Dell products l.p. (20240248815). SYSTEM AND METHOD TO BUILD DEPENDENCY CHAIN FOR SNAPSHOT-BASED BACKUPS simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD TO BUILD DEPENDENCY CHAIN FOR SNAPSHOT-BASED BACKUPS

Organization Name

dell products l.p.

Inventor(s)

Srikanth Chowdary Marri of Bengalure (IN)

Madhukar Shukla of Bangalore (IN)

Elango Chockalingam of Bangalore (IN)

Shivaraj Abbigeri of Karnataka (IN)

SYSTEM AND METHOD TO BUILD DEPENDENCY CHAIN FOR SNAPSHOT-BASED BACKUPS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240248815 titled 'SYSTEM AND METHOD TO BUILD DEPENDENCY CHAIN FOR SNAPSHOT-BASED BACKUPS

Simplified Explanation

The method described in the patent application involves a secondary backup storage system determining when a first backup operation has finished creating a protection copy of assets in a client storage array. It also involves linking this first protection copy to a second protection copy created by a different backup operation.

  • The method involves using a primary backup storage system to obtain a snapshot-based backup from the client storage array.
  • The secondary backup storage system generates the first protection copy using the snapshot-based backup.
  • The method identifies a second backup operation that started before the first one and successfully produced a second protection copy.
  • Linking metadata is generated to connect the first protection copy to the second protection copy, allowing for the restoration of assets during a restore operation.

Key Features and Innovation

  • Utilization of a primary backup storage system to obtain a snapshot-based backup.
  • Generation of protection copies of assets stored in a client storage array.
  • Linking metadata creation to connect multiple protection copies for efficient restoration.

Potential Applications

This technology can be applied in various industries where data backup and restoration are crucial, such as IT, finance, healthcare, and more.

Problems Solved

  • Efficient management of multiple backup operations.
  • Streamlined process for linking and restoring protection copies of assets.

Benefits

  • Enhanced data protection and security.
  • Simplified backup and restoration procedures.
  • Improved data recovery capabilities.

Commercial Applications

Title: Data Backup and Restoration Technology for Enhanced Security This technology can be commercialized as a data backup and restoration solution for businesses of all sizes, ensuring the safety and accessibility of critical assets.

Prior Art

Readers interested in prior art related to this technology can explore existing patents and research in the field of data backup, storage systems, and metadata linking.

Frequently Updated Research

Stay updated on the latest advancements in data backup technologies, storage systems, and metadata management to enhance the efficiency and effectiveness of backup and restoration processes.

Questions about Data Backup and Restoration Technology

How does this technology improve data protection measures?

This technology enhances data protection by efficiently managing multiple backup operations and linking protection copies for streamlined restoration processes.

What industries can benefit from this data backup and restoration technology?

Various industries, including IT, finance, healthcare, and more, can benefit from this technology to ensure the safety and accessibility of critical assets.


Original Abstract Submitted

a method includes determining, by a secondary backup storage system, that a first backup operation has completed and produced a first protection copy of assets stored in a client storage array, where a primary backup storage system is used to obtain a snapshot-based backup from the client storage array and provide the snapshot-based backup to the secondary backup storage system, where the first protection copy is generated using the snapshot-based backup. the method includes identifying a second backup operation that was started before the first backup operation was started, determining that the second backup operation successfully produced a second protection copy, and generating linking metadata that links the first protection copy to the second protection copy in response to determining that the second backup operation successfully produced the second protection copy, where linking metadata is used to restore at least a portion of the assets during a restore operation.