USER AUTHORIZATION FOR FILE LEVEL RESTORATION FROM IMAGE LEVEL BACKUPS
First Claim
1. A backup server, comprising:
- a processor configured to execute a backup application; and
a storage configured to store at least one image level backup of a machine,wherein the backup application is configured to;
save during backup or replication activity to a database a plurality of user accounts belonging to an access control group associated with the machine;
receive a restoration request, the restoration request including a first machine identifier and a user identifier of a user currently logged onto the machine;
compare the first machine identifier to a second machine identifier associated with the machine present in the at least one image level backup;
accept or deny the restoration request based at least in part on the comparison of the first machine identifier and the second machine identifier.
3 Assignments
0 Petitions
Accused Products
Abstract
Embodiments provide systems, methods, and computer program products for enabling user authorization to perform a file level recovery from an image level backup of a virtual machine without the need for access control by an administrator. Specifically, embodiments enable an access control mechanism for controlling access to stored image level backups of a virtual machine. In an embodiment, the virtual machine includes a backup application user interface that can be used to send a restoration request to a backup server. The restoration request can include a machine identifier and a user identifier of the user logged onto the virtual machine. The backup server includes a backup application that determines whether or not the machine identifier contained in the restoration request can be matched to a machine identifier of a virtual machine present in one of the virtual machine backups stored on the backup server.
-
Citations
35 Claims
-
1. A backup server, comprising:
-
a processor configured to execute a backup application; and a storage configured to store at least one image level backup of a machine, wherein the backup application is configured to; save during backup or replication activity to a database a plurality of user accounts belonging to an access control group associated with the machine; receive a restoration request, the restoration request including a first machine identifier and a user identifier of a user currently logged onto the machine; compare the first machine identifier to a second machine identifier associated with the machine present in the at least one image level backup; accept or deny the restoration request based at least in part on the comparison of the first machine identifier and the second machine identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method, comprising:
-
saving during backup or replication activity to a database a plurality of user accounts belonging to an access control group associated with a machine, the machine having at least image level backup stored on a backup server; receiving a restoration request, the restoration request including a first machine identifier and a user identifier of a user currently logged onto the machine; comparing the first machine identifier to a second machine identifier associated with the machine present in the at least one image level backup; accepting or denying the restoration request based at least in part on the comparison of the first machine identifier and the second machine identifier. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product comprising a non-transitory computer readable medium including computer control logic stored therein, wherein the computer control logic, when executed by one or more processors, enables a method for user authorization for file level restoration from an image level backup, the method comprising:
-
saving during backup or replication activity to a database a plurality of user accounts belonging to an access control group associated with a machine, the machine having at least one image level backup stored on a backup server; receiving a restoration request, the restoration request including a first machine identifier and a user identifier of a user currently logged onto the machine; and comparing the first machine identifier to a second machine identifier associated with the machine present in the at least one image level backup; and accepting or denying the restoration request based at least in part on the comparison of the first machine identifier and the second machine identifier. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A backup server, comprising:
-
a processor configured to execute a backup application; and a storage configured to store at least one image level backup of a machine, wherein the backup application is configured to; save during backup or replication activity to a database a plurality of user accounts belonging to an access control group associated with the machine, wherein the plurality of user accounts include a plurality of user identifiers; receive a restoration request, the restoration request including a machine identifier and a user identifier of a user currently logged onto the machine; compare the user identifier to the plurality of user identifiers; and accept or deny the restoration request based at least in part on whether or not the user identifier matches one of the plurality of user identifiers. - View Dependent Claims (25, 26, 27)
-
-
28. A computer-implemented method, comprising:
-
saving during backup or replication activity to a database a plurality of user accounts belonging to an access control group associated with a machine, the plurality of user accounts including a plurality of user identifiers, the machine having at least one image level backup stored on a backup server; receiving a restoration request, the restoration request including a machine identifier and a user identifier of a user currently logged onto the machine; comparing the user identifier to the plurality of user identifiers; accepting or denying the restoration request based at least in part on whether or not the user identifier matches one of the plurality of user identifiers. - View Dependent Claims (29, 30, 31)
-
-
32. A computer program product comprising a non-transitory computer readable medium including computer control logic stored therein, wherein the computer control logic, when executed by one or more processors, enables a method for user authorization for file level restoration from an image level backup, the method comprising:
-
saving during backup or replication activity to a database a plurality of user accounts belonging to an access control group associated with a machine, the plurality of user accounts including a plurality of user identifiers, the machine having at least one image level backup stored on a backup server; receiving a restoration request, the restoration request including a machine identifier and a user identifier of a user currently logged onto the machine; comparing the user identifier to the plurality of user identifiers; and accepting or denying the restoration request based at least in part on whether or not the user identifier matches one of the plurality of user identifiers. - View Dependent Claims (33, 34, 35)
-
Specification