Dell products l.p. (20240111633). META-DATA DRIVEN CLASSIFICATIONS OF BACKUP COPIES simplified abstract

From WikiPatents
Jump to navigation Jump to search

META-DATA DRIVEN CLASSIFICATIONS OF BACKUP COPIES

Organization Name

dell products l.p.

Inventor(s)

Sunil Yadav of Bangalore (IN)

Shelesh Chopra of Bangalore (IN)

META-DATA DRIVEN CLASSIFICATIONS OF BACKUP COPIES - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240111633 titled 'META-DATA DRIVEN CLASSIFICATIONS OF BACKUP COPIES

Simplified Explanation

The invention relates to systems and methods for analyzing backup data to detect and characterize corruption caused by cyber-attacks or hardware failures.

  • Cyber-security module periodically analyzes backup data
  • Detection and characterization of corruption in backup data
  • Informed decision-making regarding purging or using corrupted backup data
  • Quick identification of possible ransomware attacks
  • Avoidance of additional degradation of user data

Potential Applications

This technology can be applied in various industries such as cybersecurity, data management, and IT infrastructure.

Problems Solved

1. Detection of corruption in backup data caused by cyber-attacks or hardware failures 2. Quick identification of ransomware attacks to prevent further data degradation

Benefits

1. Improved data security and integrity 2. Enhanced decision-making regarding backup data management 3. Prevention of data loss due to corruption or ransomware attacks

Potential Commercial Applications

"Enhancing Data Security and Integrity: Applications in Cybersecurity and IT Infrastructure"

Possible Prior Art

There are existing systems and methods for analyzing data integrity and detecting cyber-attacks, but the specific approach of analyzing backup data for corruption detection may be novel.

Unanswered Questions

1. How does the cyber-security module differentiate between corruption caused by cyber-attacks versus hardware failures? 2. What specific techniques are used to characterize the level of corruption in backup data sets?


Original Abstract Submitted

in general, one or more embodiments of the invention relates to systems and methods for performing a backup and later determining a level or percentage of corruption of the resulting backup set. by having a cyber-security module analyze the backup data periodically, corruption of backup data both caused by cyber-attacks or by hardware failures may be detected and characterized. by knowing how corrupted a particular corrupted backup data set is, an informed decision may be made with regards to purging the backup data set and/or using the backup data set or portion thereof in any further restorations. by making these determinations, a quick identification of possible ransomware attacks may be made, and additional degradation of a user's data may be avoided.