Group based complete and incremental computer file backup system, process and apparatus
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/30
G06F-011/10
G06F-011/14
출원번호
US-0236257
(2011-09-19)
등록번호
US-9037545
(2015-05-19)
발명자
/ 주소
Young, Hadley Rasch
출원인 / 주소
HYBIR INC.
대리인 / 주소
Sheridan Ross P.C.
인용정보
피인용 횟수 :
2인용 특허 :
282
초록▼
The present invention is capable of determining the rights to a file based on providing a descriptor. The descriptor can be calculated using an algorithm, which may be cryptographic and/or non-cryptographic. The descriptor may further be based on the file contents, metadata of the file, other file d
The present invention is capable of determining the rights to a file based on providing a descriptor. The descriptor can be calculated using an algorithm, which may be cryptographic and/or non-cryptographic. The descriptor may further be based on the file contents, metadata of the file, other file data, or any combination thereof to uniquely identify the file in a shared file repository. Since the descriptor is generated based on file data it will be the same regardless of which user generates it. Accordingly, only one copy of the file needs to be maintained in the shared file repository, thereby reducing the amount of network bandwidth required to assure the file is backed up and further reducing the amount of storage required to backup the files. This results in a vastly more efficient method of backup in terms of processing time, network bandwidth, and storage requirements.
대표청구항▼
1. A method of managing data in an encrypted system comprising a backup server and a client device having a first remote storage medium, the client device and backup server being configured to exchange encrypted communications with one another, the method comprising: receiving, at the client device,
1. A method of managing data in an encrypted system comprising a backup server and a client device having a first remote storage medium, the client device and backup server being configured to exchange encrypted communications with one another, the method comprising: receiving, at the client device, a request to backup data from the first remote storage medium to the backup server;in response to receiving the request, initiating a backup routine at the client device, the backup routine comprising: identifying a first set of files stored on the first remote storage medium;generating, at the client device, a cryptographic signature value for each file in the first set of files, wherein the cryptographic signature value is computed by using actual data of the file as an input to a cryptographic signature generating algorithm which computes the cryptographic signature value;generating, at the client device, a first inventory for the first set of files, wherein the first inventory reflects a current state of the first remote storage medium, and wherein the first inventory includes the cryptographic signature value generated for each file in the first set of files;transmitting the first inventory from the client device to the backup server via one or more encrypted communications; andcausing one or more files from the first set of files to be transmitted to the backup server for storage by the backup server upon determining that the cryptographic signature values generated for each file in the first set of files allows access to the one or more files on the backup server. 2. The method of claim 1, further comprising: receiving a second inventory at the client device, the second inventory including cryptographic signature values found by the backup server in the first inventory and not found in a list containing all cryptographic signature values identifying actual data currently stored by the backup server; andwherein the one or more files from the first set of files corresponds to every file in the first set of files having a cryptographic signature corresponding to a cryptographic signature found in the second inventory. 3. The method of claim 2, wherein the one or more files from the first set of files does not include every file in the first set of files. 4. The method of claim 1, wherein the cryptographic signature values substantially uniquely identify at least one of a file and data structure that is on the first remote storage medium. 5. The method of claim 1, wherein the cryptographic signature values are generated with at least a 256-bit encryption algorithm. 6. The method of claim 1, wherein the communications between the client device and backup server are encrypted with an encryption algorithm. 7. The method of claim 1, further comprising: compressing the one or more files prior to causing the one or more files to be transmitted to the backup server. 8. The method of claim 1, wherein the communications between the client device and backup server are transmitted across a secure packet-based network. 9. The method of claim 1, wherein the cryptographic signature values comprise multiple file signatures using multiple cryptographic algorithms. 10. A client device configured to exchange encrypted communications with a backup server over a communication network, the client device comprising: a first remote storage medium; anda backup application configured to execute a backup routine comprising: identifying a first set of files stored on the first remote storage medium;generating a cryptographic signature value for each file in the first set of files, wherein the cryptographic signature value is computed by using actual data of the file as an input to a cryptographic signature generating algorithm which computes the cryptographic signature value;generating a first inventory for the first set of files, wherein the first inventory reflects a current state of the first remote storage medium, and wherein the first inventory includes the cryptographic signature values generated for each file in the first set of files;transmitting the first inventory from the client device to the backup server via one or more encrypted communications; andcausing one or more files from the first set of files to be transmitted to the backup server for storage by the backup server upon determining that the cryptographic signature value generated for each file in the first set of files allows access to the one or more files on the backup server. 11. The client device of claim 10, wherein the first set of files is determined by scanning a list of files stored in the first remote storage medium and identifying the first set of files as being one of new and changed since a last backup operation was performed. 12. The client device of claim 10, wherein the backup application is further configured to receive a second inventory, the second inventory including cryptographic signature values found by the backup server in the first inventory and not found in a list containing all cryptographic signature values identifying actual data currently stored by the backup server, and wherein the one or more files from the first set of files corresponds to every file in the first set of files having a cryptographic signature corresponding to a cryptographic signature found in the second inventory. 13. The client device of claim 12, wherein the one or more files from the first set of files does not include every file in the first set of files and wherein the first inventory includes a description of the hierarchical structure of the first remote storage medium. 14. The client device of claim 10, wherein the cryptographic signature values substantially uniquely identify at least one of a file and data structure that is on the first remote storage medium. 15. The client device of claim 10, wherein the cryptographic signature values are generated with at least one encryption algorithm for portions of data having a predetermined length that is less than a length of the file. 16. The client device of claim 10, wherein the communications between the client device and backup server are encrypted with an encryption algorithm. 17. The client device of claim 10, wherein the backup application is further configured to compress the one or more files prior to causing the one or more files to be transmitted to the backup server. 18. The client device of claim 10, wherein the communications between the client device and backup server are transmitted across a secure packet-based network. 19. The client device of claim 10, wherein the cryptographic signature values comprise multiple file signatures using multiple cryptographic algorithms. 20. A backup server configured to exchange encrypted communications with the client device of claim 10.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (282)
Kawabata, Hiroyuki; Uchida, Hisashi; Emori, Kiyoshi; Inui, Kazuo, Access control system, access managing method, image forming device and computer program product.
O\Brien John T. (Lafayette CO) Thomas Neil L. (Boulder CO) Dyer Tracy D. (Aurora CO), Adaptive data compression apparatus including run length encoding for a tape drive system.
Gelb Jack P. (San Jose CA) Tyrrell John C. (San Jose CA), Allocating data storage space of peripheral data storage devices using implied allocation based on user parameters.
Griffin David (Maynard MA) Campbell Jonathan (Acton MA) Reilly Michael (Sterling MA) Rosenbaum Richard (Pepperell MA), Arrangement with cooperating management server node and network service node.
Myers James J. (San Francisco CA) Wang Pong-Sheng (San Jose CA), CPU implemented method for backing up modified data sets in non-volatile store for recovery in the event of CPU failure.
Noguchi, Yasuo; Ogiwara, Kazutaka; Tamura, Masahisa; Tsuchiya, Yoshihiro; Maruyama, Tetsutaro; Take, Riichiro, Computer-readable recording medium having recorded hash-value generation program, computer-readable recording medium having recorded storage management program, and storage system.
McCanne, Steven; Demmer, Michael J., Content-based segmentation scheme for data compression in storage and transmission including hierarchical segment representation.
McCanne, Steven; Demmer, Michael J., Content-based segmentation scheme for data compression in storage and transmission including hierarchical segment representation.
McCanne,Steven; Demmer,Michael J., Content-based segmentation scheme for data compression in storage and transmission including hierarchical segment representation.
McCanne,Steven; Demmer,Michael J., Content-based segmentation scheme for data compression in storage and transmission including hierarchical segment representation.
Midgely Christopher W. (Framingham MA) Holland Charles J. (Northboro MA) Webb John W. (Sutton MA) Gonsalves Manuel (Brookline MA), Continuously-snapshotted protection of computer files.
Pond Eugene W. (Garland TX) Rush Jeffrey R. (Richardson TX) Watson John D. (Carrollton TX) Woodall Bruce A. (Plano TX) Goode Walter M. (Dallas TX) Goode George E. (Richardson TX), Cryptographic labeling of electronically stored data.
Yanagawa Atsuyuki (Tokyo JPX) Shimizu Hisao (Tokyo JPX), Data processing system for locally updating customer data distributed by a host computer to a remote facility and for re.
Farber David A. ; Lachman Ronald D., Data processing system using substantially unique identifiers to identify data items, whereby identical data items hav.
Margolus,Norman H.; Knight, Jr.,Thomas F.; Floyd,Jered J.; Hartman,Sam; Homsy, II,George E., Data repository and method for promoting network storage of data.
Margolus,Norman H.; Knight, Jr.,Thomas F.; Floyd,Jered J.; Hartman,Sam; Homsy, II,George E., Data repository and method for promoting network storage of data.
Davis Scott H. (Merrimack NH) Goleman William L. (Nashua NH) Thiel David W. (Amherst NH), Digital data management system for maintaining consistency of data in a shadow set.
Fortier Richard W. (Acton MA) Mastors Robert M. (Ayer MA) Taylor Tracy M. (Upton MA) Wallace John J. (Franklin MA), Digital data processor with improved backup storage.
Kenley Gregory (Northboro MA) Ericson George (Schrewsbury MA) Fortier Richard (Acton MA) Holland Chuck (Northboro MA) Mastors Robert (Ayer MA) Pownell James (Natick MA) Taylor Tracy (Upton MA) Wallac, Digital data storage system with improved data migration.
Kitaori Shoji,JPX ; Koganezawa Yuichi,JPX, Electronic signature addition method, electronic signature verification method, and system and computer program product.
Kandasamy David R. (San Ramon CA) Butler Mitchel B. (Sunnyvale CA) Foss Andrew L. (Yarrow Point WA) Peterson Bradley M. (Los Altos CA) Patwardhan Chintamani M. (Sunnyvale CA) Ribble Michael T. (Los G, Fault tolerant NFS server system and mirroring protocol.
Belsan Jay S. (Nederland CO) Laughlin Jeffrey S. (Nederland CO) Pedersen Mogens H. (Longmont CO) Raicer Robert J. (Niwot CO) Rudeseal George A. (Boulder CO) Schafer Charles P. (Louisville CO) Steele , File server having snapshot application data groups.
Cane David ; Hirschman David, High performance backup via selective file saving which can perform incremental backups and exclude files and uses a cha.
Milligan Charles A. (Golden CO) Rudeseal George A. (Boulder CO) Belsan Jay S. (Nederland CO), Incremental disk backup system for a dynamically mapped data storage subsystem.
Hoffecker John C. (Berthoud CO) McNamara Alan R. (MacGregor CO AUX) Schafer Charles P. (Louisville CO) Smith Harry E. (Lakewood CO) Walsh Nathan E. (Boulder CO), Intelligent storage manager for data storage apparatus having simulation capability.
Douceur, John R.; Theimer, Marvin M.; Adya, Atul; Bolosky, William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
Adams John J. (Vienna VA) Kidd Clark (Sterling VA) Summers Timothy (Allison Park PA), Method and apparatus for a pattern based spaced management system.
David Karger ; Eric Lehman ; F. Thomson Leighton ; Matthew Levine ; Daniel Lewin ; Rina Panagrahy, Method and apparatus for distributing requests among a plurality of resources.
Choiniere, David A.; Knight, Timothy J.; Hayduk, Darren J.; Moogala, Venu G.; Pawela, Mark E., Method and apparatus for generating extensible protocol independent binary health checks.
Litwin Witold,FRX ; Menon Jaishankar Moothedath ; Risch Tore Johan Martin,SEX, Method and system for data recovery using a distributed and scalable data structure.
Eastridge Lawrence E. (Tucson AZ) Kern Robert F. (Tucson AZ) Ratliff James M. (Tucson AZ), Method and system for incremental time zero backup copying of data.
Cohn Oded (Haifa AZ ILX) Micka William F. (Tucson AZ) Nagin Kenneth M. (Tucson AZ) Novick Yoram (Haifa ILX) Winokur Alexander (Haifa ILX), Method and system for time zero backup session security.
Beardsley Brent C. (Tucson AZ) Micka William F. (Tucson AZ) Novick Yoram (Haifa ILX), Method and system for track transfer control during concurrent copy operations in a data processing storage subsystem.
Margolus,Norman H.; Knight, Jr.,Thomas F.; Floyd,Jered J.; Homsy, II,George E., Method for providing access control for data items in a data repository in which storage space used by identical content is shared.
McConaughy John M. (Austin TX) Pancoast Steven T. (Austin TX), Method of and system for using device drivers to couple the communication and data storage of remote computer systems.
Miyaji Atsuko (Kawachinagano JPX), Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication.
Williams, Dominic C. C.; Korn, Christian M., Method of producing a checkpoint which describes a box file and a method of generating a difference file defining differences between an updated file and a base file.
Schneider Eric ; Ferril Chuck ; Wheeler Doug ; Schwartz Larry ; Bruggeman Edward, Method, software and apparatus for saving, using and recovering data.
Christofferson, Armin Harold; Gregg, Leon Edward; Tilbury, James Lawrence; Van Oosbree, James Michael, Method, system, and program for accessing files in a file system.
Swanepoel, Jacques Diederik; Fu, Guangsheng, Methods and apparatus for modifying a backup data stream including a set of validation bytes for each data block to be provided to a fixed position delta reduction backup application.
Boldt, Timothy J.; Lewitzky, Andre G.; Stoilov, Nikolay K., Methods and apparatus for modifying a backup data stream including logical partitions of data blocks to be provided to a fixed position delta reduction backup application.
Boldt, Timothy J.; Lewitzky, Andre G.; Stoilov, Nikolay K., Methods and apparatus for modifying a backup data stream including logical partitions of data blocks to be provided to a fixed position delta reduction backup application.
Lomet David B. (Westford MA) Spiro Peter M. (Nashua NH) Joshi Ashok M. (Nashua NH) Raghavan Ananth (Nashua NH) Rengarajan Tirumanjanam K. (Nashua NH), Methods and apparatus for optimizing undo log usage.
Webber Neil F. (Hudson MA) Israel Robert K. (Westford MA) Kenley Gregory (Northborough MA) Taylor Tracy M. (Upton MA) Foster Antony W. (Framingham MA), Network file migration system.
Hasegawa,Hiroshi, Originality guarantee system, embedded information/alteration detection apparatus and embedded information/alteration detection method, and record medium storing embedded information/alteration detec.
Row Edward J. (Mountain View CA) Boucher Laurence B. (Saratoga CA) Pitts William M. (Los Altos CA) Blightman Stephen E. (San Jose CA), Parallel I/O network file server architecture.
Clark Brian E. (Rochester MN) Lawlor Francis D. (Saugerties NY) Schmidt-Stumpf Werner E. (Patterson NY) Stewart Terrence J. (Rochester MN) Timms ; Jr. George D. (Rochester MN), Parity spreading to enhance storage access.
Rudeseal George A. (Boulder CO) Ludlam Henry S. (Longmont CO) Belsan Jay S. (Nederland CO), Phantom duplex copy group apparatus for a disk drive array data storge subsystem.
Flaherty James E. (Hudson MA) Abrahams Alan (Framingham MA), Remote bootstrapping a node over communication link by initially requesting remote storage access program which emulates.
Graber Mark S. (Streetsboro OH) Fraley Kris M. (Huntsburg OH) Zink Steven M. (Hudson OH) Jeffery R. Jay (Mentor OH) Epner Paul J. (Grafton WI), Remote downloading and uploading of motion control program information to and from a motion control I/O module in a prog.
Tevis Gregory J. (Tucson AZ) Waldo Ellen J. (Tucson AZ), Storage management of a first file system using a second file system containing surrogate files and catalog management i.
Holloway John T. (Belmont MA) Moon David A. (Cambridge MA) Cannon Howard I. (Sudbury MA) Knight Thomas F. (Belmont MA) Edwards Bruce E. (Belmont MA) Weinreb Daniel L. (Arlington MA), Symbolic language data processing system.
Johnson Donavon W. (Georgetown TX) Neuman Grover H. (Austin TX) Sauer Charles H. (Austin TX) Shaheen-Gouda Amal A. (Austin TX) Smith Todd A. (Austin TX), System and method for accessing remote files in a distributed networking environment.
Woodhill James R. (Houston TX) Woodhill Louis R. (Richmond TX) More ; Jr. William Russell (Houston TX) Berlin Jay Harris (Houston TX), System and method for distributed storage management on networked computer systems using binary object identifiers.
Morris Robert J. T. (Los Gatos CA), System and method for reducing storage requirement in backup subsystems utilizing segmented compression and differencing.
Moulton, Gregory Hagan, System and method for unorchestrated determination of data sequences using sticky byte factoring to determine breakpoints in digital sequences.
Moulton,Gregory Hagan, System and method for unorchestrated determination of data sequences using sticky byte factoring to determine breakpoints in digital sequences.
Chang Albert (Austin TX) Neuman Grover H. (Austin TX) Shaheen-Gouda Amal A. (Austin TX) Smith Todd A. (Austin TX), System and method for using cached data at a local node after re-opening a file at a remote node in a distributed networ.
Fujiwara, Shinji; Sagawa, Nobutoshi; Uemura, Tetsuya; Odawara, Hiroaki, System and method for virtualizing a distributed network storage as a single-view file system.
Flynn Rex A. (Belmont MA) Anick Peter G. (Marlboro MA), System for reconstructing prior versions of indexes using records indicating changes between successive versions of the.
Hirsch, Michael; Bitner, Haim; Aronovich, Lior; Asher, Ron; Bachmat, Eitan; Klein, Shmuel T., Systems and methods for efficient data searching, storage and reduction.
Laggis George E. (Naperville IL) Meyer Paul F. (Wheaton IL), User and application program transparent resource sharing multiple computer interface architecture with kernel process l.
Beck Robert E. (1105 E. Mayfair Rd. Arlington Heights IL 60004) Schoenberger Ronald L. (37 Oxford Clarendon Hills IL 60514), Workgroup organized network manager with workstation comparison system.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.