Recovery point identification in CDP environments

Data processing: database and file management or data structures – File or database maintenance – Database backup

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S682000

Reexamination Certificate

active

07877360

ABSTRACT:
The embodiments of the invention provide a method of identifying a recovery point in a continuous data protection (CDP) log. More specifically, the method begins by detecting corrupted data in the CDP log and identifying the nature of corruption. Next, the nature of corruption is mapped to applications to identify components that may have caused the corrupted data. The method then finds a time instance of uncorrupted data in the components. Specifically, this can include searching CDP log entries in an order independent of log event age. Alternatively, the process of finding the time instance can include creating a data image of a first copy of uncorrupted data and sequentially apply entries of the CDP log until the corrupted data is reached.

REFERENCES:
patent: 6678704 (2004-01-01), Bridge, Jr. et al.
patent: 7467165 (2008-12-01), Okada et al.
patent: 2006/0101384 (2006-05-01), Sim-Tang et al.
patent: 2006/0168473 (2006-07-01), Sahoo et al.
patent: 2007/0100879 (2007-05-01), Dawson et al.
patent: 2007/0179994 (2007-08-01), Deguchi et al.
DB2 Universal Database—High Availability Disaster Recovery (HADR). At www.ibm.com/software/data/db2/udb/hadr/html.
DMTF-CIM. At www.dmtf.org/standards/cim/.
EMC SRDF Family. At http://www.emc.com/products
etworking/srdf.jsp.
M. D. Flouris and A. Bilas. Clotho: Transparent data versioning at the block I/O level. InProceedings of NASA/IEEE Conference on Mass Storage and Technologies, 2004.
J. L. Hafner, V. Deenadhayalan, K. K. Rao and J. A. Tomlin. Matrix Methods for Lost Data Reconstruction in Erasure Codes. InUSENIX Conference on File and Storage Technologies, FAST 2005.
IBM General Parallel File System. At http://www-03.ibm.com/systems/clusters/software/gpfs.html.
K. Keeton, C. Santos, D. Beyer, J. Chase, and J .Wilkes. Designing for disasters. Inn Thrid Usenix Conference on File and Storage Technolgies(FAST2004), 2004.
E. Kiciman and A. Fox. Detecting Application-Level Failures in Component-based Internet Services. InIEEE Transactions on Neural Networks: Special Issue on Adaptive Learning Systems in Communication Networks(invited paper), Spring 2005.
A. Kochut and G. Kar. Managing Virtual Storage Systems: An Approach Using Dependency Analysis. InIFIP/IEEE Eighth International Symposium on Integrated Network Management(IM 2003), 2003, Colorado Springs, USA.
Mendocino Software. http://www.mendocinosoft.com.
Online survey results: 2001 cost of downtime. Eagle Rock Alliance Ltd, Aug. 2001. At http://contingencyplanningresearch.com/2001 Survey.pdf.
Open Source Rule Engines in Java. At http://javasource.net/open-source/rule-engines.
A. Pennington, J. Strunk, J. Griffin, C. Soules, G. Goodson, and G. Ganger. Storage-based Intrusion Detection: Watching Storage Activity For Suspicious Behavior. In12th USENIX Security Symposium, 2003.
K. M. Reddy, C. P. Wright, A. Himmer, and E. Zadok. A Versatile and User-Oriented Versioning File System. InUSENIX Conf. on File And Storage Technologies, FAST 2004.
http://www.revivio.com.
D. Agrawal, J. Giles, K. Lee, K. Voruganti, K. Filali-Adib. Policy-Based Validation of SAN Configuration. InProceedings of IEEE Policy 2004, Yorktown Heights, NY, Jun. 2004.
M. Banikazemi, D. Poff and B. Abali. Storage-Based Intrusion Detection for Storage Area Networks (SANs). In22nd IEEE/13th NASA Goddard Conference on Mass Storage Systems and Technologies(MSST 2005), 2005.
M. Chen, A. Zheng, J. Lloyd, M. Jordan, and E. Brewer. A Statistical Learning Approach to Failure Diagnosis. InInternational Conference on Autonomic Computing(ICAC), New York, NY, May 2004.
SAP R/3 FAQ—ABAP/4 Dictionary. www.sappoint.com/faq/faqabdic.pdf.
Self-Monitoring, Analysis and Reporting Technology (SMART)disk drive monitoring tools. At http://sourceforge.net/projects/smartmontools/.
Storage Networking Industry Association. An overview of today's Continuous Data Protection (CDP) solutions. At http://www.snia.org/tech activities/dmf/docs/CDP Buyers Guide 20050822.pdf.
C. Soules, G. Goodson, J. Strunk and G. Ganger. Metadata efficiency in versioning file systems. InSecond Usenix Conference on File and Storage Technologies, (FAST 2003), San Francisco, USA, 2003.
IBM Tivoli Continuous Data Protection for Files. www-306.ibm.com/software/tivoli/products/continuous-dataprotection/.
Veritas Volume Replicator. At www.symantec.com.
Virus Encyclopedia. At http://www.viruslist.com/viruses/encyclopedia.
XOsoft Backup and Recovery Solution. At http://www.xosoft.com.
W. Xu, P. Bodik, D. Patterson. A Flexible Architecture for Statistical Learning and Data Mining from System Log Streams. InWorkshop on Temporal Data Mining: Algorithms, Theory and Applications at the Fourth IEEE International Conference on Data Mining(ICDM'04), Brighton, UK, Nov. 2004.
A. Whitaker, R. Cox and S. Gribble. Configuration Debugging as Search: Finding the Needle in the Haystack. In OSDI, 2004.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Recovery point identification in CDP environments does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Recovery point identification in CDP environments, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Recovery point identification in CDP environments will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2632773

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.