GROUP BASED COMPLETE AND INCREMENTAL COMPUTER FILE BACKUP SYSTEM, PROCESS AND APPARATUS
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention is capable of determining the rights to a file based on providing a descriptor. The descriptor can be calculated using an algorithm, which may be cryptographic and/or non-cryptographic. The descriptor may further be based on the file contents, metadata of the file, other file data, or any combination thereof to uniquely identify the file in a shared file repository. Since the descriptor is generated based on file data it will be the same regardless of which user generates it. Accordingly, only one copy of the file needs to be maintained in the shared file repository, thereby reducing the amount of network bandwidth required to assure the file is backed up and further reducing the amount of storage required to backup the files. This results in a vastly more efficient method of backup in terms of processing time, network bandwidth, and storage requirements.
-
Citations
49 Claims
-
1-29. -29. (canceled)
-
30. A method of managing data in an encrypted system comprising a backup server and a client device having a first remote storage medium, the client device and backup server being configured to exchange encrypted communications with one another, the method comprising:
-
receiving, at the client device, a request to backup data from the first remote storage medium to the backup server; in response to receiving the request, initiating a backup routine at the client device, the backup routine comprising; identifying a first set of files stored on the first remote storage medium; generating, at the client device, a cryptographic signature value for each file in the first set of files, wherein the cryptographic signature value is computed by using actual data of the file as an input to a cryptographic signature generating algorithm which computes the cryptographic signature value; generating a first inventory including the cryptographic signature values calculated for the first set of files; transmitting the first inventory from the client device to the backup server via one or more encrypted communications; and causing one or more files from the first set of files to be transmitted to the backup server for storage by the backup server. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A client device configured to exchange encrypted communications with a backup server over a communication network, the client device comprising:
-
a first remote storage medium; and a backup application configured to execute a backup routine comprising; identifying a first set of files stored on the first remote storage medium; generating a cryptographic signature value for each file in the first set of files, wherein the cryptographic signature value is computed by using actual data of the file as an input to a cryptographic signature generating algorithm which computes the cryptographic signature value; generating a first inventory including the cryptographic signature values calculated for the first set of files; transmitting the first inventory from the client device to the backup server via one or more encrypted communications; and causing one or more files from the first set of files to be transmitted to the backup server for storage by the backup server. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
Specification