Method and apparatus of securely processing data for file backup, de-duplication, and restoration
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/30
G06F-021/62
G06F-011/14
출원번호
US-0074213
(2011-03-29)
등록번호
US-9064133
(2015-06-23)
발명자
/ 주소
Bosson, Charles
출원인 / 주소
KASEYA LIMITED
인용정보
피인용 횟수 :
0인용 특허 :
11
초록▼
Disclosed are an apparatus and methods of determining if at least one data file has been de-duplicated. One example method may include receiving a filekey based on at least a portion of the content of the at least one data file, checking a de-duplication registry in a database to determine whether a
Disclosed are an apparatus and methods of determining if at least one data file has been de-duplicated. One example method may include receiving a filekey based on at least a portion of the content of the at least one data file, checking a de-duplication registry in a database to determine whether a pre-stored filekey is present, decrypting at least a first data associated with the filekey and at least a second data associated with the pre-stored filekey, and comparing the decrypted at least first data with the decrypted at least second data to determine whether the at least one file has been de-duplicated.
대표청구항▼
1. A method of determining if at least one data file has been de-duplicated, the method comprising: receiving a filekey based on at least a portion of the content of the at least one data file;checking a de-duplication registry in a database to determine whether a pre-stored filekey is present;decry
1. A method of determining if at least one data file has been de-duplicated, the method comprising: receiving a filekey based on at least a portion of the content of the at least one data file;checking a de-duplication registry in a database to determine whether a pre-stored filekey is present;decrypting at least a first data associated with the filekey and at least a second data associated with the pre-stored filekey;comparing the decrypted at least first data with the decrypted at least second data to determine at least one of whether the at least one data file has been de-duplicated and whether the at least one data file is a candidate for de-duplication, by determining the filekey and the pre-stored filekey are the same;determining the at least one data file is a candidate for de-duplication;creating a link file comprising a pointer to a location of the at least one data file, and wherein the link file comprise a uniform resource indicator (URI) of at least one de-duplicated data file stored in the database and an advanced encryption standard (AES) key; andstoring the link file at a location of the de-duplicated file. 2. The method of claim 1, wherein the at least a first data is a cyclic redundancy check checksum (CRC) of the at least one data file, and the at least a second data is a CRC of at least one data file that has been de-duplicated. 3. The method of claim 2, further comprising: matching the decrypted at least first data with the decrypted at least second data and determining they are the same;decrypting a random advanced encryption standard (AES) key stored in a registry row of the database; andre-encrypting the random advanced encryption standard (AES) key stored in a registry row of the database prior to transmitting the AES key to an agent application. 4. The method of claim 3, further comprising: incrementing a counter representing the number of de-duplication operations performed in the de-duplication registry row of the database. 5. The method of claim 4, further comprising: transmitting a true value indicating the match was the same, the re-encrypted AES key and the (URI) of the at least one data file to the agent application. 6. The method of claim 5, wherein the URI of at least one de-duplicated data file stored in the database and the re-encrypted AES key are stored in metadata of the link file. 7. An apparatus configured to determine if at least one data file has been de-duplicated, the apparatus comprising: a receiver configured to receive a filekey based on at least a portion of the content of the at least one data file; anda processor configured to check a de-duplication registry in a database to determine whether a pre-stored filekey is present;decrypt at least a first data associated with the filekey and at least a second data associated with the pre-stored filekey;compare the decrypted at least first data with the decrypted at least second data to determine at least one of whether the at least one data file has been de-duplicated and whether the at least one data file is a candidate for de-duplication, by determining the filekey and the pre-stored filekey are the same;determine the at least one data file is a candidate for de-duplication;create a link file comprising a pointer to a location of the at least one data file, and wherein the link file comprise a uniform resource indicator (URI) of at least one de-duplicated data file stored in the database and an advanced encryption standard (AES) key; andstore the link file at a location of the de-duplicated file. 8. The apparatus of claim 7, wherein the at least a first data is a cyclic redundancy check checksum (CRC) of the at least one data file, and the at least a second data is a CRC of at least one data file that has been de-duplicated. 9. The apparatus of claim 8, wherein the processor is further configured to match the decrypted at least first data with the decrypted at least second data and determine they are the same, decrypt a random advanced encryption standard (AES) key stored in a registry row of the database, and re-encrypt the random advanced encryption standard (AES) key stored in a registry row of the database prior to transmitting the AES key to an agent application. 10. The apparatus of claim 9, wherein the processor is further configured to increment a counter representing the number of de-duplication operations performed in the de-duplication registry row of the database. 11. The apparatus of claim 10, wherein the transmitter is further configured to transmit a true value indicating the match was the same, the re-encrypted AES key and the URI of the at least one data file to the agent application. 12. The apparatus of claim 11, wherein the URI of at least one de-duplicated data file stored in the database and the re-encrypted AES key are stored in metadata of the link file. 13. A non-transitory computer readable storage medium configured to store instructions that when executed cause a processor to perform determining if at least one data file has been de-duplicated, the processor being further configured to perform: receiving a filekey based on at least a portion of the content of the at least one data file;checking a de-duplication registry in a database to determine whether a pre-stored filekey is present;decrypting at least a first data associated with the filekey and at least a second data associated with the pre-stored filekey;comparing the decrypted at least first data with the decrypted at least second data to determine at least one of whether the at least one data file has been de-duplicated and whether the at least one data file is a candidate for de-duplication, by determining the filekey and the pre-stored filekey are the same; anddetermining the at least one data file is a candidate for de-duplication;creating a link file comprising a pointer to a location of the at least one data file, and wherein the link file comprise a uniform resource indicator (URI) of at least one de-duplicated data file stored in the database and an advanced encryption standard (AES) key; andstoring the link file at a location of the de-duplicated file. 14. The non-transitory computer readable storage medium of claim 13, wherein the at least a first data is a cyclic redundancy check checksum (CRC) of the at least one data file, and the at least a second data is a CRC of at least one data file that has been de-duplicated. 15. The non-transitory computer readable storage medium of claim 14, wherein the processor is further configured to perform: matching the decrypted at least first data with the decrypted at least second data and determining they are the same;decrypting a random advanced encryption standard (AES) key stored in a registry row of the database; andre-encrypting the random advanced encryption standard (AES) key stored in a registry row of the database prior to transmitting the AES key to an agent application. 16. The non-transitory computer readable storage medium of claim 15, wherein the processor is further configured to perform: incrementing a counter representing the number of de-duplication operations performed in the de-duplication registry row of the database. 17. The non-transitory computer readable storage medium of claim 16, wherein the processor is further configured to perform: transmitting a true value indicating the match was the same, the re-encrypted AES key and the URI of the at least one data file to the agent application.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (11)
Sherburne, Timothy J.; Li, Xiaonong; Wen, Shaokai, Automated method for securely establishing simple network management protocol version 3 (SNMPv3) authentication and privacy keys.
Douceur,John R.; Bolosky,William J.; Theimer,Marvin M., Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.