18095374. INTERCEPTING AND SECURING BACKUP TRAFFIC simplified abstract (Rubrik, Inc.)

From WikiPatents
Jump to navigation Jump to search

INTERCEPTING AND SECURING BACKUP TRAFFIC

Organization Name

Rubrik, Inc.

Inventor(s)

Deepti Kochar of San Mateo CA (US)

Prabhu Mohan of Morganville NJ (US)

Prasenjit Sarkar of Los Gatos CA (US)

Yanzhe Wang of Santa Clara CA (US)

INTERCEPTING AND SECURING BACKUP TRAFFIC - A simplified explanation of the abstract

This abstract first appeared for US patent application 18095374 titled 'INTERCEPTING AND SECURING BACKUP TRAFFIC

The abstract describes methods, systems, and devices for data management, where a data management system requests a backup from a host environment. The host environment preloads a library to intercept backup communication traffic and executes the backup procedure to back up the host data store. Backup data resulting from the procedure is communicated between the host environment and the backup system using a cryptographic security protocol to encrypt the data.

  • Data management system requests backup from host environment
  • Host environment preloads library to intercept backup communication traffic
  • Backup procedure executed to back up host data store
  • Backup data communicated between host environment and backup system using cryptographic security protocol
  • Backup data encrypted for security

Potential Applications: - Data backup and recovery systems - Secure data transmission between systems - Data management in cloud computing environments

Problems Solved: - Ensuring data backup procedures are secure - Efficient communication of backup data between systems

Benefits: - Enhanced data security during backup procedures - Streamlined data management processes - Improved reliability of data backup systems

Commercial Applications: Title: Secure Data Backup and Transmission System This technology can be used in industries such as: - Information technology - Cloud computing services - Data storage and management companies

Questions about Data Management Systems: 1. How does the preloaded library in the host environment enhance data backup procedures? - The preloaded library intercepts backup communication traffic, ensuring secure transmission of backup data. 2. What are the key benefits of using a cryptographic security protocol for encrypting backup data? - Encrypting backup data enhances data security and confidentiality during transmission.


Original Abstract Submitted

Methods, systems, and devices for data management are described. A data management system may request a backup from a host environment, and the host environment may preload, in response to receiving the request, a library configured to intercept backup communication traffic at the host environment. The host environment may execute the backup procedure for backing up the host data store, and communicate, using the preloaded library, backup data resulting from the executed backup procedure between the host environment and the backup system. The backup data may be transmitted using a cryptographic security protocol that encrypts the backup data.