Systems and methods to detect deleted files
First Claim
1. A method to protect data deleted between data protection operations in a data management system, the method comprising:
- monitoring, with one or more computer processors comprising hardware, data that has been protected with one or more data protection operations;
automatically monitoring, with the one or more computer processors, one or more data operations in primary storage that occur after the one or more data protection operations;
when the one or more data operations is a deletion operation, automatically identifying with the one or more computer processors, deletion data associated with the deletion operation and a file path associated with the deletion data;
prior to performing the deletion operation, determining with the one or more computer processors, whether the deletion data has been protected by the one or more data protection operations, and when the deletion data has not been protected, automatically converting the deletion data to at least one hidden file;
automatically copying with the one or more computer processors the at least one hidden file and the file path to temporary storage;
performing the deletion operation; and
automatically copying, during a subsequent second data protection operation, the at least one hidden file stored in the temporary storage to a location on one or more secondary storage devices based at least in part on the file path stored in the temporary storage.
2 Assignments
0 Petitions
Accused Products
Abstract
A data storage system protects data identified for deletion which has been created or modified between scheduled data backups. For instance, the system monitors data operations and when the data operation is a delete, the system determines whether the data identified for deletion has been protected by a backup operation. Data that has not been backed up, such as newly created data, is copied to temporary storage before deletion. When the data has been protected, the system determines whether the data has been modified after the backup operation. Data modified after the backup operation is copied to temporary storage before deletion.
-
Citations
20 Claims
-
1. A method to protect data deleted between data protection operations in a data management system, the method comprising:
-
monitoring, with one or more computer processors comprising hardware, data that has been protected with one or more data protection operations; automatically monitoring, with the one or more computer processors, one or more data operations in primary storage that occur after the one or more data protection operations; when the one or more data operations is a deletion operation, automatically identifying with the one or more computer processors, deletion data associated with the deletion operation and a file path associated with the deletion data; prior to performing the deletion operation, determining with the one or more computer processors, whether the deletion data has been protected by the one or more data protection operations, and when the deletion data has not been protected, automatically converting the deletion data to at least one hidden file; automatically copying with the one or more computer processors the at least one hidden file and the file path to temporary storage; performing the deletion operation; and automatically copying, during a subsequent second data protection operation, the at least one hidden file stored in the temporary storage to a location on one or more secondary storage devices based at least in part on the file path stored in the temporary storage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 14)
-
-
11. A system to protect data deleted between data protection operations in an information management cell, the system comprising:
-
one or more computer processors comprising computer hardware that monitor data that has been protected with one or more data protection operations; the one or more computer processors automatically monitor data operations in primary storage that occur after the one or more data protection operations; when the one or more data protection operations is a deletion operation, the one or more computer processors automatically identifies deletion data associated with the deletion operation and a file path associated with the deletion data; prior to performing the deletion operation, the one or more computer processors determine whether the deletion data has been protected by the one or more data protection operations, and when the deletion data has not been protected, automatically converting the deletion data to at least one hidden file; the one or more computer processors copy the hidden file and the file path to temporary storage; the one or more computer processors perform the deletion operation; the one or more computer processors copy, during a subsequent data protection operation, the at least one hidden file stored in the temporary storage to a location on the secondary storage based at least in part on the file path stored in the temporary storage. - View Dependent Claims (12, 13, 15, 16, 17, 18, 19, 20)
-
Specification