Collaborative information source recovery
First Claim
Patent Images
1. A computer implemented method comprising:
- querying a network component in response to detection of a data loss with respect to a shared information source;
receiving, at a component that is co-located with the shared information source and manages recovery of the shared information source, an identifier of a first user of the shared information source from the network component, wherein the identifier includes at least one of an Internet Protocol address, a login identifier, and an email address associated with the first user, wherein the first user provides data to the component in response to being identified to allow the component to determine whether one or more other users known to the first user also use the shared information source;
identifying, at the component, one or more additional users of the shared information source based on analyzing, at the component, the data from the first user, wherein the one or more additional users each provide data to the component in response to being identified to allow the component to determine whether one or more other users known to the one or more additional users also use the shared information source;
identifying, at the component, one or more further additional users of the shared information source based on analyzing, at the component, the data from the one or more additional users, wherein the one or more further additional users each provide data to the component in response to being identified to allow the component to determine whether one or more other users known to the one or more further additional users also use the shared information source;
reconstructing the shared information source based at least in part on the data from one or more of the first user, the one or more additional users, and the one or more further additional users;
conducting a comparison between the reconstructed shared information source and a previous shared information source; and
generating a notification based on the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods of recovering a shared information source can involve identifying a first user of a shared information source in response to detection of a data loss with respect to the shared information source. One or more additional users of the shared information source may be identified based on data associated with the first user. Additionally, the shared information source can be recovered based at least in part on data associated with the one or more additional users.
14 Citations
22 Claims
-
1. A computer implemented method comprising:
-
querying a network component in response to detection of a data loss with respect to a shared information source; receiving, at a component that is co-located with the shared information source and manages recovery of the shared information source, an identifier of a first user of the shared information source from the network component, wherein the identifier includes at least one of an Internet Protocol address, a login identifier, and an email address associated with the first user, wherein the first user provides data to the component in response to being identified to allow the component to determine whether one or more other users known to the first user also use the shared information source; identifying, at the component, one or more additional users of the shared information source based on analyzing, at the component, the data from the first user, wherein the one or more additional users each provide data to the component in response to being identified to allow the component to determine whether one or more other users known to the one or more additional users also use the shared information source; identifying, at the component, one or more further additional users of the shared information source based on analyzing, at the component, the data from the one or more additional users, wherein the one or more further additional users each provide data to the component in response to being identified to allow the component to determine whether one or more other users known to the one or more further additional users also use the shared information source; reconstructing the shared information source based at least in part on the data from one or more of the first user, the one or more additional users, and the one or more further additional users; conducting a comparison between the reconstructed shared information source and a previous shared information source; and generating a notification based on the comparison. - View Dependent Claims (2)
-
-
3. A computer implemented method comprising:
-
identifying, at a component that is co-located with a shared information source and manages recovery of the shared information source, a first user of the shared information source in response to detection of a data loss with respect to the shared information source, wherein the first user provides data to the component in response to being identified to allow the component to determine whether one or more other users known to the first user also use the shared information source; identifying, at the component, one or more additional users of the shared information source based on analyzing, at the component, the data from the first user, wherein the one or more additional users are each provide data to the component in response to being identified to allow the component to determine whether one or more other users known to the one or more additional users also use the shared information source; identifying, at the component, one or more further additional users of the shared information source based on analyzing, at the component, the data from the one or more additional users, wherein the one or more further additional users each provide data to the component in response to being identified to allow the component to determine whether one or more other users known to the one or more further additional users also use the shared information source; and recovering the shared information source based at least in part on the data from one or more of the first user, the one or more additional users, and the one or more further additional users. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product comprising:
-
a non-transitory computer readable storage medium; and computer usable code stored on the non-transitory computer readable storage medium, where, if executed by a processor, the computer usable code causes a computer to; identify, at a component that is co-located with a shared information source and manages recovery of the shared information source, a first user of a shared information source in response to detection of a data loss with respect to the shared information source, wherein the first user is to provide data to the component in response to being identified to allow the component to determine whether one or more other users known to the first user also use the shared information source; identify, at the component, one or more additional users of the shared information source based on an analysis, at the component, of the data from the first user, wherein the one or more additional users are each to provide data to the component in response to being identified to allow the component to determine whether one or more other users known to the one or more additional users also use the shared information source; identify, at the component, one or more further additional users of the shared information source based on an analysis, at the component, of the data from the one or more additional users, wherein the one or more further additional users are each to provide data to the component in response to being identified to allow the component to determine whether one or more other users known to the one or more further additional users also use the shared information source; recover the shared information source based at least in part on the data from one or more of the first user, the one or more additional users, and the one or more further additional users. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A computer implemented method comprising:
-
receiving, from a component that is co-located with a shared information source and manages recovery of the shared information source, a first recovery request associated with the shared information source at a first user of the shared information source, wherein the first recovery request is received in response to a detection, at the component, of a data loss with respect to the shared information source; and transmitting data associated with the first user from the first user to the component in response to the first recovery request to allow the component to determine whether one or more other users known to the first user also use the shared information source, wherein the data transmitted by the first user is analyzed, at the component, to identify, at the component, the one or more additional users of the shared information source, wherein each of the one or more additional users receive a second recovery request from the component and transmit data to the component in response to the second recovery request to allow the component to determine whether one or more other users known to the one or more additional users also use the shared information source, wherein the data transmitted by the one or more additional users is analyzed, at the component, to identify, at the component, one or more further additional users of the shared information source, and wherein each of the one or more further additional users receive a third recovery request from the component and transmit data to the component in response to the third recovery request to allow the component to determine whether one or more other users known to the one or more further additional users also use the shared information source. - View Dependent Claims (18, 19)
-
-
20. A computer program product comprising:
-
a non-transitory computer readable storage medium; and computer usable code stored on the non-transitory computer readable storage medium, where, if executed by a processor, the computer usable code causes a computer to; receive, from a component that is co-located with a shared information source and manages recovery of the shared information source, a first recovery request associated with the shared information source at a first user of the shared information source, wherein the first recovery request is to be received in response to a detection, at the component, of a data loss with respect to the shared information source; and transmit data associated with the first user from the first user to the component in response to the first recovery request to allow the component to determine whether one or more other users known to the first user also use the shared information source, wherein the data to be transmitted by the first user is to be analyzed, at the component, to identify, at the component, the one or more additional users of the shared information source, wherein each of the one or more additional users are to receive a second recovery request from the component and are to transmit data to the component in response to the second recovery request to allow the component to determine whether one or more other users known to the one or more additional users also use the shared information source, wherein the data transmitted by the one or more additional users is to be analyzed, at the component, to identify, at the component, one or more further additional users of the shared information source, and wherein each of the one or more further additional users are to receive a third recovery request from the component and are to transmit data to the component in response to the third recovery request to allow the component to determine whether one or more other users known to the one or more further additional users also use the shared information source. - View Dependent Claims (21, 22)
-
Specification