Identifying application metadata in a backup stream
First Claim
Patent Images
1. A non-transitory computer readable medium storing computer executable instructions that when executed by a computer cause the computer to perform a data de-duplication method, the method comprising:
- controlling a data de-duplicator to receive a backup stream, where the backup stream includes one or more of, backup application metadata produced by a backup application and non-backup application metadata produced by an application other than the backup application;
controlling the data de-duplicator to identify selected backup metadata in the backup stream;
controlling the data de-duplicator to identify selected non-backup application metadata in the backup stream;
creating a second backup stream where the selected backup metadata and the selected non-backup application metadata are removed from consideration for de-duplication; and
controlling the data de-duplicator to de-duplicate the second backup stream.
10 Assignments
0 Petitions
Accused Products
Abstract
A method of identifying application metadata in a backup stream comprises finding a known application metadata signature within a backup stream. A source application of user data in the backup stream is identified based upon the known application metadata signature. Application metadata, which has been generated by the source application, is removed from consideration by a data de-duplicator which is used to perform data de-duplication on the backup stream.
28 Citations
7 Claims
-
1. A non-transitory computer readable medium storing computer executable instructions that when executed by a computer cause the computer to perform a data de-duplication method, the method comprising:
-
controlling a data de-duplicator to receive a backup stream, where the backup stream includes one or more of, backup application metadata produced by a backup application and non-backup application metadata produced by an application other than the backup application; controlling the data de-duplicator to identify selected backup metadata in the backup stream; controlling the data de-duplicator to identify selected non-backup application metadata in the backup stream; creating a second backup stream where the selected backup metadata and the selected non-backup application metadata are removed from consideration for de-duplication; and controlling the data de-duplicator to de-duplicate the second backup stream. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A storage appliance comprising:
-
a plurality of storage devices; a data de-duplicator coupled to the plurality of storage devices and configured for de-duplicating a backup stream prior to storing de-duplicated information from the backup stream on the plurality of storage devices; and an application metadata identifier coupled to the data de-duplicator and configured for identifying metadata within the backup stream as received by the storage appliance, where the application metadata identifier comprises; a metadata signature finder configured to find a known application metadata signature in the backup stream as received by the storage appliance; a source application identifier configured to identify a source application of user data in the backup stream as received by the storage appliance, based on the known application metadata signature; a de-duplication delimitator configured to remove application metadata in the backup stream as received by the storage appliance from consideration by the data de-duplicator during the de-duplicating to produce a second backup data stream, where the application metadata includes metadata produced by a backup application and metadata produced by an application other than the backup application, where removing the application metadata from the backup stream as received by the storage appliance includes producing the second backup data stream by physically excluding the application metadata, or producing the second data stream by logically excluding the application metadata; and a data de-duplicator configured to de-duplicate the second backup stream, where the second backup stream may include data configured to logically exclude the application metadata.
-
Specification