Patents by Inventor Grigory Borisovich Lyakhovitskiy
Grigory Borisovich Lyakhovitskiy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10809940Abstract: A first storage node configured to store data associated with a user is allocated. The data stored on the first storage node is mirrored at a second storage node. A resiliency mechanism is implemented at the first and second storage nodes. The resiliency mechanism is configured to restore data on at least one of the storage devices of the first and second storage nodes. In response to a loss of availability of either the first or second storage node and a loss of availability of one or more storage device on an available storage node, data on the unavailable storage devices of the available storage node is recovered using the resiliency mechanism of the available storage node.Type: GrantFiled: April 19, 2019Date of Patent: October 20, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Karan Mehra, Justin Sing Tong Cheung, Vinod R. Shankar, Grigory Borisovich Lyakhovitskiy
-
Patent number: 10558617Abstract: Aspects of the subject matter described herein relate to backups and change journals. In aspects, a change journal is read to determine changes that have occurred to objects of a file system. From these changes a data structure is created to capture path information and collect changes for each object. Where the data structure is insufficient to identify a complete path, the live file system is consulted. After the data structure is complete, a data protection engine uses the data structure to update a catalog at least to provide the capability to view the namespace of the protected objects at one or more times covered by the catalog.Type: GrantFiled: November 2, 2017Date of Patent: February 11, 2020Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Branton Nicolas Boehm, Apurva Ashwin Doshi, Juan-Lee Pang, Grigory Borisovich Lyakhovitskiy, Sarosh Cyrus Havewala
-
Publication number: 20180196826Abstract: Aspects of the subject matter described herein relate to backups and change journals. In aspects, a change journal is read to determine changes that have occurred to objects of a file system. From these changes a data structure is created to capture path information and collect changes for each object. Where the data structure is insufficient to identify a complete path, the live file system is consulted. After the data structure is complete, a data protection engine uses the data structure to update a catalog at least to provide the capability to view the namespace of the protected objects at one or more times covered by the catalog.Type: ApplicationFiled: November 2, 2017Publication date: July 12, 2018Inventors: Branton Nicolas Boehm, Apurva Ashwin Doshi, Juan-Lee Pang, Grigory Borisovich Lyakhovitskiy, Sarosh Cyrus Havewala
-
Patent number: 9824091Abstract: Aspects of the subject matter described herein relate to backups and change journals. In aspects, a change journal is read to determine changes that have occurred to objects of a file system. From these changes a data structure is created to capture path information and collect changes for each object. Where the data structure is insufficient to identify a complete path, the live file system is consulted. After the data structure is complete, a data protection engine uses the data structure to update a catalog at least to provide the capability to view the namespace of the protected objects at one or more times covered by the catalog.Type: GrantFiled: December 3, 2010Date of Patent: November 21, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Branton Nicolas Boehm, Apurva Ashwin Doshi, Juan-Lee Pang, Grigory Borisovich Lyakhovitskiy, Sarosh Cyrus Havewala
-
Patent number: 9229818Abstract: Aspects of the subject matter described herein relate to adaptive retention for backup data. In aspects, space may be needed on a backup storage in order to store additional backup data. In response, an indication that space is needed provided to a retention manager. The retention manager attempts to prune data on the backup storage to free up space on the backup storage. Before deleting a version on the backup storage, the retention manager determines whether deletion conditions are met. The retention manager may apply one or more retention policies in its efforts to free space. The retention manager may manage and free the space such that versions of files already stored are preserved for the longest possible time.Type: GrantFiled: July 20, 2011Date of Patent: January 5, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Apurva Ashwin Doshi, Grigory Borisovich Lyakhovitskiy, Bohdan W. Raciborski
-
Patent number: 8977865Abstract: The re-encryption of data can be performed with independent cryptographic agents that can automatically encrypt and decrypt data in accordance with cryptographic regions, such that data within a single cryptographic region is encrypted and decrypted with the same cryptographic key. An “in-place” re-encryption can be performed by reading data from a chunk in an existing cryptographic region, shrinking the existing cryptographic region past the chunk, expanding a replacement cryptographic region over the chunk, and then writing the data back to the same location, which is now part of the replacement cryptographic region. An “out-of-place” re-encryption can be performed by reading data from a chunk in an existing cryptographic region and then writing the data back to a location immediately adjacent that is part of a replacement cryptographic region. After the re-encrypted data is “shifted”, the cryptographic regions can be expanded and contracted appropriately, and another chunk can be selected.Type: GrantFiled: May 25, 2010Date of Patent: March 10, 2015Assignee: Microsoft Technology Licensing, LLCInventors: David Abzarian, Darren Glen Moss, Grigory Borisovich Lyakhovitskiy, Karan Mehra, Innokentiy Basmov, Octavian T. Ureche
-
Patent number: 8788774Abstract: Aspects of the subject matter described herein relate to data protection. In aspects, during a backup cycle, backup copies may be created for files that are new or that have changed since the last backup. If external backup storage is not available, the backup copies may be stored in a cache located on the primary storage. If backup storage is available, the backup copies may be stored in the backup storage device and backup copies that were previously stored in the primary storage may be copied to the backup storage. The availability of the backup storage may be detected and used to seamlessly switch between backing up files locally and remotely as availability of the backup storage changes.Type: GrantFiled: December 2, 2013Date of Patent: July 22, 2014Assignee: Microsoft CorporationInventors: Apurva Ashwin Doshi, Grigory Borisovich Lyakhovitskiy, Bohdan W. Raciborski
-
Publication number: 20140095798Abstract: Aspects of the subject matter described herein relate to data protection. In aspects, during a backup cycle, backup copies may be created for files that are new or that have changed since the last backup. If external backup storage is not available, the backup copies may be stored in a cache located on the primary storage. If backup storage is available, the backup copies may be stored in the backup storage device and backup copies that were previously stored in the primary storage may be copied to the backup storage. The availability of the backup storage may be detected and used to seamlessly switch between backing up files locally and remotely as availability of the backup storage changes.Type: ApplicationFiled: December 2, 2013Publication date: April 3, 2014Applicant: Microsoft CorporationInventors: Apurva Ashwin Doshi, Grigory Borisovich Lyakhovitskiy, Bohdan W. Raciborski
-
Patent number: 8627025Abstract: Aspects of the subject matter described herein relate to data protection. In aspects, during a backup cycle, backup copies may be created for files that are new or that have changed since the last backup. If external backup storage is not available, the backup copies may be stored in a cache located on the primary storage. If backup storage is available, the backup copies may be stored in the backup storage device and backup copies that were previously stored in the primary storage may be copied to the backup storage. The availability of the backup storage may be detected and used to seamlessly switch between backing up files locally and remotely as availability of the backup storage changes.Type: GrantFiled: December 21, 2010Date of Patent: January 7, 2014Assignee: Microsoft CorporationInventors: Apurva Ashwin Doshi, Grigory Borisovich Lyakhovitskiy, Bohdan W. Raciborski
-
Patent number: 8442235Abstract: Security device objects can be utilized to support a stack of components of computer-executable instructions that are directed to managing the security functionality represented by the security device object. In the case of hardware encrypting storage devices, a security device object can represent the self-encrypting capabilities of those devices and the attendant stack can comprise drivers directed to band and key management. A default band management driver can support a band-centric set of input/output controls that can be redirected to the band management driver. It can cache band authentication keys or provide callback mechanisms for key providers to register themselves to provide keys on-demand. Key provider identifiers can be stored on the storage device and utilized to dynamically load, install or upgrade key providers when the band authentication key is required. The band management driver can also prevent the powering-down of the storage device in an unlocked state.Type: GrantFiled: April 14, 2010Date of Patent: May 14, 2013Assignee: Microsoft CorporationInventor: Grigory Borisovich Lyakhovitskiy
-
Publication number: 20130024423Abstract: Aspects of the subject matter described herein relate to adaptive retention for backup data. In aspects, space may be needed on a backup storage in order to store additional backup data. In response, an indication that space is needed provided to a retention manager. The retention manager attempts to prune data on the backup storage to free up space on the backup storage. Before deleting a version on the backup storage, the retention manager determines whether deletion conditions are met. The retention manager may apply one or more retention policies in its efforts to free space. The retention manager may manage and free the space such that versions of files already stored are preserved for the longest possible time.Type: ApplicationFiled: July 20, 2011Publication date: January 24, 2013Applicant: Microsoft CorporationInventors: Apurva Ashwin Doshi, Grigory Borisovich Lyakhovitskiy, Bohdan W. Raciborski
-
Publication number: 20120159078Abstract: Aspects of the subject matter described herein relate to data protection. In aspects, during a backup cycle, backup copies may be created for files that are new or that have changed since the last backup. If external backup storage is not available, the backup copies may be stored in a cache located on the primary storage. If backup storage is available, the backup copies may be stored in the backup storage device and backup copies that were previously stored in the primary storage may be copied to the backup storage. The availability of the backup storage may be detected and used to seamlessly switch between backing up files locally and remotely as availability of the backup storage changes.Type: ApplicationFiled: December 21, 2010Publication date: June 21, 2012Applicant: MICROSOFT CORPORATIONInventors: Apurva Ashwin Doshi, Grigory Borisovich Lyakhovitskiy, Bohdan W. Raciborski
-
Publication number: 20120143825Abstract: Aspects of the subject matter described herein relate to backups and change journals. In aspects, a change journal is read to determine changes that have occurred to objects of a file system. From these changes a data structure is created to capture path information and collect changes for each object. Where the data structure is insufficient to identify a complete path, the live file system is consulted. After the data structure is complete, a data protection engine uses the data structure to update a catalog at least to provide the capability to view the namespace of the protected objects at one or more times covered by the catalog.Type: ApplicationFiled: December 3, 2010Publication date: June 7, 2012Applicant: Microsoft CorporationInventors: Branton Nicolas Boehm, Apurva Ashwin Doshi, Juan-Lee Pang, Grigory Borisovich Lyakhovitskiy, Sarosh Cyrus Havewala
-
Publication number: 20120143824Abstract: Aspects of the subject matter described herein relate to data protection of files that may include both content and embedded metadata. In aspects, an indication that a file has changed is received. If the content has changed, the entire file or just the content may be backed up. If the metadata only has changed, the metadata may or may not be backed up, depending on implementation. Instead of parsing the file to determine the exact size and positioning of the metadata within the file, the file may be divided into three portions: a head portion, a middle portion, and a tail portion. Hashes of these portions may then be used to determine whether the metadata and/or content of the file have changed.Type: ApplicationFiled: December 2, 2010Publication date: June 7, 2012Applicant: Microsoft CorporationInventors: Apurva Ashwin Doshi, Grigory Borisovich Lyakhovitskiy
-
Publication number: 20110296238Abstract: The re-encryption of data can be performed with independent cryptographic agents that can automatically encrypt and decrypt data in accordance with cryptographic regions, such that data within a single cryptographic region is encrypted and decrypted with the same cryptographic key. An “in-place” re-encryption can be performed by reading data from a chunk in an existing cryptographic region, shrinking the existing cryptographic region past the chunk, expanding a replacement cryptographic region over the chunk, and then writing the data back to the same location, which is now part of the replacement cryptographic region. An “out-of-place” re-encryption can be performed by reading data from a chunk in an existing cryptographic region and then writing the data back to a location immediately adjacent that is part of a replacement cryptographic region. After the re-encrypted data is “shifted”, the cryptographic regions can be expanded and contracted appropriately, and another chunk can be selected.Type: ApplicationFiled: May 25, 2010Publication date: December 1, 2011Applicant: MICROSOFT CORPORATIONInventors: David Abzarian, Darren Glen Moss, Grigory Borisovich Lyakhovitskiy, Karan Mehra, Innokentiy Basmov, Octavian T. Ureche
-
Publication number: 20110258456Abstract: Security device objects can be utilized to support a stack of components of computer-executable instructions that are directed to managing the security functionality represented by the security device object. In the case of hardware encrypting storage devices, a security device object can represent the self-encrypting capabilities of those devices and the attendant stack can comprise drivers directed to band and key management. A default band management driver can support a band-centric set of input/output controls that can be redirected to the band management driver. It can cache band authentication keys or provide callback mechanisms for key providers to register themselves to provide keys on-demand. Key provider identifiers can be stored on the storage device and utilized to dynamically load, install or upgrade key providers when the band authentication key is required. The band management driver can also prevent the powering-down of the storage device in an unlocked state.Type: ApplicationFiled: April 14, 2010Publication date: October 20, 2011Applicant: MICROSOFT CORPORATIONInventor: Grigory Borisovich Lyakhovitskiy