G06F16/137

System and method for recent file malware scanning

Systems and methods for recent file malware scanning are provided herein. In some embodiments, a security system may include a processor programmed to download one or more files; filter, by a first driver, the one or more downloaded files using a security zone identifier; scan, by the first driver, the filtered subset of one or more files for malware; store, by a second driver, a first set of information associated with each of the scanned files to indicate that each the filtered subset of one or more files have been scanned, wherein the first set of information is stored as metadata using alternative data stream (ADS) associated with each scanned file; monitor, by the second driver, changes to existing files based on the metadata stored; send instructions to rescan any existing file that has changed for malware; and update the information associated with any rescanned file's metadata using the ADS.

DUPLICATE FILE MANAGEMENT FOR CONTENT MANAGEMENT SYSTEMS AND FOR MIGRATION TO SUCH SYSTEMS

In large installations of document management systems, files are often duplicated. Users may place their own copies of files in convenient locations, or for other reasons files may be unintentionally duplicated. Duplication of files causes many problems for systems reliant on document management, chiefly because the additional (identical) files accept extra storage space, and must be handled like all other files, which results in greater network and resource utilization (with a concomitant increase in processing, search and retrieval times). A tool to standardize the identification of duplicate files (based on their binary contents), as well as the identification of a primary duplicate (the original file) across multiple repositories in a manner that minimizes the time for identification is disclosed.

Blockchain-as-a-service integrated hybrid object storage system in multi-cloud computing environment

Techniques for improved storage in a multi-cloud computing environment are provided. For example, a system manager for a storage system comprises a client interface layer configured to provide one or more application programing interfaces for one or more clients accessing the storage system, and a client interface layer handler configured to manage the one or more application programing interfaces of the client interface layer. Further, the system manager comprises a unified storage resource interface layer configured to provide a set of application programming interfaces to enable access for the one or more clients to a storage resource layer operatively coupled to the unified storage resource interface layer. The storage resource layer comprising one or more public cloud platform-based storage resources and a blockchain manager that coordinates access to one or more enterprise-level storage resources and one or more individually-owned storage resources.

Internal key hash directory in table

Provided is a system and method for searching for a target key in a database, the method including populating a hash-offset table of a sorted key table with hash-offset table entries, the hash-offset table entries having a hash-value corresponding to a respective key, and a hash offset, sorting the hash-offset table entries based on the hash-values, searching for a target hash-value of the hash-values corresponding to a target key in the hash-offset table, locating a target key-value pair corresponding to the target key based on the target hash-value, and saving a location of the target key-value pair.

Modular data processing and storage system
11513706 · 2022-11-29 · ·

A system enables entities to access a single platform in order to utilize electronic data storage for storing different types of information. One or more computers may operate an electronic data storage processing network that entities can access when updating information in electronic data storage. The electronic data storage processing network may operate a plurality of electronic data storage processing modules, which can include an aggregator module, a formatter module, an operator signer module, and a validator module. Based on the specific use case for which electronic data storage is utilized, recordable data that is to be added to the electronic data storage can be processed by the appropriate aggregating, formatting, signing, and validating functions provided by the electronic data storage processing modules.

File system warnings application programing interface (API)

The present technology pertains to a organization directory hosted by a synchronized content management system. The corporate directory can provide access to user accounts for all members of the organization to all content items in the organization directory on the respective file systems of the members' client devices. Members can reach any content item at the same path as other members relative to the organization directory root on their respective client device. In some embodiments novel access permissions are granted to maintain path consistency.

Browsability of backup files using data storage partitioning

A data storage system includes non-volatile data storage including a container partition and a browsable partition and control circuitry configured to backup a file in the non-volatile data storage at least in part by receiving the file from a host, the file including a plurality of chunks of data, storing the plurality of chunks of data in the browsable partition of the non-volatile data storage, determining that one or more of the plurality of chunks has been modified, storing the one or more modified chunks in a container partition of the non-volatile data storage, determining a new chunk associated with each of the one or more modified chunks, and storing the one or more new chunks in the browsable partition of the non-volatile data storage.

Document tracking through version hash linked graphs

Embodiments of the invention provide the ability to track document versioning. Before executing an open operation on a first document version, a first before-hash is generated. After executing the open operation, a first after-hash is generated. Before executing a save operation, the first before-hash is acquired, and after execution (resulting in a second document version), a second after-hash of the second document version is generated. A version hash linked graph (VHLG) is generated and includes document nodes for the different document versions where each node includes a hash of that document version, a user-application node corresponding to the user or application that executed the operations, and edges connecting the nodes (e.g., that identify the operation and/or the document lineage) Based on the VHLG, a full history of a document is provided.

Probabilistic verification of linked data

An example operation may include one or more of storing a data block that is included within a sequential chain of data blocks and which comprises a probabilistic data structure stored therein, receiving a request to verify another data block, determining whether a probabilistic hash of the other data block is included within the probabilistic data structure of the stored data block, and in response to a determination that the hash of the other data block is included within the probabilistic data structure, storing an indicator that the other data block is included within the sequential chain of data blocks.

Precomputed similarity index of files in data protection systems with neural network

Described is a system and method that provides a data protection risk assessment for the overall functioning of a backup and recovery system. Accordingly, the system may provide a single overall risk assessment score that provide an operator with an “at-a-glance” overview of the entire system. Moreover, the system may account for changes that occur over time based on leveraging statistical methods to automatically generate assessment scores for various components (e.g. application, server, network, load, etc.). In order to determine a risk assessment score, the system may utilize a predictive model based on historical data. Accordingly, residual values for newly observed data may be determined using the predictive model and the system may identify potentially anomalous or high risk indicators.