malware, performing light dynamic analysis when the process is not malware based on the light static analysis, when the process is clean based on the light dynamic analysis, enabling the process to execute, when the process is malware, terminating the process and notifying the user, and when the process is suspicious pattern, suspending the process, setting a level of trust, sending the sample to a sandbox, terminating the process and notifying the user when the process is a malware based on received final verdict, enabling the process to resume executing when the process is determined as being clean based on the final verdict.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Software; Software, Namely software for creating or facilitating an online presence where users can download information in compressed form, reading and Learning, drawing up and uploading own offers and also involving one another in discussions; Computer software, namely computer game software, Facilitating access to the compilation and organisation of information in compressed form to the users of computers and mobile apparatus; Software for use in connection with mobile wireless devices, mobile and cellular phones, and other portable computers or communications apparatus, Namely recorded programs for computers, Downloadable image files, Computer programs, downloadable; Computer application software for streaming audio-visual media content via the internet; Databases (electronic); Electronic publications, downloadable, Featuring already published works in significantly shortened form; Downloadable audio files; Downloadable music files; Podcasts; Talking books; Audio books. Online advertisements; Promoting the goods and services of others via a website; Sales promotion of goods and services of others via a website featuring images, advertisements and other contents and featuring links to the websites of others; Promoting the goods and services of others by providing a community-driven web site featuring images, information and content of general interest; Commercial administration of the licensing of the goods and services of others; Arranging subscriptions to telecommunication services for others; Collection of goods, for others, for presentation purposes; The bringing together of goods, for the benefit of others, for sales purposes, Namely retailing relating to sound recording carriers, audio files, podcasts, Audiobooks, Audiobooks, Music files, Including all the aforesaid provided via the internet (downloadable and non-downloadable); Compilation of information into computer databases; Providing of directories on the internet about audio, visual and and audiovisual media content retrievable on the internet [sales promotion for the goods of others]; Compilation of directories on the internet about audio, visual and and audiovisual media content retrievable on the internet. Telecommunication services; Computer communication and Internet access; Provision of access to content, websites and portals; Audio broadcasting; Providing user access to global computer networks; Providing telecommunications connections to a global computer network; Providing access to information on the Internet; Providing telecommunications connections to the internet or databases; Provision of electronic data links; Providing of access to hyperlinks for audio files; Streaming of audio, visual and audiovisual material via a global computer network; Electronic bulletin board services [telecommunications services]; Rental of access time to global computer networks; Providing access to platforms on the Internet; Transmission of digital files; Providing access to databases; Audio and video broadcasting services provided via the Internet; Information and advisory services relating to telecommunication services; Providing of access to an internet platform for the retrieval of audio, visual and audiovisual media content; Sending and transmission of podcasts. Publishing, in particular online publication of electronic texts, books and magazines, Featuring already published works in significantly shortened form; Writing of texts; Providing online electronic publications, not downloadable; Entertainment services; Provision of entertainment via podcast; Entertainment by means of audio books; Entertainment by means of audio and video content; Rental of audio books; Music composition services. IT services; Software development, programming and implementation; Computer hardware development; Hosting services, software as a service, and rental of software; Preparation of data processing programmes, In particular for establishing and providing a website and mobile software applications for users for searching, downloading, reading, discussion, storing, Learning and relating to own drawing up of compressed information units; Providing search engines for the internet; Platform as a service [PaaS] featuring software platforms for transmission of images and audio content; Designing and creating homepages and Internet pages; Programming of software for information platforms on the Internet; Hosting of podcasts; Hosting of audio and video content; Hosting of digital content on the Internet.
30.
Systems and methods for analyzing process chains to detect malicious behavior
Disclosed herein are systems and method for malicious behavior detection in processing chains comprising identifying a chain of related processes executing on a computing device; for each respective process in the chain of related processes: monitoring events generated by the respective process; storing snapshots of data modified by any of the events; determining a level of suspicion for the respective process by applying an artificial intelligence (AI) model to the snapshots of data; determining whether the chain of related processes is trusted based on the determined levels of suspicion; and in response to determining that the chain of related processes is not trusted, restoring objects affected by the chain from the snapshots.
Disclosed herein are systems and method for backing up data in a clustered environment. A clustered resource to be backed up is selected, wherein the clustered resource is stored on a common storage system and operated on by a cluster-aware application executing on two or more nodes of a computing cluster. A first backup agent executing on a first node of the computing cluster may determine a list of changes to the clustered resource and may receive at least one list of changes to the clustered resource that are tracked by peer backup agents executing on other nodes of the computing cluster. The first backup agent may merge the lists of changes to the clustered resource, and may generate a consistent incremental backup using data retrieved from the common storage system according to the merged lists of changes to the clustered resource.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
Disclosed herein are systems and methods for protecting user data. In one aspect, an exemplary method comprises, by a hardware processor, detecting user files created by a first user and stored on a user device, the user files containing personal information associated with the first user, generating user transactional data associated with one or more detected network-based interactions with a service provider, generating user behavior data based on one or more user interactions with a graphical user interface of the user device, applying a machine learning model to user data to generate a classification of the first user, the user data comprising the user files, the user transactional data, and the user behavior data, and when the user is identifiable based on the generated classification, modifying at least one of (i) user files stored on the user device and (ii) user behavior during an operation of the user device.
Disclosed herein are systems and methods for managing access to data objects in cloud storage. In one aspect, an exemplary method comprises, by a hardware processor, storing a first data object in a cloud storage service, wherein the first data object is uploaded by a first user, modifying a data access policy associated with the first data object to permit access by user accounts other than the first user, determining a utility ranking of the first data object based on a degree of access of the first data object using the cloud storage service, and modifying a data retention policy associated with the first data object based on the determined utility ranking.
Disclosed herein are systems and method for method for predictive data protection. In one aspect, an exemplary method comprises selecting data stored on a computing device for backing up, according to a predetermined schedule for performing a backup; collecting features associated with the computing device where the data for the backup is stored, the features comprising device information for the computing device, user information for a user of the data, and external information associated with a locale of the computing device; analyzing the features to determine a set of backup parameters for the backup, wherein the backup parameters comprise scheduling parameters and destination storage parameters; generating a backup plan based on the set of parameters for performing the backup; and performing the backup of the data according to the backup plan.
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
A system and method is disclosed for scheduling and allocating data storage. An example method comprises generating a scheduling problem based at least on states of each of the plurality of storage nodes, a received plurality of storage tasks and received constraints, wherein the scheduling problem is a constraint satisfaction problem, selecting one or more approaches to solving the scheduling problem based on metadata associated with the storage tasks and constraints, solving the scheduling problem to generate a scheduling solution based on the one or more approaches, determining whether the given constraints are satisfied by the scheduling solution, executing, by the processor, the scheduling solution by assigning storage of data to each of the plurality of storage nodes when the constraints are satisfied by the scheduling solution and determining another scheduling solution based on the one or more approaches when the constraints are not satisfied by the scheduling solution.
G06F 9/48 - Program initiatingProgram switching, e.g. by interrupt
G06F 3/06 - Digital input from, or digital output to, record carriers
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
A method is provided for protecting a file server from a ransomware attack. An exemplary method comprises assigning a session identifier to a remote session initiated with the file server, monitoring operations associated with the session identifier, determining whether the operations are suspicious according to a policy, creating a volume-level snapshot of files on the file server, determining that encryption of the data is occurring when entropy of the monitored data is growing faster than the predetermined threshold rate, classifying the remote session as having a calculated degree of danger when the operations match operations contained in previously observed suspicious behavior patterns, interrupting the remote session when a combination of the degree of danger and the entropy is greater than a predetermined threshold value and restoring the data on the file server using the volume-level snapshot to a state prior to the encryption and dangerous activity.
A system, method and computer program product for restoration of MICROSOFT Exchange Server mail. MICROSOFT Exchange Server mail is retrieved from a virtual copy of the MICROSOFT Exchange database. Virtualization is implemented by a system filter. Logs are applied to a virtualized DB in order to synchronize it with a real DB of the MICROSOFT Exchange. The data located in the remote archive does not need to be copied into the real folder, because the data is made available by virtualization means. After the logs are applied, the virtualized DB is opened (without being mounted) from files from the virtual folder. From this point on, the DB of MICROSOFT Exchange can be viewed and the data can be queried and retrieved from the virtualized DB. Thus, a single message or a mailbox can be retrieved very fast, as if it were being retrieved from a real MICROSOFT Exchange DB.
A system and method is provided for data classification to control file backup operations. An exemplary method includes sampling metadata of one or more files on a computer at a predetermined time interval, determining whether the metadata has changed over time after a predetermined amount of metadata is collected, deriving a model of the change of the metadata over time when the metadata has changed over time, wherein the model of change is a snapshot of dynamically sampled attributes of the one or more files and reflects a state of the computer, performing an analysis of the model of change by determining features of the one or more files comprising at least file usage dynamics of the computer and a user associated with the one or more files based on the model; and selecting a backup plan for the one or more files according to the file usage dynamics.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
A systems and methods of managing user data using clustering patterns based on metadata analysis. The described technique includes receiving file metadata from multiple user devices, where the file metadata is associated with data stored on the plurality of user devices associated with a plurality of users. The technique generates a user metadata fingerprint based on a plurality of user metadata record attributes contained in the file metadata, and determines clustering of the plurality of users based on the generated user metadata fingerprint. The data for the plurality of users may be stored based on the determined clustering.
Disclosed are systems and methods restoring a computing system. The described method includes receiving a delta disk that was generated based on a backup of a computing device executing a protected application. The delta disk comprises one or more configurations for executing the protected application on a different device than the computing device. In response to a request to perform recovery of the computing device, a recovery virtual machine (VM) is created having a base virtual disk emulated from the backup. The recovery VM is modified by attaching the delta disk having the one or more configurations for executing the protected application. Execution of the protected application on the recovery VM is resumed.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
Various embodiments are directed to systems and methods for creating an archive of a set of logical storage units stored on at least one storage medium. A first plurality of LSU descriptors may be generated. Each LSU descriptor may describe a current version of one of the set of LSUs at about the time of the generating. A first archive may be read to produce a first archive plurality of LSU descriptors. Each of the first archive plurality of LSU descriptors may describe a version of one of the set of LSUs when the first archive was created. The first archive plurality of LSU descriptors may be compared with the first plurality of LSU descriptors to identify a first LSU from the set of LSUs that has an associated LSU descriptor that does not match a corresponding LSU descriptor from the first archive plurality of LSU descriptors.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
Disclosed are systems and method for machine learning and blockchain-based anti-discrimination validation. The described techniques uses a machine learning model to generate a numerical determination associated with a first person based on an input data set associated with the first person. The numerical determination is further based on a corrective module configured to compensate for prohibited discrimination by the machine learning model. The technique generates a blockchain transaction data structure comprising a state of the machine learning model at the time of generating the numerical determination, a copy of the input data set associated with the person, and an indication of a correction by the machine learning model. The blockchain transaction data structure is recorded or published in a blockchain network.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method, computer program product, computing system, and system for snapshotless backup are described. The method may include receiving, via a backup agent, an indication of a virtual machine to be backed up in a backup archive file. The backup agent may run outside of the virtual machine. The virtual machine may be hosted by a virtualization host device. The method may further include identifying, via the backup agent, a virtual disk associated with the virtual machine indicated to be backed up. The method may also include tracking, via a virtualization host agent running on the virtualization host device outside the virtual machine, changes to the virtual disk associated with the virtual machine on a sector level basis. The method may additionally include reading the virtual disk and transmitting sectors from the virtual disk to the backup archive file on a first pass.
An apparatus includes a module having a tape bearing surface, a first edge, and a second edge, where a first tape tenting region of the tape bearing surface extends from the first edge along the tape bearing surface toward the second edge. A guide is positioned relative to the first edge for inducing tenting of a moving magnetic recording tape and to create a point of inflection of the moving magnetic recording tape at a location above the tape bearing surface that is about midway between a peak of the tenting and a point of closest approach of the moving magnetic recording tape to the tape bearing surface. A sensor is located in a thin film region of the module. The sensor has a free layer. The location of the point of inflection of the moving magnetic recording tape is between the free layer and the second edge.
G11B 5/40 - Protective measures on heads, e.g. against excessive temperature
G11B 5/255 - Structure or manufacture of the surface of the head in physical contact with, or immediately adjacent to, the recording mediumPole piecesGap features comprising means for protection against wear
G11B 5/187 - Structure or manufacture of the surface of the head in physical contact with, or immediately adjacent to, the recording mediumPole piecesGap features
G11B 5/39 - Structure or manufacture of flux-sensitive heads using magneto-resistive devices
G11B 5/58 - Disposition or mounting of heads relative to record carriers with provision for moving the head for the purpose of maintaining alignment of the head relative to the record carrier during transducing operation, e.g. to compensate for surface irregularities of the latter or for track following
G11B 15/62 - Maintaining desired spacing between record carrier and head
G11B 15/43 - Control or regulation of mechanical tension of record carrier, e.g. tape tension
G11B 5/008 - Recording on, or reproducing or erasing from, magnetic tapes or wires
G11B 5/31 - Structure or manufacture of heads, e.g. inductive using thin film
G11B 5/48 - Disposition or mounting of heads relative to record carriers
45.
Blockchain-based media content authentication methods and systems
Disclosed herein are systems and method for storing media authentication data using a distributed ledger. In one aspect, an exemplary method comprises, receiving, by a processor of a computing node of a plurality of computing nodes, one or more hashes associated with a media content and a timestamp, the computing nodes being communicatively linked, generating a data block that contains at least one of the received hashes, the data block being generated by hashing a hash corresponding to a previous data block of the distributed ledger together with the at least one hash, the at least one hash corresponding to the media content of the data block being generated, transmitting to the plurality of computing nodes, a message reporting an addition of the generated data block, wherein at least some of the plurality of computing nodes maintain at least a partial copy of the distributed ledger.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
46.
System and method for automating formation and execution of a backup strategy using machine learning
Disclosed herein are systems and method for forming and executing a backup strategy. In one aspect, an exemplary method comprises, for each file of files from one or more data sources that is being evaluated to form the backup strategy for the file, updating a frequency database, evaluating a uniqueness for the file stored at a data source of the one or more data sources by comparing at least a portion of data of the file to the frequency database, categorizing the file into a hierarchy of logical types according to properties of the file, and forming the backup strategy for the file according to the uniqueness and categorization of the file.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 16/11 - File system administration, e.g. details of archiving or snapshots
G06F 3/06 - Digital input from, or digital output to, record carriers
G06F 3/08 - Digital input from, or digital output to, record carriers from or to individual record carriers, e.g. punched card
A system and method for encrypting and publishing data using blockchain technology is provided. An exemplary method includes receiving, by one or more nodes of a distributed network that maintains a blockchain, a message requesting publication of private information within the blockchain subsequent to a specified time interval. Moreover, the method includes recording a sequence of transactions in the blockchain based on the time interval, wherein each transaction in the sequence of transactions includes a payload calculated using a first homomorphic operation; and extracting the private information from a final payload of a final transaction in the sequence of transactions from the blockchain.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
48.
Cloud AI engine for malware analysis and attack prediction
Methods and systems are disclosed herein for detecting malicious software executing on a plurality of computing devices. In an exemplary aspect, a method comprises collecting, from a plurality of agents executing on a respective computing device, analysis data corresponding to executables on the respective computing device, determining a suspicious activity pattern based on the received analysis data, determining that at least one executable on a computing device is malware based on the determined suspicious activity pattern, generating a plurality of remedial actions for protecting respective computing devices of the plurality of agents based on the suspicious activity pattern, and distributing, to the plurality of agents, the plurality of remedial actions to protect the respective computing device from the malware.
A method for reducing an amount of data transmitted during a backup process is described. The method may include receiving input data to insert into a rating hash table during the backup process. The method may further include selecting, based on a hash function, a bucket of the rating hash table in which the input data will be inserted, the bucket including a plurality of blocks. The method may also include, in response to determining that the input data has already been inserted in one of the plurality of blocks, increasing a rating corresponding to the one of the plurality of blocks by a popularity rating increment. The method may additionally include, in response to determining that the input data has not already been inserted in one of the plurality of blocks, determining a first block with a smallest rating from the plurality of blocks.
A technique is described for protecting file data from malicious programs, in particularly, by decrypting data that has been maliciously encrypted by software such as ransomware. The described technique generates a copy of a first block of a plurality of files stored on a computing device, and also intercepts request(s) from a process executing on the computing device to obtain certain types of random data and system entropy, which are recorded. When the system detects that the plurality of files have been encrypted by a malicious program, the described system determines a cryptographic key determined based on the generated copies of the first blocks of the plurality of files and on the recorded random data, and uses that key to decrypt the plurality of files.
An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message including a cryptographic keyword and a policy value. The policy value may include one or more data bits indicative of one or more policies that define allowable usage of the cryptographic keyword. The apparatus also includes a security circuit that may be configured to extract the cryptographic keyword and the policy value from the message, and to apply at least one policy of the one or more policies to usage of the cryptographic keyword in response to a determination that an authentication of the message succeeded.
Disclosed are systems and methods for data archiving using machine learning techniques. The system collects statistical information and event data and processes them using machine learning techniques to classify data and/or predict data access demands. The system receives statistical information related to user access of a plurality of files, which can effectively “train” the system to archive data that is not needed at a certain moment and extract it at other moments. The system identifies, using a machine learning module, a pattern of access in the plurality of files based on the received statistical information. The system modifies, using the identified pattern of access, a threshold value related to file access, and assigns a set of files from the plurality of files an access classification based on the modified threshold value. The system migrates the set of files between hot and cold data areas based on the assigned access classification.
A method, computer program product, computing system, and system for increasing speed of a file restore from an archive storage device are described. The method may include receiving, at a computing device, a list of files to be restored from the archive storage device and file location data associated with one or more files from the list of files to be restored. The method may further include determining, at the computing device, a file restoration sequence for the one or more files from the list of files to be restored based upon, at least in part, the file location data. The method may also include restoring, from the archive storage device, the one or more files from the list of files to be restored based upon, at least in part, the file restoration sequence.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
54.
Optimized lock detection in a change block tracker
A method for optimizing lock detection in a change block tracker (CBT). A volume subject to the backup constantly receives writes. Therefore, it is important to divide writes that occurred before the lock and the write that occurred after the lock. The CBT is installed into kernel at the installation of the backup agent (application). The detection of changes is started at the completion of a previous snapshot. Snapshot creation request (SCR) is generated. Lock request is received by the CBT. Once the lock request is intercepted, the current changes are moved to frozen changes. The CBT processes the SCR and creates a collection of changes—i.e., snapshot with a Name. The CBT moves the current changes to the snapshot Name.
G06F 17/30 - Information retrieval; Database structures therefor
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
55.
System and method of using encryption algorithms in P2P encryption mode to restore integrity of data
A system and method is disclosed for using encryption algorithms in peer-to-peer encryption mode to restore the integrity of data. An example method is provided for generating a new derivative for a file that has a plurality of existing derivatives that have been stored on servers using an (n,k) algorithm, where the (n,k) algorithm provides that a minimum number k of the derivatives required to restore the file. The method includes accessing, on a server, a first derivative of the existing derivatives and forming a blob for the new derivative based on a modification operation that uses the first derivative. Moreover, the method includes determining a number of times the modification operation has been performed, and if the number of times the modification operation has been performed is equal to the minimum number k, uploading the blob to a server for storage thereon.
G06F 12/14 - Protection against unauthorised use of memory
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
A data backup application checks validity of data being backed up during an incremental or a full backup. In case of the file backup, the full backup checks the validity of data during the backup, because in case of data corruption the user will not have any original data since no data has been backed up yet. In case of the incremental backup, only the new files or the files that have changed compared to the last backup are now backed up. All new and modified files can be checked for validity by comparing internal format of the user files against a corresponding file format standard. If corrupted files are detected among the modified files, the user is notified.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
57.
Method for sending secret messages between mobile devices
A method for exchanging hidden secret messages includes generating a masking message comprising a quick phrase on a sender's mobile device; receiving a secret message and associating it with the masking message; encrypting the masking message; encoding the secret message using invisible symbols and embedding it into the masking message; sending the masking message to a recipient; receiving a response masking message from a recipient's mobile device; copying the response masking message and detecting the secret message by checking a clipboard content; decrypting the response masking message; and decoding the secret message and rendering it on a sender's keyboard screen. The secret message contains an invisible marker inserted after a first symbol of the masking message for detection and decoding.
A method, computer program product, computing system, and system for machine replication are described. The method may include creating a crash-consistent replica of a source machine by replicating sectors from a source drive on the source machine to a target drive on a target machine wherein the sectors on the target drive have the same offset as the sectors on the source drive. The method may further include, in response to determining that a sector replicated from the source drive to the target drive has changed on the source drive, replicating the sector that changed on the source drive to the target drive on the target machine out-of-order. The method may also include creating an application-consistent replica version of the source machine by creating a snapshot of the source machine and replicating sectors from the snapshot to the target drive on the target machine.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
In part, the disclosure relates to a computer-implemented system for managing a data storage system comprising a plurality of data storage nodes. The system includes at least one processor and an operatively associated storage device. The at least one processor is programmed to: monitor utilization of at least one data object stored at the data storage system as a coded data object comprising a first total number of data blocks, wherein each of the first number of data blocks is stored at a separate data storage node, and wherein an original data object is re-creatable from a first base number of data blocks selected from the first total number of data blocks; determine that the utilization of the at least one data object has changed; and modify a number of the plurality of data storage nodes that store data blocks of the coded data object.
G06F 11/10 - Adding special bits or symbols to the coded information, e.g. parity check, casting out nines or elevens
H03M 13/15 - Cyclic codes, i.e. cyclic shifts of codewords produce other codewords, e.g. codes defined by a generator polynomial, Bose-Chaudhuri-Hocquenghem [BCH] codes
60.
Anonymous cloud data storage and anonymizing non-anonymous storage
A process of writing to a non-anonymous cloud storage is provided. On a client side, a write request to block X is received. A block key for the block numbers X is calculates as a function, which uses an Anonymous Key and X as its arguments. A hash function value of the block key is calculated. The content and the hash value are transferred to a Virtual Cloud Service. Then, on the Virtual Cloud Service, public cloud accounts are selected based on part of the hash value. A file name is generated from the calculated hash value. The content of block X is stored to the file with the generated name within the selected cloud account. Thus, there is no data reflecting the ownership of the user files on the cloud storage that is revealed.
Disclosed are blockchain-based methods and systems for watermarking digital content. In an exemplary aspect, a method for watermarking digital content is provided, by receiving, by a processor, a data stream comprising audio and/or video content; receiving watermark data, by a processor, from a computing node communicatively linked to a blockchain-based distributed ledger; and applying at least one watermark to the data stream based upon the watermark data, wherein the watermark comprises at least one hash based on one or more data blocks stored in the blockchain-based distributed ledger.
G06F 21/16 - Program or content traceability, e.g. by watermarking
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
62.
System and method of using data blocks to optimize file storage
A system and method is disclosed for using data blocks to optimize file storage in electronic data storage. An example method includes storing data objects in a storage service that correspond to a main block and multiple secondary blocks. The main block is stored in a first bucket and the secondary blocks are stored in one or more second buckets, with the main block including metadata indicating a unique identifier of the second bucket. The method further includes receiving a request to delete the data file to free storage; marking the main block of the data file for deletion that prevents a reading operation or a writing operation of additional data to the data file; deleting the secondary blocks of the data file; and after the secondary blocks are deleted, deleting the marked main block of the data file.
Disclosed are system and method for verification of data transferred among several data storages. An exemplary method includes: calculating first hash-sums of the data during an initial placement in a data storage; transmitting the first hash-sums to at least one blockchain network; detecting a transfer of the data to a new data storage; calculating second hash-sums of the data after a placement of the data in the new data storage; transmitting the second hash-sums to the at least one blockchain network; comparing the first and second hash-sums of the data; and determining data immutability after the transfer of the data from the data storage to the new data storage based at least on results of the comparing.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
64.
Consistent backup of blocks through block tracking
A method for creating an inconsistent backup and then a consistent backup is described. The method may include creating an inconsistent, full backup of a storage device. The method may further include creating a first snapshot of the storage device. The method may also include creating a consistent backup increment of the storage device based on the first snapshot. Additionally, the method may include adding the consistent backup increment to the inconsistent, full backup.
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
G06F 13/28 - Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access, cycle steal
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 3/06 - Digital input from, or digital output to, record carriers
65.
System and method for file authenticity certification using blockchain network
A system and method for authenticating data files using a block chain network. An exemplary method includes identifying data files in electronic data storage, computing hash values for files, adding pairs of the hash values and computing hash values for each resulting pair, continuing this process to a root level of a hash tree, and sending the root hash to a blockchain network in which one or more nodes in the blockchain network adds the hash value as one or more blocks in a blockchain.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
66.
System and method for backing up social network data
Disclosed are methods, systems and computer program products for backing up user data from a social network account. An exemplary general method includes the steps of obtaining access to a user account on a social network, by a social network application; determining, by the social network application, one or more restrictions on external requests for data imposed by the social network; generating, by a backup agent in communication with the social network application, an algorithm for requesting data from the user account based upon the one or more restrictions on external requests for data; requesting user data from the user account, by the social network application, using the algorithm; receiving the user data from the user account, by the social network application; transmitting the received user data from the social network application to the backup agent; and archiving the received user data, by the backup agent.
G06F 3/06 - Digital input from, or digital output to, record carriers
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
Embodiments in accordance with the present disclosure provide systems and methods for a waste heat recovery and conversion. The waste heat recovery and conversion system includes a housing non-invasively mountable onto an engine. The waste heat recovery and conversion system also includes a power conversion unit (PCU) entirely within the housing. The PCU includes heat exchangers, an expander, an electrical power generator, and a fluid pump. The heat exchangers, the expander, the fluid pump, and the fluid reservoir form a thermodynamic loop that drives the electrical power generator using thermal energy from waste heat. Under various configurations the waste heat recovery and conversion system offer pollutant reduction features all together with fuel savings.
F02G 5/02 - Profiting from waste heat of exhaust gases
F01K 23/10 - Plants characterised by more than one engine delivering power external to the plant, the engines being driven by different fluids the engine cycles being thermally coupled combustion heat from one cycle heating the fluid in another cycle with exhaust fluid of one cycle heating the fluid in another cycle
F01N 5/02 - Exhaust or silencing apparatus combined or associated with devices profiting by exhaust energy the devices using heat
68.
Event-based data backup and recovery for mobile devices
A mobile application that allows for backup and restore of user data on a mobile device is provided. The data backup application records a history of all user actions performed with mobile device data. The backup application monitors all of the user actions or applications that affect the mobile device data and reflects it into history, which can be viewed by the user. If the data is affected—it is backed up on a cloud. This works best within a framework of a continuous backup. A user can undo any of his destructive actions and the backup application can restore the affected data from the cloud storage. A history list serves as a filter to user data already located on the cloud.
A system and method provided for verifying data integrity for large volumes of critical data using blockchain technology. An exemplary method includes storing data files in electronic storage; creating a hash values for of each of the files; and transmitting the hash values to a blockchain network in which one or more nodes in the blockchain network adds the first hash values as blocks to the blockchain. Moreover, an API is provided to monitor data operations performed on the data files and transmit metadata of any operations performed to a transaction log. In turn, hash values relating to the data operations are also created and transmitted to the blockchain network to be added as additional blocks in the blockchain, such that the blockchain can be used to verify the accuracy of the data files stored on the electronic storage.
G06F 17/30 - Information retrieval; Database structures therefor
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
70.
Synchronized change tracking in data storage volumes
Various examples are directed to systems and methods for backing up data. A tracking utility may receive a start request and then receive a write request directed towards the first volume. An address of the block of the volume to be modified by the write request may be recorded to a current changes list. The tracking utility may also receive a first lock request, wherein the lock request comprises an instruction to place the volume in a read-only mode. Upon receiving the first lock request, the tracking utility may copy the current changes list to a frozen changes list and clear the current changes list. Upon receiving a second lock request, the tracking utility may merge the current changes list and the frozen changes list.
Methods of optimizing transmission of data from a client to a remote data center are disclosed, as well as systems and computer program products related to the same. An exemplary method comprises: receiving data, at a first intervening data center, transmitted from a client and addressed to a terminal data center, wherein the first intervening data center and the terminal data center are selected from a plurality of connected data centers; and transferring the data, from the first intervening data center through one or more additional intervening data centers selected from the plurality of connected data centers, until the data reaches the terminal data center; wherein each data center in the plurality of data centers independently selects a connected data center to transfer the data to based upon the amount of latency and/or bandwidth available at the connected data center.
A method, computer program product, computing system, and system for virtual machine backup are described. In part, the disclosure relates to methods and systems for performing backup of virtual machine files on a block level that include features that allow a user to select and backup specific files or folders of file systems of a VM. The specificity and selectivity features by which certain files or folders are backup from a file system of a VM can be implemented by processing one or more partition structures of a virtual disk of a virtual machine. Once the partition structures have been processed and analyzed using a backup up software application, it is then possible to detect and process guest file systems of the VM.
G06F 17/30 - Information retrieval; Database structures therefor
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
73.
Methods of preserving and protecting user data from modification or loss due to malware
Methods of preserving and protecting user data from modification or loss due to malware are disclosed, as well as systems and computer program products related to the same.
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
Systems and methods for parallel computer system recovery are described. The method may include receiving requests for backup data at a storage server from a plurality of computer systems to be recovered. The method may further include determining a next data fragment of the backup data to be transmitted from the storage server to the plurality of computer systems based on an order of priority. The method may also include transmitting the next data fragment from the storage server to the plurality of computer systems via a data fragment multicast stream.
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
75.
System and method for file time-stamping using a blockchain network
A system and method is provided for storing data and ensuring integrity and reliability of the data using blockchain technology. An exemplary method is provided for time-stamping a file to be added to a blockchain network. The method includes generating a data file; identifying a hash value from a first block previously recorded in the blockchain network; embedding a beacon relating to the hash value in the data file; and recording the data file with the embedded beacon as a transaction in a second block in the blockchain network.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
76.
System and method of validating data for incremental format of backup archive
A system and method is provided for partially validating data archive for an incremental data backup scheme. According to one aspect, the method includes generating the backup data file of electronic data stored electronic memory by transferring the electronic data to a data storage, generating initial incremental backup data of the electronic data where the incremental backup data includes changes made to the electronic data after the backup data file is generated, and comparing a first portion of the backup data file with a corresponding first portion of the electronic data during the generating of the incremental backup data. Furthermore, the method includes determining whether the first portion of the backup data file is valid based on the comparison and, if the first portion of the backup data file is invalid, generating another backup of the first portion of the electronic data.
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
77.
System and method for agentless backup of virtual machines
A system and method is disclosed for performing agentless backup of a virtual machine using a temporary attached virtual disk. An example method includes creating a virtual machine disk in a datastore, loading a software application in the virtual machine disk, the software application being configured to collect metadata relating to at least one application executing in an operating system of the virtual machine, communicatively coupling the datastore to the virtual machine, collecting the metadata relating to the at least one application executing in the operating system of the virtual machine, generating a snapshot of the virtual machine, and storing a backup of the virtual machine in a backup archive based on the snapshot.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
78.
System and method for live virtual incremental restoring of data from cloud storage
A system and method is disclosed for live virtual incremental restoring of data from a cloud storage. An example method includes, in response to detecting a data backup, collecting information by a hardware processor of a computing device for configuring a list of changed sectors (LCS) of a storage medium of the computing device as a result of the data backup. The method further includes virtually restoring at least a portion of electronic data saved in the storage medium of the computing device from the cloud storage, the selected electronic data being previously saved in the cloud storage. The method also includes rebooting the computing device and applying changes to the storage medium of the computing device based on the LCS during a subsequent data backup.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
A system and method is provided for performing a full data backup of user data with data protection. An example method includes generating a snapshot of the electronic data stored in memory, initiating a transfer of the electronic data to a data storage facility; detecting requests to modify a file of the electronic data, saving an initial version of the file based on the snapshot of the electronic data, continuing the transfer of the data to the data storage facility, and transferring the modified file using the initial version of the file based on the snapshot of the electronic data.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
A method, computer program product, and computing system for hot recovery of virtual machines are described. The method may include initiating a recovery process to transfer data, from a backup archive of a virtual machine to be restored, to a virtual disk at the virtual machine host computer. The method may further include booting the virtual machine to be restored. The method may also include intercepting a read request from the virtual machine to the virtual disk at the virtual machine host computer. The method may additionally include determining if the read request from the virtual machine requested data from the virtual disk which has not yet been restored from the backup archive to the virtual disk by the recovery process. Moreover, the method may include, in response to determining that the requested data has not been restored from the backup archive to the virtual disk, returning the requested data.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
81.
System and method for synchronization of large amounts of data while maintaining control over access rights to such data
Disclosed are system and method for synchronization of large amounts of data while maintaining control over access rights to such data in electronic data storage. An exemplary method comprises: partitioning a volume of data into a plurality of data blocks; assigning a synchronization status to at least one data block in the plurality of data blocks; determining access rights to the data contained in the at least one data block, based upon at least one of information identifying an owner or administrator associated with the at least one data block, or a set of allowed or prohibited operations that may be performed on the at least one data block; controlling access to the data contained in the at least one data block based upon the determination of access rights; and updating the synchronization status of the at least one data block.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
82.
Method and system for secure private communications
A system and method for providing secure private electronic communications. An exemplary method includes encrypting a hidden message using an encryption scheme; encoding the encrypted hidden message in a source message; providing the source message having the encoded hidden message by a first electronic device; and transmitting a decryption key to a second electronic device. Moreover, the second electronic device can capture the encoded hidden message provided by the first electronic device, decode the hidden message, and extract the hidden message using the decryption key so that the hidden message can be rendered by the second electronic device.
A system and method for backup and recovery of user mobile device modules, settings and configurations. An example system includes a modular mobile device and a number of interconnected modules that can be connected to the mobile device. The device includes memory that stores configuration and setting parameters associated with each of the modules. In operation, a backup software utility monitors the configuration and setting parameters to detect additions and modifications and the transmits the detected additions and modifications to remote data storage to generate a data backup indicating a current state of the configuration and setting parameters. As a result, the modular mobile device can always return to a previous state for each module if it is replaced or the software is reinstalled, for example.
G06F 9/44 - Arrangements for executing specific programs
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
A system and method is disclosed for using performance-maintaining commands for generating backup data of an unsupported file system. An example method includes intercepting a plurality of data storage commands transmitted from the file system to a storage device, where the plurality of data storage commands indicating sectors of the memory of the computer that do not contain valid data. The method further includes analyzing the plurality of data storage commands to determine sectors of the memory that contains valid data, generating a data structure that indicates the sectors of the memory that contain valid data and the sector of the memory that do not contain valid data, and subsequently generating the backup data copy of the memory of the computer based on the data structure.
G06F 17/30 - Information retrieval; Database structures therefor
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 16/11 - File system administration, e.g. details of archiving or snapshots
85.
System and method for incrementally performing full data backup
A system and method is disclosed for performing a backup of electronic data. An example method includes storing a first incremental data backup of a dataset that is less than a complete backup of the dataset and includes unmodified and modified portions of the dataset. Then, a second incremental data backup of the dataset is stored that includes a second unmodified portion of the dataset different than the first unmodified portion. The method then determines whether the first and second incremental data backups together form the complete backup of the dataset. If they do not, the method further stores a subsequent incremental data backup of the dataset in the electronic memory that includes an additional unmodified portion of the dataset and/or an additional modified portion of the dataset.
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
G06F 3/06 - Digital input from, or digital output to, record carriers
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
A system and method is disclosed for using data blocks to optimize file storage in electronic data storage. An example method includes storing a data file in electronic memory, where the data file includes a main block and a plurality of secondary blocks, with the main block including metadata that indicates respective locations of the secondary blocks relative to the main block. The method further includes performing a sparse operation of a data file to determine regions of the data file that contains unused space, determining blocks that are overlapped by the regions of the data file that contains unused space, removing the overlapped blocks, and storing the updated data file in an electronic database.
A system and method is disclosed for reducing a physical size of a data file that includes a plurality of blocks in sequence with each block having a defined size with a starting position and an end position. According to one aspect, the method includes obtaining information relating to an occupied physical region of the data file, where the occupied physical region contains unused space and/or unused data, and determining positions of first and second boundaries of the occupied physical region of the data file relative to the plurality of blocks in the data file. Furthermore, the method includes equalizing the occupied physical region by adjusting the first and second boundaries of the occupied physical region of the data file and removing data between the start and end of the removal region to reduce the physical size of the data file.
Disclosed are systems, methods and computer program products for prioritization of data backup and recovery traffic using quality of service (QoS) tagging. An example method includes specifying Quality of Service (QoS) requirements for different types of network traffic, including QoS requirements for one or more data backup or recovery tasks, wherein the QoS requirements correspond to a network transmission priority level of the network traffic; receiving a data backup or recovery task, by a backup application; analyzing the data backup or recovery task, by the backup application, to determine its QoS requirements, based on the specified QoS requirements for data backup or recovery tasks; applying one or more QoS tags to data packets associated with the data backup or recovery task, by the backup application, based on the determined QoS requirements; and assigning a network transmission priority level to the data packets, based on its QoS tags.
A system and method that provides for the backup and recovery of personalized user data. An exemplary method includes storing user data files in electronic memory of a user device, continuously tracking user actions by one or more user devices to detect interact with at least one external resource; determining whether the tracked user actions have modified one or more of the plurality of user data files; and if the processor determines that the tracked user actions have modified a user data file, storing the modified user data file in a data storage system.
A method and system is provided for optimization of restoration and loading of an operating system of a computer. An exemplary method includes initiating a loading of the operating system of the computer and intercepting a read request of data of a data volume from the operating system. Furthermore, the method includes determining whether the data has previously been restored during the loading of the operating system, and, if the data has previously been restored, performing the read request and returning to the loading of the operating system of the computer. Alternatively, if the data has not previously been restored, determining whether the data is stored in cache of the computer. If the data is not be stored in the cache, the method includes reading the data from a data archive and storing the data read from the data archive to the cache.
G06F 9/44 - Arrangements for executing specific programs
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
A system and method is disclosed for performing a backup of electronic data. An example method includes storing a first incremental data backup portion of a dataset in an electronic memory where the first incremental data backup includes both modified and unmodified portions of the dataset. Once stored, the method includes determining whether the first incremental data backup is a complete backup of the dataset. If the first incremental data backup is not a complete backup of the dataset, the method stores one or more additional incremental data backups of the dataset in the electronic memory that include additional modified and unmodified portions of the dataset until a full backup of the dataset is created.
Various embodiments are directed to systems and methods for backing up a plurality of virtual machines, the method comprising. A computer system may initiate creation of a snapshot for each of the plurality of virtual machines. The computer system may select a first virtual machine from the plurality of virtual machines based on the input/output loads for each of the plurality of virtual machines and generate a backup archive of the first virtual machine.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
93.
System and method for fast backup and restoring using sorted hashes
A method, system and computer program product for backup and restoration of data. Hash values for data blocks subject to backup are generated. After a number of hashes are accumulated, e.g., on a backup server, these hashes are sorted. Then, the hashes are compared against the hash values in the hash table corresponding to data blocks that have already been backed up. If a hash matches the hash from the hash table, a pointer to the block in the archive is written to the table of pointers to the redundant blocks. Then, this hash value is deleted from a set of the hash values. A check is made if a hash is the last in the group. If the hash is the last in the group, the remaining unique hash values are written into the hash table. Otherwise, the next hash is selected from the group. The redundant data blocks are discarded and only unique data is backed up.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
A method for implementing teleconferences when at least one participant receives 3-D data. A data rendering device presents data in a 3-D format or in pseudo 3-D format. A 3-D image is formed on a user computer system. The 3-D presentation is calculated by a local computer system. A block of user avatars is formed on the local computer system for all teleconference participants (including a local participant). The participant avatar includes a kinetic model (joints, muscles, body parts, etc.). The avatar includes a participant's behavior model (gestures, fingers, mimics, etc). The avatar also includes an avatar skin. The avatar skin includes a stable (unchangeable) part of the participant containing face and visible body parts, as well as modifiable parts (e.g., clothes, shoes, accessories, etc.).
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for efficient backup using hashes One of the methods includes forming an image of a storage device, wherein contents of blocks of the storage device are restorable from the contents of blocks of the image. The method includes generating a first plurality of hash values, each hash value generated from contents of a block of the image. The method includes selecting a block of the storage device. The method includes generating a hash value from the contents of the selected block. The method includes determining whether the hash value occurs in the plurality of hash values. The method also includes generating an entry in the image in response to the determination.
A system for data backup and recovery. A backup storage in a form of a file or a directory is created on a storage media. The backup storage is “hidden” from the file system, form user processes, form an operating system and from a data storage driver. The backup file is visible to only backup/restore application. The data is backed up into the “hidden” backup storage. The files system, the user processes, the operating system and the data storage driver do not know about the backup file and the areas of the storage media occupied by the backup file. When a write request for writing a data block to the space within the storage media occupied by the files of the “hidden” backup is received the write request is redirected to a free space on the storage media.
A system, method and computer program product for providing “bare metal” computer hardware with full operating system capabilities, including: (a) executing software contained in computer hardware read-only memory; (b) transferring software control to a location of a start-up program; (c) performing initialization of devices of the computer hardware; (d) selecting an origin storage device for restoration of an operating system to a destination storage device of the computer hardware; (e) establishing a connection with an origin for restoration of an operating system to the computer hardware; (f) initiating a transfer of the operating system data from selected origin to the computer hardware; (g) performing optional substitution of the computer hardware drivers; (h) performing optional structural modifications to the restored operating system; and (i) restoring the operating system to the computer hardware from a data storage device located either locally or remotely, from full or incremental operating system backup.
A method for data backup including (a) forming an image of the storage device; (b) for each block to be backed up to the image, generating a hash; (c) for each block stored in the image, storing a hash in a hash table; (c) for each additional block of the storage device to be backed up, generating a hash; (d) sorting all the generated hashes and deleting duplicate hashes; (e) comparing the hashes to identify candidate blocks that might have identical contents with contents of blocks stored in the image; (f) if the hashes are not coincident, then backing up, to the image, contents of unidentified blocks and blocks that do not have identical hashes, and (g) otherwise, storing links in the image instead of the contents of the blocks, (h) after checking all the hashes for those blocks that need to be backed up, writing only unique hashes to the hash table; (h) links for multiple blocks with identical contents point to a single block in the image, (i) the image contains a bitmap of the backup; (j) the bitmap contains indicators for the links that define if a block contains the content or if the block points to another block, (k) also indicators that reflect used and unused blocks such that an indicator whether contents are shared with another block vs. contents are unique to every other block in the image.
09 - Scientific and electric apparatus and instruments
16 - Paper, cardboard and goods made from these materials
35 - Advertising and business services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Electronic publications, downloadable; Computer programmes [programs], recorded; Computer software, recorded; Downloadable image files; Computer programs [downloadable software]. Printed matter; Books; Bookbinding material; Teaching materials [except apparatus]. On-line advertising on a computer network; Dissemination of advertising for others via the Internet; Rental of advertising space on the Internet; Advertising via electronic media and specifically the internet; Online advertising of goods and services on websites; Rental of advertising space on web sites. Publishing, in particular online publication of electronic texts, books and magazines; Providing on-line electronic publications, not downloadable; Publication of texts, books, magazines, webzines and other printed matter. Software as a service [SaaS]; Computer software design; Updating of computer software; Rental of computer software; Computer programming.
100.
System and method for bare metal restore of a computer over a network
A system, method and computer program product for providing “bare metal” computer hardware with full operating system capabilities, including: (a) executing software contained in computer hardware read-only memory; (b) transferring software control to a location of a start-up program; (c) performing initialization of devices of the computer hardware; (d) selecting an origin storage device for restoration of an operating system to a destination storage device of the computer hardware; (e) establishing a connection with an origin for restoration of an operating system to the computer hardware; (f) initiating a transfer of the operating system data from selected origin to the computer hardware; (g) performing optional substitution of the computer hardware drivers; (h) performing optional structural modifications to the restored operating system; and (i) restoring the operating system to the computer hardware from a data storage device located either locally or remotely, from full or incremental operating system backup.