发明名称 Techniques for managing deduplication of data
摘要 Techniques for detecting advanced security threats may be realized as a method for detecting a security threat including generating a resource at a client, implementing the resource on the client, monitoring system behavior of the client having the resource implemented thereon, determining whether a security event involving the implemented resource has occurred based on the monitored system behavior, and generating a report when it has been determined that the security event has occurred.
申请公布号 US9436697(B1) 申请公布日期 2016.09.06
申请号 US201313736510 申请日期 2013.01.08
申请人 Veritas Technologies LLC 发明人 Kulkarni Pradip Madhukar;Bajpai Vishal
分类号 G06F7/00;G06F17/00;G06F17/30 主分类号 G06F7/00
代理机构 Wilmer Cutler Pickering Hale and Dorr LLP 代理人 Wilmer Cutler Pickering Hale and Dorr LLP
主权项 1. A method for managing deduplication of data comprising: receiving, via a network, first data to be backed up; separating the first data to be backed up into segments; generating, using at least one computer processor, a fingerprint for each of the segments; sampling n-bits of the fingerprints; writing the sampled fingerprints to a plurality of hook tables arranged in a plurality of computing nodes, wherein the plurality of computing nodes respectively contain at least one of the plurality of hook tables, and wherein sizes of the n-bits of each of the sampled fingerprints are based on sizes of the hook tables to which the sampled fingerprints are written; receiving a lookup set of fingerprints corresponding to second data to be backed up; extracting a portion of the fingerprints corresponding to the second data; comparing the extracted portion of the fingerprints corresponding to the second data to entries of the plurality of hook tables to determine which of the plurality of hook tables has a highest number of matches; determining whether any of the fingerprints corresponding to the second data do not exist in memory based on the comparison using the respective extracted portions; filtering the fingerprints corresponding to the second data that are determined not to exist and transmitting remaining fingerprints corresponding to the second data to the computing node having the hook table with the highest number of matches so that a second comparison is made using the remaining fingerprints to determine which of the remaining fingerprints exist in the fingerprints generated from the first data; and backing up segments associated with the second data that do not exist in the first data.
地址 Mountain View CA US