System for automatically shadowing encrypted data and file directory structures for a plurality of network-connected computers using a network-attached memory with single instance storage

Inactive Publication Date: 2008-05-01
CARBONITE CORP
View PDF14 Cites 64 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0020]In addition, the file changes, creations, relocations, and deletions are tracked through time, with the Secure Networked Data Shadowing System enabling point-in-time restoration of individual files as well as file systems on any of the monitored computer systems, including monitored c

Problems solved by technology

It is a problem both to safeguard data that is stored on a computer system and to restore all or portions of this data that are lost or corrupted.
Many computer systems have no protection systems in place and the loss of data from these computer systems is irrevocable.
However, the use of these existing data backup systems is laborious and can be confusing to the casual user.
Furthermore, in the instance of network connected computer systems, the use of a common shared data backup system wastes a significant amount of memory by storing multiple copies of the same data and raises the issue of security of the data that is stored on the shared data backup system.
Presently, there does not exist a shared data backup system that properly addresses these issues.
Backups are typically that last line of defense against data loss, and consequently the least granular and the least convenient to use.
Organizing this storage space and managing the backup process is a complicated undertaking.
This is the easiest backup method to implement, but probably the least likely to achieve a high level

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for automatically shadowing encrypted data and file directory structures for a plurality of network-connected computers using a network-attached memory with single instance storage
  • System for automatically shadowing encrypted data and file directory structures for a plurality of network-connected computers using a network-attached memory with single instance storage
  • System for automatically shadowing encrypted data and file directory structures for a plurality of network-connected computers using a network-attached memory with single instance storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

Definitions

[0028]The following terms as used herein have the following meanings.

[0029]“File system”—the system utilized by the computer operating system to organize, store, and access information contained in the computer system memory.

[0030]“File navigation system”—the textual, hierarchical navigation interface used by the computer operating system to provide a user with an organized manner of storing, identifying, locating, and operating on files for user operations contained in the computer system memory.

[0031]“Change journal”—a computer operating system provided system to identify and track any file changes, creations, deletions, or relocations.

[0032]“Meta file”—an indirect means of storing information about a related file (e.g., file size and creation date for a data file).

[0033]“Page file”—a computer operating system defined and created file which is specific to the present session running on the computer system; the page file represents short-lived data that is not valid or m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The Secure Networked Data Shadowing System is connected to a plurality of monitored computer systems via an existing communication medium to store the shadowed data. The data is encrypted by the monitored computer system using a cryptokey, and the data file is processed using a hash function prior to encryption, so the contents of this file are uniquely identified. Thus, the encrypted file is stored in its encrypted form and the hash index is used to identify the encrypted file. A “data de-duplication” process avoids storing multiple copies of the same files by identifying instances of duplication via the hash index. Files that have the same hash index can be reduced to a single copy without any loss of data as long as the file structure information for each instance of the file is maintained.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is a utility filing which claims priority to U.S. Provisional Application No. 60 / 863,665, titled “Data Backup Systems And Methods” and filed on 31 Oct. 2006. This application is also related to the following U.S. Patent Applications filed on the same date as the present application: System For Automatically Shadowing Data And File Directory Structures That Are Recorded On A Computer Memory; System For Automatically Recovering A Computer Memory Using Shadowed Data And File Directory Structures; and System For Automatically Shadowing Data And File Directory Structures For A Plurality Of Network Connected-Computers Using A Network-Attached Memory With Single Instance Storage.FIELD OF THE INVENTION[0002]This invention relates to systems that are used to provide data backup for individual computer systems.BACKGROUND OF THE INVENTION[0003]It is a problem both to safeguard data that is stored on a computer system and to restore ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
CPCG06F11/1451G06F11/1453G06F11/1458G06F2201/84G06F17/30162G06F21/6218G06F11/1471G06F17/30144G06F16/1734G06F16/1756
Inventor SCHWAAB, DAVIDPROBST, NATHANBATCHELOR, DENNIS B.
Owner CARBONITE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products