Patents Assigned to Software AG
-
Publication number: 20240211353Abstract: Systems, methods, and computer program products are provided for reducing the size of image level backups. An example method receives backup parameters identifying a physical or Virtual Machine (VM) to backup and at least one file system object to include in the backup. The method connects to production storage corresponding to the selected physical or virtual machine and obtains access to data stored in disk corresponding to the selected file system object(s). The method fetches file allocation table (FAT) blocks from the disk and parses contents of the FAT blocks to determine if the disk blocks correspond to the selected file system object(s). The method creates a backup disk image FAT comprising blocks corresponding to the selected file system object(s). The method creates a reconstructed disk image FAT blocks corresponding to the backup FAT and disk image data blocks belonging to the selected file system object(s) and all other disk image data blocks are saved as zero blocks.Type: ApplicationFiled: September 6, 2023Publication date: June 27, 2024Applicant: VEEAM SOFTWARE AGInventors: RATMIR TIMASHEV, ANTON GOSTEV
-
Patent number: 11875234Abstract: Certain example embodiments herein relate to techniques for automatically correcting and completing data in sparse datasets. Records in the dataset are divided into groups with properties having similar values. For each group, one or more properties of the records therein that is/are to be ignored is/are identified, based on record distances relative to the records in the group, and distances among values for each of the properties of the records in the respective group. The records in the groups are further divided into sub-groups without regard to the one or more properties that is/are to be ignored. The sub-groups include a smaller and more cohesive set of records. For each sub-group: based on the records therein, predicted values to be applied to values identified as being empty but needing to be filled in are determined; and those predicted values are applied. The corrected/completed dataset is provided as output.Type: GrantFiled: July 17, 2020Date of Patent: January 16, 2024Assignee: SOFTWARE AGInventors: Vijay Anand Chidambaram, Ulrich Kalex
-
Patent number: 11860738Abstract: Embodiments provide systems, methods, and computer program products for enabling user authorization to perform a file level recovery from an image level backup of a virtual machine without the need for access control by an administrator. Specifically, embodiments enable an access control mechanism for controlling access to stored image level backups of a virtual machine. In an embodiment, the virtual machine includes a backup application user interface that can be used to send a restoration request to a backup server. The restoration request can include a machine identifier and a user identifier of the user logged onto the virtual machine. The backup server includes a backup application that determines whether or not the machine identifier contained in the restoration request can be matched to a machine identifier of a virtual machine present in one of the virtual machine backups stored on the backup server.Type: GrantFiled: May 25, 2021Date of Patent: January 2, 2024Assignee: VEEAM SOFTWARE AGInventor: Anton Gostev
-
Patent number: 11797285Abstract: Techniques enable an application for execution in a heterogeneous computing environment including an on-premise server and a Software-as-a-Service (SaaS) provider. A scaffold defining assets usable by the application and configuration details therefor is developed. At least one scaffold map is generated. Each specifies target servers where individual assets are located and/or to be located. Different scaffold maps are generated for different user-specifiable environments to which the application is deployable. An application manager helps generate agent manifests based on the scaffold and one or more scaffold maps. The agent manifests are usable to configure respective target servers. A package manager helps provision the target servers based on the agent manifests. The provisioning includes distributing to corresponding target servers, and processing thereon, the agent manifests. The processing includes rolling back the distribution responsive to an occurrence of a defined exception case.Type: GrantFiled: November 29, 2021Date of Patent: October 24, 2023Assignee: SOFTWARE AGInventor: John Carter
-
Patent number: 11789823Abstract: Systems, methods, and computer program products are provided for reducing the size of image level backups. An example method receives backup parameters identifying a physical or Virtual Machine (VM) to backup and at least one file system object to include in the backup. The method connects to production storage corresponding to the selected physical or virtual machine and obtains access to data stored in disk corresponding to the selected file system object(s). The method fetches file allocation table (FAT) blocks from the disk and parses contents of the FAT blocks to determine if the disk blocks correspond to the selected file system object(s). The method creates a backup disk image FAT comprising blocks corresponding to the selected file system object(s). The method creates a reconstructed disk image FAT blocks corresponding to the backup FAT and disk image data blocks belonging to the selected file system object(s) and all other disk image data blocks are saved as zero blocks.Type: GrantFiled: July 20, 2021Date of Patent: October 17, 2023Assignee: VEEAM SOFTWARE AGInventors: Ratmir Timashev, Anton Gostev
-
Patent number: 11748074Abstract: Certain example embodiments relate to techniques for use with mainframe computing systems that include both general-purpose processors (e.g., CPs) and special-purpose processors that can be used to perform only certain limited operations (e.g., zIIPs). Certain example embodiments automatically help these special-purpose processors perform user exits and other routines thereon, rather than requiring those operations to be performed on general-purpose processors. This approach advantageously can improve system performance when executing programs including these user exits and other routines, and in a preferred embodiment, it can be accomplished in connection with a suitably-configured user exit daemon. In a preferred embodiment, the daemon and its clients can use a user exit property table or the like to communicate with one another about the state of each user exit or other routine that has been analyzed, classified, and possibly modified.Type: GrantFiled: May 28, 2021Date of Patent: September 5, 2023Assignee: SOFTWARE AGInventors: Uwe Henker, Arno Zude, Dieter Kessler
-
Patent number: 11683360Abstract: Certain example embodiments relate to web applications. In certain example embodiments, an instance of a web application is executed using a client device. In response to the instance being started up, metadata is retrieved using a service embedded in the application and invoked at a bootstrap hook. The metadata is associated with earmarked programmatic elements in the application. At the client device and using an evaluation service injected into operation of the instance, one or more configured rules are evaluated against input. The rules are definable in relation to the earmarked programmatic elements using the retrieved metadata. They specify behavior of the web application and are dynamically (re)configurable while the instance of the web application is running. The (re)configured rules are dynamically effective without requiring web application redeployment, even if (re)configured while the instance of the web application is running. The instance is controllable responsive to the evaluation.Type: GrantFiled: August 5, 2021Date of Patent: June 20, 2023Assignee: SOFTWARE AGInventors: Yashwanth Kalva, Shiva Chetan K S
-
Patent number: 11606386Abstract: Disclosed herein are system, method, and computer program product embodiments for restoring an electronic device. An embodiment operates by receiving a request for restoring a portion of data from a point of time onto the electronic device. Thereafter, the portion of data is scanned for a virus. Based on the detection of the virus, a determination is made on whether to proceed with restoring the electronic device with the portion of data. If the determination is made to proceed with the restoring of the electronic device, the portion of data is subsequently transmitted to the electronic device. The portion of data is stored in a backup repository remote from the electronic device.Type: GrantFiled: March 4, 2022Date of Patent: March 14, 2023Assignee: VEEAM SOFTWARE AGInventors: Ratmir Timashev, Anton Gostev
-
Patent number: 11550923Abstract: Certain example embodiments test an application for security vulnerabilities. Binary and/or source code representations are subjected to static testing. Static testing identifies potential security weaknesses in the application. For each potential security weakness, a corresponding dynamic test set, containing one or more test cases, is generated based on (i) the corresponding potential security weakness, and (ii) lookups to weakness, application context, and attack pattern databases. The weakness database includes different weakness types and descriptions thereof. The attack pattern database includes information about how to generate attacks for the different weakness types. An instance of the application running in a test runtime environment is dynamically tested using the dynamic test cases. The dynamic test results verify whether each potential security weakness is a real vulnerability. The dynamic test results include fewer false-positives than the raw static test results.Type: GrantFiled: March 30, 2020Date of Patent: January 10, 2023Assignee: SOFTWARE AGInventor: Heiko Weber
-
Patent number: 11537570Abstract: Certain example embodiments relate to data migration. During setup, migration reference and change log tables are created. The former includes instructions for implementing changes to accommodate the migration. A custom migration procedure is generated to process these instructions. Triggers are created to automatically record, in the change log table, information about data-related actions performed on tables structured using the source schema. During backup, the triggers are activated, and the migration procedure is run to conform a restored version of the data in the tables structured using the source schema to the target schema.Type: GrantFiled: December 1, 2020Date of Patent: December 27, 2022Assignee: SOFTWARE AGInventor: Ajay Singh Bamel
-
Publication number: 20220291999Abstract: Disclosed herein are system, method, and computer program product embodiments for encryption key management. An embodiment operates by executing an initial non-backup instance of an application and generates a primary key using a cryptographic algorithm. The embodiment requests a customer to create a passphrase configured to encrypt and decrypt the primary key. The embodiment generates a derived key using a cryptographic algorithm and the customer passphrase as input. The embodiment then encrypts the primary key using the generated derived key and stores the encrypted primary key in a catalog.Type: ApplicationFiled: March 12, 2021Publication date: September 15, 2022Applicant: Veeam Software AGInventors: Deepika DIXIT, Julio Lopez, Thomas Manville, Vaibhav Kamra
-
Patent number: 11423045Abstract: A data analysis system is provided. Processing resources are configured to at least: identify features within a dataset, identify potential features of interest therefrom, and enable selection of one of the identified potential features of interest. Responsive to an identified potential feature of interest being selected: (a) algorithms are run on the dataset to identify at least one related feature that the selected feature of interest is most likely and/or most heavily influenced by; (b) a display is generated to include a visual representation of each related feature, each including associated data value representations; and (c) a visual representation can be selected. A data value representation is selectable together with the selected visual representation. Responsive selection of the visual representation, (a)-(c) are repeated. Responsive to a data value representation being selected in (c), the dataset is filtered based on it, and the repetition is performed with the filtered dataset.Type: GrantFiled: May 2, 2019Date of Patent: August 23, 2022Assignee: SOFTWARE AGInventors: Gopinath Rajendiran, Aaradhana Sridharan, Vidhyadharan Deivamani, Vijay Anand Chidambaram, Ulrich Kalex
-
Patent number: 11386375Abstract: An electronic resource tracking and storage computer system communicates with computing systems operated by different participants. Computing systems store copies of a blockchain and have associated computing devices with sensors. A programmed rule set includes conditions to be met when cooperating to complete, in connection with a resource tracked via the blockchain, a modeled process including modeled tasks. A transceiver receives, from the computing devices, signed electronic data messages including identifiers and values from their respective sensors. Blockchain transactions including identifiers and value(s) in the respective messages are generated. Generated blockchain transactions are published for inclusion in blockchain's copies. Value(s) in the respective electronic data messages are validated against the set of programmed rules. Based on the validations' results, events are emitted to an event bus monitored by a management system.Type: GrantFiled: September 20, 2018Date of Patent: July 12, 2022Assignee: SOFTWARE AGInventors: Vijay Anand Chidambaram, Rajesh Kumar Radhakrishnan Varadhan, Balaji Thilagar, Vijayanand Ravivarman
-
Patent number: 11360935Abstract: An efficient data storage system is described. An agent software application on computing devices in a first tier processes snapshot backups and pushes them to an appliance software application on a server in a second tier. The appliance software application processes archive backups and pushes them to cloud storage in a third tier. A cloud application on a management server receives storage policy specifications from customers and promulgates the policies to the agent software application and the appliance software application. The policy specifications include time periods and retention set information for the backups. When a retention set has been exceeded, the storage system is pruned to remove file references to unneeded files and delete data files no longer referenced in storage sets in the retention set.Type: GrantFiled: October 25, 2018Date of Patent: June 14, 2022Assignee: Aparavi Software AGInventor: Rod Christensen
-
Publication number: 20220156155Abstract: Systems, methods, and computer program products are provided for reducing the size of image level backups. An example method receives backup parameters identifying a physical or Virtual Machine (VM) to backup and at least one file system object to include in the backup. The method connects to production storage corresponding to the selected physical or virtual machine and obtains access to data stored in disk corresponding to the selected file system object(s). The method fetches file allocation table (FAT) blocks from the disk and parses contents of the FAT blocks to determine if the disk blocks correspond to the selected file system object(s). The method creates a backup disk image FAT comprising blocks corresponding to the selected file system object(s). The method creates a reconstructed disk image FAT blocks corresponding to the backup FAT and disk image data blocks belonging to the selected file system object(s) and all other disk image data blocks are saved as zero blocks.Type: ApplicationFiled: July 20, 2021Publication date: May 19, 2022Applicant: Veeam Software AGInventors: Ratmir TIMASHEV, Anton Gostev
-
Patent number: 11334324Abstract: Certain example embodiments modify portions of a program, represented by object code stored in an executable, to be executed in a computing environment including general-purpose and special-purpose processors. Culprit calls in the object code deemed ineligible for execution by the special-purpose processor are identified. For each identified call: inserted into an allocated area are instructions that cause the program to temporarily cease executing calls using the special-purpose processor and instead execute an equivalent to the respective culprit call using the general-purpose processor, and return to executing calls using the special-purpose processor following execution of the respective culprit call using the general-purpose processor; and the respective identified culprit call is replaced with a branch instruction for the allocated area to cause the program to execute the inserted instructions rather than the replaced respective culprit call.Type: GrantFiled: April 27, 2020Date of Patent: May 17, 2022Assignee: SOFTWARE AGInventor: Uwe Henker
-
Patent number: 11321531Abstract: A system for automatically updating a process model is provided. The system uses semantic similarities between externally sourced textual data and textual descriptions contained in the process model to classify words in the externally sourced textual data into one of multiple possible actionable categories. The textual data is then parsed for dependent words that are used to automatically update to an existing process model.Type: GrantFiled: November 29, 2019Date of Patent: May 3, 2022Assignee: SOFTWARE AGInventors: Ganesh Swamypillai, Shriram Venkatnarayanan
-
Patent number: 11303668Abstract: Disclosed herein are system, method, and computer program product embodiments for restoring an electronic device. An embodiment operates by receiving a request for restoring a portion of data from a point of time onto the electronic device. Thereafter, the portion of data is scanned for a virus. Based on the detection of the virus, a determination is made on whether to proceed with restoring the electronic device with the portion of data. If the determination is made to proceed with the restoring of the electronic device, the portion of data is subsequently transmitted to the electronic device. The portion of data is stored in a backup repository remote from the electronic device.Type: GrantFiled: September 27, 2019Date of Patent: April 12, 2022Assignee: Veeam Software AGInventors: Ratmir Timashev, Anton Gostev
-
Patent number: 11275522Abstract: An efficient data storage system is described. An agent software application on computing devices in a first tier processes snapshot backups and pushes them to an appliance software application on a server in a second tier. The appliance software application processes archive backups and pushes them to cloud storage in a third tier. A cloud application on a management server receives storage policy specifications from customers and promulgates the policies to the agent software application and the appliance software application. The policy specifications include a snapshot specification including a snapshot time period for backups in the second tier and an archive specification including an archive time period for backups in the third tier. The backups are created efficiently such that if a file has not changed, a reference to a file is included in a storage set rather than the data file itself. This reduces the size of storage sets.Type: GrantFiled: August 13, 2020Date of Patent: March 15, 2022Assignee: Aparavi Software AGInventor: Rod Christensen
-
Patent number: 11243776Abstract: Certain example embodiments automatically generate complex event processing (CEP) events and query definitions for real-time decomposition of resource usage data. Component models specifying measureable characteristics related to an aggregate reading and state(s) into which respective components are enterable are defined. For components that can have plural states, the models further specify valid state transitions, including predecessor and/or successor states. Plausible and composite state definitions are generatable from the component models. The former defines when a CEP engine is to trigger a corresponding plausible state event to signify that a corresponding state is potentially active. The latter corresponds to a representation of two or more component states that potentially are concurrently active. The CEP engine is configured to trigger events based on the aggregate reading and the generated plausible and composite state event definitions.Type: GrantFiled: March 31, 2020Date of Patent: February 8, 2022Assignee: SOFTWARE AGInventor: Jens Schimmelpfennig