Data transfer in a data protection system
First Claim
Patent Images
1. A method for transferring or accessing data in a computing system using an infrastructure of a data protection application, the method comprising:
- operating the data protection application in the computing system, the data protection system configured to perform data protection operations including a backup operation;
receiving, by a data protection service of the data protection application, a request to transfer or access data;
presenting a user interface, by the data protection service, in a display of a first host, the user interface including a workflow for transferring the data using the infrastructure of the data protection system, wherein the user interface includes a pluggable framework that allows the workflow in the user interface to be adapted to the data associated with the request, wherein the user interface is provided by an agent of the data protection system;
configuring the request to transfer or access the data to or from a second host in the user interface, wherein the first host is associated with a first storage device and the second host is associated with a second storage device,in coordination with the data protection service operating on a data protection server, performing a data control process of the data protection system in response to the request to transfer or access data without performing the backup operation on the data with respect to the request, wherein the data control process includes authenticating a user requesting the data transfer and determining whether the user is authorized to access the data based on authentication information maintained by the data protection system; and
performing the request and transferring or accessing the data by the data protection application in accordance with the data control process of the data protection system.
8 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for performing a data transfer in a data protection system are disclosed. A user interface is provided that includes a workflow. The workflow is effective to configure a data transfer by identifying the source of the data, the destination of the data, and the data itself. A data control process associated with the data protection system is performed to authenticate the requesting user and determine whether the user is authorized to access the data. The data is transferred in accordance with the data control process of the data protection system.
-
Citations
20 Claims
-
1. A method for transferring or accessing data in a computing system using an infrastructure of a data protection application, the method comprising:
-
operating the data protection application in the computing system, the data protection system configured to perform data protection operations including a backup operation; receiving, by a data protection service of the data protection application, a request to transfer or access data; presenting a user interface, by the data protection service, in a display of a first host, the user interface including a workflow for transferring the data using the infrastructure of the data protection system, wherein the user interface includes a pluggable framework that allows the workflow in the user interface to be adapted to the data associated with the request, wherein the user interface is provided by an agent of the data protection system; configuring the request to transfer or access the data to or from a second host in the user interface, wherein the first host is associated with a first storage device and the second host is associated with a second storage device, in coordination with the data protection service operating on a data protection server, performing a data control process of the data protection system in response to the request to transfer or access data without performing the backup operation on the data with respect to the request, wherein the data control process includes authenticating a user requesting the data transfer and determining whether the user is authorized to access the data based on authentication information maintained by the data protection system; and performing the request and transferring or accessing the data by the data protection application in accordance with the data control process of the data protection system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A storage device having stored therein computer-executable instructions which, when executed by one or more hardware processors of a computing system, implement a method for requesting data in the computing system, wherein the system is associated with a data protection system, the method comprising:
-
operating the data protection system in the computing system, the data protection system configured to perform data protection operations including a backup operation; receiving, by a data protection service of the data protection system, a request to transfer data presenting a user interface, by the data protection service, on a first host in response to the request to transfer data, wherein the user interface displayed on the first hose is provided by the data protection system and includes a workflow; receiving input into the workflow of the data protection system through the user interface, wherein a data transfer operation to transfer the data is based on the input; configuring the data transfer operation by selecting data for transfer from the second host identified in the user interface and identifying a destination of the data transfer in the user interface; in coordination with the data protection service operating on a data protection server, performing a data control process of the data protection system in response to the request to transfer data without performing a backup or restore operation on the data associated with the data transfer operation, wherein the data control process includes authenticating a user requesting the data transfer and determining whether the user is authorized to access the data being requested; and performing the request to transfer data by transferring the data by the data protection system using the data control process of the data protection system, wherein the first host is associated with a first storage device and the second host is associated with a second storage device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification