Data backup and self-service data restoration
First Claim
1. A method performed by a first user terminal,the method comprising:
- the first user terminal sending a restore command to a network server, wherein the restore command controls the network server to restore a file from a first storage device to a second user terminal;
the first user terminal receiving an authentication request from the network server requesting that a user be authenticated for access to the file from the second user terminal;
the first user terminal determining whether the user is authenticated for access to the file from the second user terminal based on a security descriptor in a security record for the file;
if the security descriptor indicates that the user is authenticated for access to the file from the second user terminal, restoring the file from the first storage device to the second user terminal;
if the security descriptor indicates that the user is not authenticated for access to the file from the second user terminal;
the first user terminal creating a virtual endpoint comprising a temporary file, wherein the virtual endpoint comprises an emulation of the second user terminal generated from a configuration parameter of the second user terminal, and wherein the temporary file comprises a security context generated from a security parameter associated with the file to be restored;
authenticating the user within the virtual endpoint for access to the temporary file based on the security parameter; and
the first user terminal restoring the file to the second user terminal if the user is granted access within the virtual endpoint to the temporary file.
1 Assignment
0 Petitions
Accused Products
Abstract
A user terminal stores security information for each of a plurality of files during a backup of the files. The user terminal also stores information regarding the configuration settings of one or more terminals from which a user may access the plurality of files. During a restore of the files to a remote user terminal, the user terminal at which the restore command was issued utilizes the saved security information to emulate the remote terminal as a virtual endpoint for the files. The user terminal determines whether the user is authorized to access the files within the virtual endpoint based on the saved security information, and restores the files to the remote terminal if the user is authorized for access to the files within the virtual endpoint.
-
Citations
19 Claims
-
1. A method performed by a first user terminal,
the method comprising: -
the first user terminal sending a restore command to a network server, wherein the restore command controls the network server to restore a file from a first storage device to a second user terminal; the first user terminal receiving an authentication request from the network server requesting that a user be authenticated for access to the file from the second user terminal; the first user terminal determining whether the user is authenticated for access to the file from the second user terminal based on a security descriptor in a security record for the file; if the security descriptor indicates that the user is authenticated for access to the file from the second user terminal, restoring the file from the first storage device to the second user terminal; if the security descriptor indicates that the user is not authenticated for access to the file from the second user terminal; the first user terminal creating a virtual endpoint comprising a temporary file, wherein the virtual endpoint comprises an emulation of the second user terminal generated from a configuration parameter of the second user terminal, and wherein the temporary file comprises a security context generated from a security parameter associated with the file to be restored; authenticating the user within the virtual endpoint for access to the temporary file based on the security parameter; and the first user terminal restoring the file to the second user terminal if the user is granted access within the virtual endpoint to the temporary file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A first user terminal comprising:
-
a communications interface circuit configured to communicate data with a network server; and a processor circuit configured to; send a restore command to the network server, wherein the restore command controls the network server to restore a file from a first storage device to a second user terminal; receive an authentication request from the network server requesting that a user be authenticated for access to the file from the second user terminal; determine whether the user is authenticated for access to the file from the second user terminal based on a security descriptor in a security record for the file; if the security descriptor indicates that the user is authenticated for access to the file from the second user terminal, restore the file from the first storage device to the second user terminal; and if the security descriptor indicates that the user is not authenticated for access to the file from the second user terminal; create a virtual endpoint comprising a temporary file, wherein the virtual endpoint comprises an emulation of the second user terminal generated from a configuration parameter of the second user terminal, and wherein the temporary file comprises a security context generated from a security parameter associated with the file to be restored; authenticate the user within the virtual endpoint for access to the temporary file based on the security parameter; and restore the file to the second user terminal if the user is granted access within the virtual endpoint to the temporary file. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product comprising a physical computer-readable storage medium storing a control application that, when executed by a processor circuit on a first user terminal, configures the first user terminal to:
-
send a restore command to the network server, wherein the restore command controls the network server to restore a file from a first storage device to a second user terminal; receive an authentication request from the network server requesting that a user be authenticated for access to the file from the second user terminal; determine whether the user is authenticated for access to the file from the second user terminal based on a security descriptor in a security record for the file; if the security descriptor indicates that the user is authenticated for access to the file from the second user terminal, restore the file from the first storage device to the second user terminal; if the security descriptor indicates that the user is not authenticated for access to the file from the second user terminal; create a virtual endpoint comprising a temporary file, wherein the virtual endpoint comprises an emulation of the second user terminal generated from a configuration parameter of the second user terminal, and wherein the temporary file comprises a security context generated from a security parameter associated with the file to be restored; authenticate the user within the virtual endpoint for access to the temporary file based on the security parameter; and restore the file to the second user terminal if the user is granted access within the virtual endpoint to the temporary file.
-
Specification