GROUP BASED COMPLETE AND INCREMENTAL COMPUTER FILE BACKUP SYSTEM, PROCESS AND APPARATUS
First Claim
1. A method of synchronizing electronic data stored on a first client device with at least a second client device, the method comprising:
- receiving, at a backup server, a first inventory of electronic data stored on a first remote storage medium associated with a first client device, wherein the electronic data comprises actual file data to be backed-up from the first remote storage medium, wherein the first inventory comprises at least one descriptor and wherein the at least one descriptor comprises a cryptographic signature computed based on the actual file data, the cryptographic signature uniquely identifying the electronic data to be backed-up;
comparing, at the backup server, the at least one descriptor of the first inventory to a list of descriptors associated with a second inventory of electronic data stored on a backup data storage medium, wherein the second inventory of electronic data comprises shared electronic data from a second remote storage medium associated with the at least a second client device as well a plurality of other storage mediums different from the first and second remote storage mediums, and wherein the at least one descriptor of the first inventory is compared with descriptors in the second inventory that correspond, at least partially, to data stored on the backup data storage medium by storage mediums different from the first remote storage medium;
determining that a first descriptor from the at least one descriptor of the first inventory does not match a second descriptor from the list of descriptors associated with the second inventory;
storing, on the backup data storage medium, the electronic data that is uniquely identified by the cryptographic signature;
determining that the second remote storage medium does not have the electronic data that is uniquely identified by the cryptographic signature stored therein;
determining that the second remote storage medium is permitted to have the electronic data that is uniquely identified by the cryptographic signature; and
providing the electronic data that is uniquely identified by the cryptographic signature from the backup server to the at least a second client device so that the electronic data that is uniquely identified by the cryptographic signature can be stored on the second remote storage medium.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention is capable of determining the rights to a file based on providing a descriptor. The descriptor can be calculated using an algorithm, which may be cryptographic and/or non-cryptographic. The descriptor may further be based on the file contents, metadata of the file, other file data, or any combination thereof to uniquely identify the file in a shared file repository. Since the descriptor is generated based on file data it will be the same regardless of which user generates it. Accordingly, only one copy of the file needs to be maintained in the shared file repository, thereby reducing the amount of network bandwidth required to assure the file is backed up and further reducing the amount of storage required to backup the files. This results in a vastly more efficient method of backup in terms of processing time, network bandwidth, and storage requirements.
8 Citations
20 Claims
-
1. A method of synchronizing electronic data stored on a first client device with at least a second client device, the method comprising:
-
receiving, at a backup server, a first inventory of electronic data stored on a first remote storage medium associated with a first client device, wherein the electronic data comprises actual file data to be backed-up from the first remote storage medium, wherein the first inventory comprises at least one descriptor and wherein the at least one descriptor comprises a cryptographic signature computed based on the actual file data, the cryptographic signature uniquely identifying the electronic data to be backed-up; comparing, at the backup server, the at least one descriptor of the first inventory to a list of descriptors associated with a second inventory of electronic data stored on a backup data storage medium, wherein the second inventory of electronic data comprises shared electronic data from a second remote storage medium associated with the at least a second client device as well a plurality of other storage mediums different from the first and second remote storage mediums, and wherein the at least one descriptor of the first inventory is compared with descriptors in the second inventory that correspond, at least partially, to data stored on the backup data storage medium by storage mediums different from the first remote storage medium; determining that a first descriptor from the at least one descriptor of the first inventory does not match a second descriptor from the list of descriptors associated with the second inventory; storing, on the backup data storage medium, the electronic data that is uniquely identified by the cryptographic signature; determining that the second remote storage medium does not have the electronic data that is uniquely identified by the cryptographic signature stored therein; determining that the second remote storage medium is permitted to have the electronic data that is uniquely identified by the cryptographic signature; and providing the electronic data that is uniquely identified by the cryptographic signature from the backup server to the at least a second client device so that the electronic data that is uniquely identified by the cryptographic signature can be stored on the second remote storage medium. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
scanning a list of filed stored in memory of a client device; identifying a first set of files in the list of files as one or more of new and changed since a last backup operation was performed; categorizing a first file in the first set of files as a file that is updated frequently; dividing the first file into chunks of a first size; categorizing a second file in the first set of files as a file that is not updated frequently; dividing the second file into chunks of a second size, wherein the second size is different from the first size; for each chunk in the first file and for each chunk in the second file, generating, by the client device, a cryptographic signature value for the chunk, wherein the cryptographic signature value is computed by using actual data of the chunk as an input to a cryptographic signature-generating algorithm which computes the cryptographic signature value; generating, at the client device, a first inventory including the cryptographic signatures calculated for the chunks in the first and second files; transmitting the first inventory from the client device to a backup server. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method, comprising:
-
scanning a list of filed stored in memory of a client device; identifying a first set of files in the list of files as one or more of new and changed since a last backup operation was performed; analyzing metadata of a first file in the first set of files; based on the analysis of the metadata of the first file, dividing the first file into chunks of a predetermined size; for each chunk in the first file, generating, by the client device, a cryptographic signature value for the chunk, wherein the cryptographic signature value is computed by using actual data of the chunk as an input to a cryptographic signature-generating algorithm which computes the cryptographic signature value; generating, at the client device, a first inventory including the cryptographic signatures calculated for the chunks in the first file; and transmitting the first inventory from the client device to a backup server. - View Dependent Claims (17, 18, 19, 20)
-
Specification