IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0084179
(2005-03-18)
|
등록번호 |
US-8260753
(2012-09-04)
|
발명자
/ 주소 |
- Kushwah, Ajay Pratap Singh
- Kaushik, Akhil
- Xing, Jian
- Joshi, Mayank
- Kumar, Pashupati
- Periyagaram, Subramaniam
- Suryanarayanan, Rangarajan
- Bijani, Yogita
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
4 인용 특허 :
81 |
초록
▼
In one embodiment, a method for information management comprises monitoring output from an application, wherein the output is monitored substantially continuously; determining if the output is associated with a predetermined type of version; and saving data associated with the output if the output i
In one embodiment, a method for information management comprises monitoring output from an application, wherein the output is monitored substantially continuously; determining if the output is associated with a predetermined type of version; and saving data associated with the output if the output is associated with the predetermined type of version.
대표청구항
▼
1. A method for information management comprising: intercepting output from an application by continuously monitoring input/output (I/O) as the I/O traverses from the application to an operating system but prior to arrival at the operating system in order to trap file I/O before information is writt
1. A method for information management comprising: intercepting output from an application by continuously monitoring input/output (I/O) as the I/O traverses from the application to an operating system but prior to arrival at the operating system in order to trap file I/O before information is written to storage without modification to the operating system, wherein the output is directed towards protected data;using a processor to analyze the intercepted output to determine whether a predetermined type of version of the protected data has been created;in the event it is determined that the predetermined type of version of the protected data has been created at least in part because the analyzed intercepted output includes a save and a close, automatically backing up the protected data, including by storing at least some of the intercepted output as a backup version of the protected data, wherein the version backed up is the predetermined type of version; andnot backing up the protected data in the event it is determined that the predetermined type of version of the protected data has not been created. 2. The method of claim 1, further comprising updating a storage metadata. 3. The method of claim 1, wherein data is saved in a medium external to a device on which the application resides. 4. The method of claim 1, further comprising determining whether the output is associated with a milestone, wherein a milestone includes at least one of the following: creating a file, deleting a file, or a scheduled backup event. 5. The method of claim 4, wherein the milestone is a candidate for a backup. 6. The method of claim 4 further comprising: storing a milestone marker and time and/or date information in the event it is determined the output is associated with a milestone; andin the event a request associated with recovering the protected data is received: locating one or more stored milestone markers; andpresenting the stored time and/or date information for the located milestone markers. 7. The method of claim 1 further comprising using the processor to determine, based at least in part on the intercepted output, if the intercepted output is associated with an instruction for deleting a file. 8. The method of claim 7 further comprising: determining whether a policy permits deletion of the file if the intercepted output is associated with an instruction for deleting a file; andsaving at least one copy or version of the file if it is determined that the policy does not permit deletion of the file. 9. A system for information management comprising: a processor configured to: intercept output from an application by continuously monitoring input/output (I/O) as the I/O traverses from the application to an operating system but prior to arrival at the operating system in order to trap file I/O before information is written to storage without modification to the operating system, wherein the output is directed towards protected data;analyze the intercepted output to determine whether a predetermined type of version of the protected data has been created;in the event it is determined that the predetermined type of version of the protected data has been created at least in part because the analyzed intercepted output includes a save and a close, automatically back up the protected data, including by storing at least some of the intercepted output as a backup version of the protected data, wherein the version backed up is the predetermined type of version; andnot back up the protected data in the event it is determined that the predetermined type of version of the protected data has not been created; anda memory coupled to the processor and configured to provide the processor with instructions. 10. The system of claim 9, wherein the memory is one or more of the following: remote from the processor, local to the processor, or coupled to the processor via a LAN. 11. The system of claim 9, wherein the processor is further configured to determine whether the output is associated with a milestone, wherein a milestone includes at least one of the following: creating a file, deleting a file, or a scheduled backup event. 12. The system of claim 11, wherein the milestone is a candidate for a backup. 13. The system of claim 11, wherein: the memory is further configured to store a milestone marker and time and/or date information in the event it is determined the output is associated with a milestone; andin the event a request associated with recovering the protected data is received, the processor is further configured to: locating one or more stored milestone markers; andpresenting the stored time and/or date information for the located milestone markers. 14. The system of claim 9, wherein the processor is further configured to determine, based at least in part on the intercepted output, if the intercepted output is associated with an instruction for deleting a file. 15. The system of claim 14, wherein the processor is further configured to: determine whether a policy permits deletion of the file if the intercepted output is associated with an instruction for deleting a file; andsave at least one copy or version of the file if it is determined that the policy does not permit deletion of the file. 16. A computer program product for information management, the computer program product being embodied in a computer readable storage medium and comprising computer instructions for: intercepting output from an application by continuously monitoring input/output (I/O) as the I/O traverses from the application to an operating system but prior to arrival at the operating system in order to trap file I/O before information is written to storage without modification to the operating system, wherein the output is directed towards protected data;analyzing the intercepted output to determine whether a predetermined type of version of the protected data has been created;in the event it is determined that the predetermined type of version of the protected data has been created at least in part because the analyzed intercepted output includes a save and a close, automatically backing up the protected data, including by storing on the second device at least some of the intercepted output as a backup version of the protected data, wherein the version backed up is the predetermined type of version; andnot backing up the protected data in the event it is determined that the predetermined type of version of the protected data has not been created. 17. The computer program product of claim 16, further comprising computer instructions for determining whether the output is associated with a milestone, wherein a milestone includes at least one of the following: creating a file, deleting a file, or a scheduled backup event. 18. The computer program product of claim 17, wherein the milestone is a candidate for a backup. 19. The computer program product of claim 17 further comprising computer instructions for: storing a milestone marker and time and/or date information in the event it is determined the output is associated with a milestone; andin the event a request associated with recovering the protected data is received: locating one or more stored milestone markers; andpresenting the stored time and/or date information for the located milestone markers. 20. The computer program product of claim 16 further comprising computer instructions for determining, based at least in part on the intercepted output, if the intercepted output is associated with an instruction for deleting a file. 21. The computer program product of claim 20 further comprising computer instructions for: determining whether a policy permits deletion of the file if the intercepted output is associated with an instruction for deleting a file; andsaving at least one copy or version of the file if it is determined that the policy does not permit deletion of the file.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.