G06F21/1082

DVR CONTENT BACKUP USING ANOTHER DVR OR ANOTHER HDD ON THE SAME DVR
20170262182 · 2017-09-14 ·

A technique to backup data on a DVR includes receiving a transfer command, and responsive to the transfer command, backing up content on a first storage of an in-home digital video recorder (DVR) to a second storage configured as a redundant array of independent disks (RAID)-1. The transfer is over a direct communication path between the first and second storages.

DISTRIBUTION OF USER SPECIFIC DATA ELEMENTS IN A REPLICATION ENVIRONMENT

Aspects include receiving a notification that a value of a data element stored in a source storage location in a source format has been changed to an updated value. The change is replicated to a plurality of target storage locations. The replicating includes, for each of the plurality of target storage locations, determining a target format of the data element in the target storage location. The target format is one of a plurality of different formats, including the source format. Each of the different formats provide a different level of data protection for the data element. In response to determining that the target format is not the same as the source format, the updated value of the data element is converted into the target format, and the updated value of the data element is stored in the target format at the target storage location.

RANSOMWARE MITIGATION SYSTEM AND METHOD FOR MITIGATING A RANSOMWARE ATTACK
20230297678 · 2023-09-21 ·

A ransomware mitigation system and corresponding methods are provided. The ransomware mitigation system monitors the rate of modification of files on computing devices to determine whether the monitored rate of modifications exceeds a predetermined threshold. If the threshold is exceeded, then the ransomware mitigation system actuates a forced shutdown of the computing device and/or a forced disconnection of the network connection to the computing device. The ransomware mitigation system includes a software monitoring portion as well as a hardware switching unit. The software monitoring portion is in synchronous bidirectional communication with the hardware switching unit on a separate network. If the software monitoring portion is shutdown then the hardware unit actuates the shutdown and/or disconnection of the computing device(s). The hardware unit includes a hardware lock that requires physical presence of a person to allow for maintenance.

Uninterrupted file level restore service using siamese engine

Methods and systems for restoring data to a host device are described. According to some embodiments, a hybrid buffer may be used to generate a twin file of each file object to be restored and append the twin file to the corresponding file object. Each file object and its corresponding twin file may be transmitted to a construction container via a restore agent. In the event of an unexpected abort during the first restoration session, the restore agent may preserve the twin file of a file object currently being restored (if one has been created at the time of the abort) and instruct the hybrid buffer to terminate operation. During a subsequent restore session, the restore agent may poll for the preserved twin file and commence the data restore operation from the file object currently being restored using the twin file.

FIRMWARE TO RESTORE CONFIGURABLE OPTION

In an example implementation according to aspects of the present disclosure, a system comprises a firmware controller and non-volatile memory. The firmware controller retrieves a set of configurable system options from a configuration segment of the non-volatile memory. The firmware controller stores the set of configurable system options in a reserved storage location. The firmware controller updates a set of firmware instructions from a system segment of the non-volatile memory. The firmware controller retrieves the set of configurable system options from the reserved storage location. The firmware controller restores the set of configurable system options utilizing an application programming interface provided by the firmware instructions.

UNINTERRUPTED FILE LEVEL RESTORE SERVICE USING SIAMESE ENGINE

Methods and systems for restoring data to a host device are described. According to some embodiments, a hybrid buffer may be used to generate a twin file of each file object to be restored and append the twin file to the corresponding file object. Each file object and its corresponding twin file may be transmitted to a construction container via a restore agent. In the event of an unexpected abort during the first restoration session, the restore agent may preserve the twin file of a file object currently being restored (if one has been created at the time of the abort) and instruct the hybrid buffer to terminate operation. During a subsequent restore session, the restore agent may poll for the preserved twin file and commence the data restore operation from the file object currently being restored using the twin file.

Secure synchronization and management of recovery data for backup systems

Described is a system for secure management of recovery data for data protection assets such as backup data and a backup application of a production backup system. The system may provide the ability to synchronize and secure critical recovery data of an isolated recovery environment. Accordingly, the system may reduce the breadth of potential cyber security attack vectors and increase the likelihood of efficiently recovering critical data and/or applications. To provide such capabilities, the system may only activate a data connection between a production system and a recovery system when synchronizing recovery data. In addition, the system may apply a retention lock to maintain a set of immutable copies of the recovery data and may restore the recovery data to a sandboxed environment where it may be tested and verified before being deployed to the production system as part of a recovery process.

PASSWORD SAFE
20200382493 · 2020-12-03 ·

An electronic device for safe storage of confidential information comprises a biometric sensor for validating whether a user is an authorized user, and is devoid of any wired or wireless communication capability and ports for possible unauthorized access to any of the confidential information, except access by and synchronization with a second like device whose authorized access has been obtained by the same user, and within a close proximity range.

Data integration system for triggering analysis of connection oscillations

Embodiments of the present invention are directed to data integration and threat assessment for triggering analysis of connection oscillations in order to improve data and connection security. The invention leverages a security threat assessment engine and an analytics engine to gather and process data from a combination of internal and external data sources for a third party connection. The system continuously monitors and updates a generated threat level for a third party connection to determine changes or triggers indicating a potential security threat. In response to these determined changes or triggers, the system then responds to a detected security threat and minimizes damages resulting from data compromised by third party systems. Further, the system may extract and recover data from the third party systems and alter connection channels in order to further limit losses.

DATA INTEGRATION SYSTEM FOR TRIGGERING ANALYSIS OF CONNECTION OSCILLATIONS

Embodiments of the present invention are directed to data integration and threat assessment for triggering analysis of connection oscillations in order to improve data and connection security. The invention leverages a security threat assessment engine and an analytics engine to gather and process data from a combination of internal and external data sources for a third party connection. The system continuously monitors and updates a generated threat level for a third party connection to determine changes or triggers indicating a potential security threat. In response to these determined changes or triggers, the system then responds to a detected security threat and minimizes damages resulting from data compromised by third party systems. Further, the system may extract and recover data from the third party systems and alter connection channels in order to further limit losses.