IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0687438
(2010-01-14)
|
등록번호 |
US-8566297
(2013-10-22)
|
발명자
/ 주소 |
- Dowers, II, Gregory R.
- Searls, Kirk L.
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
6 인용 특허 :
34 |
초록
▼
A system and method for efficiently accessing large data storage subsystems with a different file format than a format used by running applications. A backup server is coupled to a data storage medium, and is configured to store data on the data storage medium according to a first file format. A cli
A system and method for efficiently accessing large data storage subsystems with a different file format than a format used by running applications. A backup server is coupled to a data storage medium, and is configured to store data on the data storage medium according to a first file format. A client is coupled to the backup server and is configured to convey memory access requests for data stored in the data storage medium. The client is unable to decipher the first file format. A filter driver in the backup server is coupled to intercept the requests from the client. The filter driver is configured to decipher the first file format; spoof the existence of one or more spoofed files that do not exist on the data storage medium, wherein each of the one or more spoofed files corresponds to data stored on the data storage medium; and present the spoofed files to the client.
대표청구항
▼
1. A method for restoring data in a computing system, the method comprising: accessing data in a data storage medium, said data being stored according to a first file format;deciphering the first file format by a filter driver coupled to intercept requests for access to the data received from one or
1. A method for restoring data in a computing system, the method comprising: accessing data in a data storage medium, said data being stored according to a first file format;deciphering the first file format by a filter driver coupled to intercept requests for access to the data received from one or more clients;spoofing the existence of one or more spoofed files that do not exist on the data storage medium, wherein each of the one or more spoofed files corresponds to data stored on the data storage medium; presenting the spoofed files to a client of the one or more clients for selection to be restored; receiving a request from the client to restore at least one of said spoofed files;restoring the at least one of said spoofed files in response to receiving said request, wherein said restoring comprises restoring at least a portion of the data stored on the data storage medium; andreading catalog data, using a backup server, to identify point in time backup images stored on the storage medium. 2. The method as recited in claim 1, wherein each of the one or more spoofed files presented to the client consumes no space on the storage medium. 3. The method as recited in claim 1, wherein in response to the request from the client for the at least one of said spoofed files, the method further comprises: retrieving one or more blocks of data stored on the data storage medium that correspond to the at least one of said spoofed files;formatting the one or more blocks of data in order to realize the at least one of said spoofed files; andconveying the realized at least one of said spoofed files to the client. 4. The method as recited in claim 3, wherein the first file format comprises at least one of the following: a single-instance storage format, and a proprietary format native to a backup system. 5. The method as recited in claim 3, wherein the realized at least one of said spoofed files is formatted according to a second file format utilized by the client. 6. The method as recited in claim 1, further comprising presenting the at least one of said spoofed files as being stored in a spoofed directory. 7. The method as recited in claim 1, further comprising: spoofing, using the backup server, the existence of one or more spoofed backup images which do not exist on the storage medium; andpresenting, using the backup server, the spoofed backup images to the client. 8. The method as recited in claim 7, further comprising the client conveying a request to the backup server for restoration of one of the spoofed backup images. 9. A computer system comprising: a backup server coupled to a data storage medium, wherein the backup server is configured to store data on the data storage medium according to a first file format;a client configured to convey memory access requests for data stored in the data storage medium, wherein the client is unable to decipher the first file format; anda filter driver coupled to intercept the requests, wherein the filter driver is configured to: decipher the first file format;spoof the existence of one or more spoofed files that do not exist on the data storage medium, wherein each of the one or more spoofed files corresponds to data stored on the data storage medium;present the spoofed files to the client for selection to be restored;receive a request from the client to restore at least one of said spoofed files;restore the at least one of said spoofed files in response to receiving said request, wherein said restoring comprises restoring at least a portion of the data stored on the data storage medium; andread catalog data to identify point in time backup images stored on the storage medium. 10. The computer system of claim 9, wherein each of the one or more spoofed files presented to the client consumes no space on the storage medium. 11. The computer system of claim 9, wherein in response to the request from the client for the at least one of said spoofed files, the filter driver is configured to: retrieve one or more blocks of data stored on the data storage medium that correspond to the at least one of said spoofed files;format the one or more blocks of data in order to realize the at least one of said spoofed files; andconvey the realized at least one of said spoofed files to the client. 12. The computer system of claim 11, wherein the first file format comprises at least one of the following: a single-instance storage format, and a proprietary format native to a backup system. 13. The computer system of claim 12, wherein the realized at least one of said spoofed files is formatted according to a second file format utilized by the client. 14. The computer system of claim 9, wherein the backup server is configured to present the at least one of said spoofed files as being stored in a spoofed directory. 15. The computer system of claim 9, wherein the filter driver is further configured to: spoof the existence of one or more spoofed backup images; andpresent the spoofed backup images to the client. 16. The computer system of claim 15, wherein the client is configured to convey a request to the backup server for retrieval of one of the spoofed backup images. 17. A non-transitory computer-readable storage medium storing program instructions that are executable to: access data in a data storage medium, said data being stored according to a first file format;decipher the first file format by a filter driver coupled to intercept requests for access to the data received from one or more clients;spoof the existence of one or more spoofed files that do not exist on the data storage medium, wherein each of the one or more spoofed files corresponds to data stored on the data storage medium;present the spoofed files to a client of the one or more clients for selection to be restored;receive a request from the client to restore at least one of said spoofed files;restore the at least one of said spoofed files in response to receiving said request, wherein said restoring comprises restoring at least a portion of the data stored on the data storage medium; andread catalog data to identify point in time backup images stored on the storage medium. 18. The computer-readable storage medium of claim 17, wherein in response to a first request from a client for the at least one of said spoofed files, the program instructions are further executable to: retrieve one or more blocks of data stored on the data storage medium that correspond to the at least one of said spoofed files;format the one or more blocks of data in order to realize the at least one of said spoofed files; andconvey the realized at least one of said spoofed files to the client. 19. The computer-readable storage medium of claim 17, wherein the program instructions are further executable to spoof the existence of one or more spoofed backup images which do not exist on the storage medium; andpresent the spoofed backup images to the client. 20. The computer-readable storage medium of claim 19, wherein the program instructions are further executable to receive a request from a client for retrieval of one of the spoofed backup images.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.