17957332. META-DATA DRIVEN CLASSIFICATIONS OF BACKUP COPIES simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

META-DATA DRIVEN CLASSIFICATIONS OF BACKUP COPIES

Organization Name

Dell Products L.P.

Inventor(s)

Sunil Yadav of Bangalore (IN)

Shelesh Chopra of Bangalore (IN)

META-DATA DRIVEN CLASSIFICATIONS OF BACKUP COPIES - A simplified explanation of the abstract

This abstract first appeared for US patent application 17957332 titled 'META-DATA DRIVEN CLASSIFICATIONS OF BACKUP COPIES

Simplified Explanation

The invention relates to systems and methods for analyzing backup data to determine the level of corruption, allowing for informed decisions on using or purging the data.

  • Cyber-security module periodically analyzes backup data for corruption caused by cyber-attacks or hardware failures.
  • Detection and characterization of corrupted backup data sets help in making decisions on data usage and restoration.
  • Quick identification of possible ransomware attacks is enabled, preventing further degradation of user data.

Potential Applications

This technology can be applied in various industries such as cybersecurity, data management, and IT infrastructure.

Problems Solved

1. Detection of corruption in backup data caused by cyber-attacks or hardware failures. 2. Quick identification of ransomware attacks to prevent data loss.

Benefits

1. Informed decision-making on using or purging corrupted backup data. 2. Prevention of additional degradation of user data. 3. Enhanced cybersecurity measures for data protection.

Potential Commercial Applications

"Data Corruption Detection Technology for Cybersecurity and Data Management"

Possible Prior Art

There are existing technologies for backup data analysis, but the specific focus on detecting corruption caused by cyber-attacks and hardware failures may be a novel aspect of this invention.

Unanswered Questions

How does the cyber-security module analyze the backup data for corruption?

The specific methods and algorithms used by the cyber-security module to detect corruption in backup data are not detailed in the abstract.

What are the specific indicators of corruption that the cyber-security module looks for in the backup data?

The abstract mentions detecting corruption caused by cyber-attacks or hardware failures, but the specific indicators or patterns that the module analyzes are not specified.


Original Abstract Submitted

In general, one or more embodiments of the invention relates to systems and methods for performing a backup and later determining a level or percentage of corruption of the resulting backup set. By having a cyber-security module analyze the backup data periodically, corruption of backup data both caused by cyber-attacks or by hardware failures may be detected and characterized. By knowing how corrupted a particular corrupted backup data set is, an informed decision may be made with regards to purging the backup data set and/or using the backup data set or portion thereof in any further restorations. By making these determinations, a quick identification of possible ransomware attacks may be made, and additional degradation of a user's data may be avoided.