Method and apparatus for managing backup data
First Claim
1. A method of easily-accessible, versioned, secure, redundant backup of digital information, comprising the steps of:
- establishing a first readily expandable redundant back-end data store having a fault tolerant connection to a communications network, the first data store being configured for remote management by a user;
enabling bi-directional communication over the communications network between the first data store and a computing device;
provisioning the computing device with a client application capable of executing an algorithm on the computing device, the client application having the capabilities of;
communicating with the first data store;
monitoring a second data store that is accessible by the computing device;
detecting and replicating changes in the second data store including detection of differences in versions of data in the second data store and detection of deletions of versions of data;
selecting a first set of predetermined data in the second data store to be monitored by the client application and selecting at least a portion of the first set of predetermined data to be transmitted over the communications network to the first data store;
selecting predetermined data in the first data store to be transmitted over the communications network to the second data store, including pushing data from the first data store to the second data store using a remote access protocol;
establishing policies for the data backup and transmission, including requirements for data to be transmitted to and from the first data store, data not to be transmitted to or from the first data store, requirements for data to be deleted from, or retained on, the first or second data store, and allocation of network bandwidth and CPU cycles;
monitoring the status of data backup and providing a risk assessment of the data backup based on predetermined criteria;
browsing the first data store;
restoring data from the first data store to the second data store;
reviewing prior versions of data stored on the first data store based on a predetermined criteria;
managing access to the computing device upon occurrence of a triggering event;
being remotely updated;
causing data on the second data store to be deleted when the operating system is started unless a user properly authenticates to the client application;
setting backup criteria, including location, naming conventions, file types, frequently changing files backup criteria, size limits, bandwidth requirements and limitations, and identification of file groups, members of which require synchronous backup;
enabling the capturing, sending, and remote storage of device coordinates and proximity alerts when within user defined boundaries or conditions;
setting restoration criteria;
handling alerts regarding the backup of data to the first data store; and
staging changes to data in the second data store during offline use for backup to the first data store upon connection to the communications network;
causing the client application to generate and send a file hash to the first data store,searching the first data store for a matching file hash for files already stored in the first data store; and
if a match is found, saving a file pointer reference for any data store that subsequently attempts to save a file from which an identical file hash is obtained; and
enabling web access to the first data store.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of easily-accessible, versioned, secure, redundant backup of digital information involves establishing a back-end data store connected to a world-wide telecommunications network. Users communicate with the data store using a variety of user a computing devices, each of which has installed thereon client software capable various operations, including communicating with the data store, monitoring a second data store, detecting and replicating changes in the second data store, and selecting data to be transmitted over the telecommunications network to and from the back-end data store. Users may establish policies for data backup and transmission, may monitor the status of data backup, may browsing the back-end data store, may review prior versions of data stored on the back-end data store. The data store is configured for remote management by a user, including deletion of data in the second data store if the computing device is lost or stolen.
-
Citations
42 Claims
-
1. A method of easily-accessible, versioned, secure, redundant backup of digital information, comprising the steps of:
-
establishing a first readily expandable redundant back-end data store having a fault tolerant connection to a communications network, the first data store being configured for remote management by a user; enabling bi-directional communication over the communications network between the first data store and a computing device; provisioning the computing device with a client application capable of executing an algorithm on the computing device, the client application having the capabilities of; communicating with the first data store; monitoring a second data store that is accessible by the computing device; detecting and replicating changes in the second data store including detection of differences in versions of data in the second data store and detection of deletions of versions of data; selecting a first set of predetermined data in the second data store to be monitored by the client application and selecting at least a portion of the first set of predetermined data to be transmitted over the communications network to the first data store; selecting predetermined data in the first data store to be transmitted over the communications network to the second data store, including pushing data from the first data store to the second data store using a remote access protocol; establishing policies for the data backup and transmission, including requirements for data to be transmitted to and from the first data store, data not to be transmitted to or from the first data store, requirements for data to be deleted from, or retained on, the first or second data store, and allocation of network bandwidth and CPU cycles; monitoring the status of data backup and providing a risk assessment of the data backup based on predetermined criteria; browsing the first data store; restoring data from the first data store to the second data store; reviewing prior versions of data stored on the first data store based on a predetermined criteria; managing access to the computing device upon occurrence of a triggering event; being remotely updated; causing data on the second data store to be deleted when the operating system is started unless a user properly authenticates to the client application; setting backup criteria, including location, naming conventions, file types, frequently changing files backup criteria, size limits, bandwidth requirements and limitations, and identification of file groups, members of which require synchronous backup; enabling the capturing, sending, and remote storage of device coordinates and proximity alerts when within user defined boundaries or conditions; setting restoration criteria; handling alerts regarding the backup of data to the first data store; and staging changes to data in the second data store during offline use for backup to the first data store upon connection to the communications network; causing the client application to generate and send a file hash to the first data store, searching the first data store for a matching file hash for files already stored in the first data store; and if a match is found, saving a file pointer reference for any data store that subsequently attempts to save a file from which an identical file hash is obtained; and enabling web access to the first data store. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for backup of digital information, comprising the steps of:
-
establishing a first data store having a connection to a communications network; enabling communication over the communications network between the first data store and a computing device; provisioning the computing device with a client application having the capabilities of; communicating with the first data store; monitoring a second data store; detecting and replicating differences in versions of data in the second data store and detection of deletions of versions of data; selecting a first set of predetermined data in the second data store to be monitored by the client application; causing data on the second data store to be deleted when the operating system is started unless a user properly authenticates to the client application; establishing policies for the data backup and transmission; enabling the capturing, sending, and remote storage of device coordinates and proximity alerts when within user defined boundaries or conditions; causing the client application to generate and send a file hash to the first data store; searching the first data store for a matching file hash for files already stored in the first data store; and if a match is found, saving a file pointer reference for any data store that subsequently attempts to save a file from which an identical file hash is obtained; monitoring the status of data backup; restoring data from the first data store to the second data store; and managing access to the computing device upon occurrence of a triggering event; and enabling web access to the first data store. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A non-transitory computer-readable media for storing and executing instructions to backup digital information, comprising the step of enabling a first data store to communicate with a computing device, the computing device being capable of detecting and replicating differences in versions of data in the first data store and a second data store and of restoring predetermined data from the first data store to the second data store, and further comprising the steps of:
-
communicating with the first data store; monitoring the second data store; detecting and replicating differences in versions of data in the second data store and detection of deletions of versions of data; selecting a first set of predetermined data in the second data store to be monitored by the client application; causing data on the second data store to be deleted when the computing device is started unless a user properly authenticates to the computing device; establishing policies for the data backup and transmission; enabling the capturing, sending, and remote storage of device coordinates and proximity alerts when within user defined boundaries or conditions; causing the computing device to generate and send a file hash to the first data store; searching the first data store for a matching file hash for files already stored in the first data store; and if a match is found, saving a file pointer reference for any data store that subsequently attempts to save a file from which an identical file hash is obtained; monitoring the status of data backup; restoring data from the first data store to the second data store; managing access to the computing device upon occurrence of a triggering event; and enabling web access to the first data store. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification