The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 17, 2024

Filed:

Feb. 11, 2021
Applicant:

Commvault Systems, Inc., Tinton Falls, NJ (US);

Inventors:

PurnaChandra Sekhar Bedhapudi, Eatontown, NJ (US);

Sri Karthik Bhagi, Morganville, NJ (US);

Deepak Raghunath Attarde, Marlboro, NJ (US);

Arun Prasad Amarendran, Manalapan, NJ (US);

Amit Bhaskar Ausarkar, Ocean, NJ (US);

Mrityunjay Upadhyay, Hyderabad, IN;

Assignee:

Commvault Systems, Inc., Tinton Falls, NJ (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 21/56 (2013.01); G06F 16/17 (2019.01); G06F 16/174 (2019.01);
U.S. Cl.
CPC ...
G06F 21/566 (2013.01); G06F 16/1734 (2019.01); G06F 16/1752 (2019.01); G06F 2221/034 (2013.01); G06F 2221/2101 (2013.01);
Abstract

This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.


Find Patent Forward Citations

Loading…