Systems and methods to detect deleted files
First Claim
1. A method to protect data deleted between data protection operations in a data management system, the method comprising:
- automatically monitoring, with a filter driver in a first computing device comprising computer hardware, data operations of a client computing device;
when the data operation is a deletion operation, automatically identifying, with the filter driver, deletion data associated with the deletion operation;
comparing, with the filter driver, a date/time of a last edit operation of the deletion data with a date/time of a previous data protection operation associated with the deletion data;
when the date/time of the previous data protection operation is before the date/time of the last edit operation, automatically converting, with the filter driver, the deletion data to a hidden file;
copying, with the filter driver, the hidden file to temporary storage;
identifying, with the filter driver, the copy of the hidden file in temporary storage for copying during a second data protection operation; and
migrating, with a data agent in a second computing device comprising computer hardware, during the second data protection operation, the identified copy of the hidden file stored in the temporary storage to secondary storage.
4 Assignments
0 Petitions
Accused Products
Abstract
A data storage system protects data identified for deletion which has been created or modified between scheduled data backups. For instance, the system monitors data operations and when the data operation is a delete, the system determines whether the data identified for deletion has been protected by a backup operation. Data that has not been backed up, such as newly created data, is copied to temporary storage before deletion. When the data has been protected, the system determines whether the data has been modified after the backup operation. Data modified after the backup operation is copied to temporary storage before deletion.
-
Citations
16 Claims
-
1. A method to protect data deleted between data protection operations in a data management system, the method comprising:
-
automatically monitoring, with a filter driver in a first computing device comprising computer hardware, data operations of a client computing device; when the data operation is a deletion operation, automatically identifying, with the filter driver, deletion data associated with the deletion operation; comparing, with the filter driver, a date/time of a last edit operation of the deletion data with a date/time of a previous data protection operation associated with the deletion data; when the date/time of the previous data protection operation is before the date/time of the last edit operation, automatically converting, with the filter driver, the deletion data to a hidden file; copying, with the filter driver, the hidden file to temporary storage; identifying, with the filter driver, the copy of the hidden file in temporary storage for copying during a second data protection operation; and migrating, with a data agent in a second computing device comprising computer hardware, during the second data protection operation, the identified copy of the hidden file stored in the temporary storage to secondary storage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system to protect data deleted between data protection operations in an information management cell, the system comprising:
-
computer hardware including one or more computer processors; a filter driver in a first computing device comprising the computer hardware configured to automatically monitor data operations of a client computing device; when the data operation is a deletion operation, the filter driver further configured to automatically identify deletion data associated with the deletion operation; the filter driver further configured to compare a date/time of a last edit operation of the deletion data with a date/time of a previous data protection operation associated with the deletion data; when the date/time of the previous data protection operation is before the date/time of the last edit operation, the filter driver further configured to automatically convert the deletion data to a hidden file; the filter driver further configured to copy the hidden file to temporary storage; the filter driver further configured to identify the copy of the hidden file in temporary storage for copying during a second data protection operation; and a data agent in a second computing device comprising computer hardware configured to migrate, during the second data protection operation, the identified copy of the hidden file stored in the temporary storage to secondary storage. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification