TECHNIQUES FOR ACCESSING A BACKUP SYSTEM
First Claim
1. In a computerized client device, a method of accessing a backup system, the method comprising:
- receiving a logon command to logon a user to a website of the backup system, the backup system including (i) a backup server and (ii) a web server which hosts the website to enable the user to control settings of the backup server;
in response to receiving the logon command, sending a token request to the backup server through a pre-established secure data pathway between the computerized client device and the backup server, data being periodically backed up from the computerized client device to the backup server through the pre-established secure data pathway in a secure manner; and
in response to sending the token request, acquiring a logon token from the backup server through the pre-established secure data pathway between the computerized client device and the backup server, the website hosted by the web server being constructed and arranged to communicate with the backup server to determine whether the logon token is authentic when the website receives the logon token during a logon operation.
9 Assignments
0 Petitions
Accused Products
Abstract
A technique accesses a backup system. The technique involves receiving a logon command to logon a user to a website of the backup system. The backup system includes (i) a backup server and (ii) a web server which hosts the website to enable the user to control settings of the backup server. The technique further involves, sending, in response to receiving the logon command, a token request to the backup server through a pre-established secure data pathway to the backup server. Data is periodically backed up to the backup server through the pre-established secure data pathway. The technique further involves acquiring, in response to sending the token request, a logon token from the backup server through the pre-established secure data pathway. When the website receives the logon token during a logon operation, the website communicates with the backup server to determine whether the logon token is authentic.
-
Citations
20 Claims
-
1. In a computerized client device, a method of accessing a backup system, the method comprising:
-
receiving a logon command to logon a user to a website of the backup system, the backup system including (i) a backup server and (ii) a web server which hosts the website to enable the user to control settings of the backup server; in response to receiving the logon command, sending a token request to the backup server through a pre-established secure data pathway between the computerized client device and the backup server, data being periodically backed up from the computerized client device to the backup server through the pre-established secure data pathway in a secure manner; and in response to sending the token request, acquiring a logon token from the backup server through the pre-established secure data pathway between the computerized client device and the backup server, the website hosted by the web server being constructed and arranged to communicate with the backup server to determine whether the logon token is authentic when the website receives the logon token during a logon operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computerized client device, comprising:
-
a user interface; a network interface; and a controller coupled to the user interface and the network interface, the controller being constructed and arranged to; receive, through the user interface, a logon command to logon a user to a website of a backup system, the backup system including (i) a backup server and (ii) a web server which hosts the website to enable the user to control settings of the backup server, in response to receiving the logon command, send a token request to the backup server through the network interface and a pre-established secure data pathway between the computerized client device and the backup server, data being periodically backed up from the computerized client device to the backup server through the network interface and the pre-established secure data pathway in a secure manner, and in response to sending the token request, acquire a logon token from the backup server through the network interface and the pre-established secure data pathway between the computerized client device and the backup server, the website hosted by the web server being constructed and arranged to communicate with the backup server to determine whether the logon token is authentic when the website receives the logon token during a logon operation. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer program product having a non-transitory computer readable storage medium that stores a set of instructions which, when carried out by a computerized client device, cause the computerized client device to:
-
receive a logon command to logon a user to a website of the backup system, the backup system including (i) a backup server and (ii) a web server which hosts the website to enable the user to control settings of the backup server; in response to receiving the logon command, send a token request to the backup server through a pre-established secure data pathway between the computerized client device and the backup server, data being periodically backed up from the computerized client device to the backup server through the pre-established secure data pathway in a secure manner; and in response to sending the token request, acquire a logon token from the backup server through the pre-established secure data pathway between the computerized client device and the backup server, the website hosted by the web server being constructed and arranged to communicate with the backup server to determine whether the logon token is authentic when the website receives the logon token during a logon operation. - View Dependent Claims (17, 18, 19, 20)
-
Specification