Intelligent protection of off-line mail data
First Claim
Patent Images
1. A method for protecting mail data, the method comprising:
- with a client computing device comprising computer hardware, processing a mail data file stored in one or more primary storage devices in preparation for creation of a secondary copy of the mail data file in one or more secondary storage devices, the mail data file containing a plurality of mail objects;
with one or more computing devices comprising computer hardware, creating a first secondary copy of the mail data file on the one or more secondary storage devices;
determining a first score associated with the mail data file as it existed as of the creation of the first secondary copy, wherein the first score is not a unique identifier of the mail data file as it existed as of the creation of the first secondary copy;
determining whether the mail data file has been modified since the creation of the first secondary copy;
in response to determining that the mail data file has been modified since the creation of the first secondary copy, calculating a second score based on the mail data file as it existed following the modification, wherein the second score is not a unique identifier of the mail data file as it existed following the modification;
comparing the second score with the first score, wherein the first score and the second score are based on one or more of a number of nodes in the mail data file and a life expectancy of one or more nodes in the mail data file; and
determining whether a result of the comparison satisfies one or more threshold criteria, wherein a second secondary copy of the mail data file is created on the one or more secondary storage devices in response to determining that the result of the comparison satisfies the one or more threshold criteria.
2 Assignments
0 Petitions
Accused Products
Abstract
A system according to certain aspects improves the process of creating secondary copies of data (e.g., creating backup copies). The system can compute the score of the data (e.g., a computer file storing information) to be backed up, and determine whether the score satisfies one or more threshold criteria before backing up the data. In one example, a change in score indicates a change in the content of the data. The threshold criteria may be that the score be different from the score of the most recently backed up copy of the data.
83 Citations
18 Claims
-
1. A method for protecting mail data, the method comprising:
-
with a client computing device comprising computer hardware, processing a mail data file stored in one or more primary storage devices in preparation for creation of a secondary copy of the mail data file in one or more secondary storage devices, the mail data file containing a plurality of mail objects; with one or more computing devices comprising computer hardware, creating a first secondary copy of the mail data file on the one or more secondary storage devices; determining a first score associated with the mail data file as it existed as of the creation of the first secondary copy, wherein the first score is not a unique identifier of the mail data file as it existed as of the creation of the first secondary copy; determining whether the mail data file has been modified since the creation of the first secondary copy; in response to determining that the mail data file has been modified since the creation of the first secondary copy, calculating a second score based on the mail data file as it existed following the modification, wherein the second score is not a unique identifier of the mail data file as it existed following the modification; comparing the second score with the first score, wherein the first score and the second score are based on one or more of a number of nodes in the mail data file and a life expectancy of one or more nodes in the mail data file; and determining whether a result of the comparison satisfies one or more threshold criteria, wherein a second secondary copy of the mail data file is created on the one or more secondary storage devices in response to determining that the result of the comparison satisfies the one or more threshold criteria. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for protecting mail data, the system comprising:
-
a client computing device comprising computer hardware and configured to process a mail data file stored in one or more primary storage devices in preparation for creation of a secondary copy of the mail data file in one or more secondary storage devices, the mail data file containing a plurality of mail objects;
one or more secondary storage computing devices comprising computer hardware and configured to create secondary copies of data in the one or more secondary storage devices;one or more computing devices comprising computer hardware and including a mail protection manager, the mail protection manager configured to; determine whether the mail data file has been modified since the creation of the first secondary copy; determine a first score associated with the mail data file as it existed as of the creation of the first secondary copy, wherein the first score is not a unique identifier of the mail data file as it existed as of the creation of the first secondary copy; in response to determining that the mail data file has been modified since the creation of the first secondary copy, calculate a second score based on the mail data file as it existed following the modification, wherein the second score is not a unique identifier of the mail data file as it existed following the modification; compare the second score with the first score, wherein the first score and the second score are based on one or more of a number of nodes in the mail data file and a hie expectancy of one or more nodes in the mail data file; determine whether a result of the comparison satisfies one or more threshold criteria; and
in response to determining that the result of the comparison satisfies the one or more threshold criteria, instruct the one or more secondary storage computing devices to create a second secondary copy of the mail data file. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for protecting mail data, the method comprising:
-
with one or more computing devices comprising computer hardware, calculating a first score associated with a mail data file stored in one or more primary storage devices, the mail data file containing a plurality of mail objects, the first score associated with the mail data file as it existed as of creation of a first secondary copy of the mail data file in one or more secondary storage devices, the first score is not a unique identifier of the mail data file as it existed as of the creation of the first secondary copy; determining whether the mail data file has been modified since the creation of the first secondary copy; in response to determining that the mail data file has been modified since the creation of the first secondary copy, calculating a second score based on the mail data file as it existed following the modification, wherein the second score is not a unique identifier of the mail data file as it existed following the modification; comparing the second score with the first score;
determining whether a result of the comparison satisfies threshold criteria, wherein the first score and the second score are based on one or more of a number of nodes in the mail data file and a life expectancy of one or more nodes in the mail data file; andif the comparison satisfies the threshold criteria, outputting a command for delivery over a computer network to another computing device to initiate creation of a second secondary copy of the mail data file in the one or more secondary storage devices.
-
Specification