Verification of computer backup data
First Claim
1. A method of backing up source data from a source storage volume of a source computer to backup media, comprising:
- reading at least a portion of the source data from the source storage volume;
generating by the source computer a hash of the source data read from the source volume;
transmitting the source data and hash to said backup media;
writing the source data to said backup media as backup data;
writing the hash to the backup media; and
associating the hash with the backup data corresponding to the source data from which the hash was generated.
10 Assignments
0 Petitions
Accused Products
Abstract
A backup method for a computer system network avoids generating hashes from data that may be inaccurate due to network errors affords verification of source data written to backup media includes reading at a network client a portion of the source data from a source storage volume and generating a hash of the source data at the client. The source data and hash are transmitted to a backup server and written to the backup media. The hash is written to the backup media is associated with the backup data corresponding to the source data from which the hash was generated. Verification of the backup data is performed by reading the backup data from the backup media, generating a hash from the backup data read, and comparing that hash with the hash originally stored on the backup media. This enables the backup data to be verified as corresponding to the original source data without the necessity of rereading the source data from the source volume, and enables faster, more accurate off-line verification subsequent to the backup process.
84 Citations
19 Claims
-
1. A method of backing up source data from a source storage volume of a source computer to backup media, comprising:
-
reading at least a portion of the source data from the source storage volume;
generating by the source computer a hash of the source data read from the source volume;
transmitting the source data and hash to said backup media;
writing the source data to said backup media as backup data;
writing the hash to the backup media; and
associating the hash with the backup data corresponding to the source data from which the hash was generated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of backing up source data from a source storage volume of a source computer over a network to backup media controlled by a backup server on said network, the source data being stored on said backup media as backup data with an associated hash of said source data generated by said source computer, comprising:
-
reading the backup data and its associated hash from the backup media;
generating another hash from the backup data read from the backup media; and
comparing the associated hash read from the backup media with said other hash to verify the integrity of the source data. - View Dependent Claims (11, 12, 19)
-
-
13. Computer readable media comprising instructions executed by a source computer and a backup computer of a computer network to perform a backup method to backup source data stored on a source storage volume of said network, the method comprising:
-
reading by said source computer at least a portion of source data from the source storage volume;
generating by the source computer a hash of the source data read from the source volume;
transmitting by the source computer the source data and the hash to said backup server; and
writing by the backup server the source data and the hash to backup media. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification