WO2009059183A1 - System for automatically shadowing encrypted data and file directory structures - Google Patents

System for automatically shadowing encrypted data and file directory structures Download PDF

Info

Publication number
WO2009059183A1
WO2009059183A1 PCT/US2008/082055 US2008082055W WO2009059183A1 WO 2009059183 A1 WO2009059183 A1 WO 2009059183A1 US 2008082055 W US2008082055 W US 2008082055W WO 2009059183 A1 WO2009059183 A1 WO 2009059183A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
data
customer data
files
memory module
Prior art date
Application number
PCT/US2008/082055
Other languages
French (fr)
Inventor
David Schwaab
Nathan Probst
Dennis B. Batchelor
Original Assignee
Rebit, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rebit, Inc. filed Critical Rebit, Inc.
Priority to DE112008002947T priority Critical patent/DE112008002947T5/en
Publication of WO2009059183A1 publication Critical patent/WO2009059183A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • G06F11/1451Management of the data involved in backup or backup restore by selection of backup contents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • G06F11/1453Management of the data involved in backup or backup restore using de-duplication of the data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1734Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/174Redundancy elimination performed by the file system
    • G06F16/1748De-duplication implemented within the file system, e.g. based on file segments
    • G06F16/1756De-duplication implemented within the file system, e.g. based on file segments based on delta files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1471Saving, restoring, recovering or retrying involving logging of persistent data for recovery
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/84Using snapshots, i.e. a logical point-in-time copy of the data

Definitions

  • This invention relates to systems that are used to provide data backup for individual computer systems.
  • the shared data backup system must not only be secure from intrusion from outside sources, but the files stored on the shared data backup system must also be secure from access by other individuals who are authorized to store their files on the shared data backup system.
  • backup In information technology, backup refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. These additional copies are typically called “backups.” Backups are useful primarily for two purposes. The first is to restore a computer to an operational state following a disaster (called disaster recovery). The second is to restore one or more files after they have been accidentally deleted or corrupted. Backups are typically that last line of defense against data loss, and consequently the least granular and the least convenient to use.
  • a data repository model can be used to provide structure to the data storage device for the management of the data that is backed up.
  • data storage devices that are useful for making backups.
  • these data backup devices can be arranged to provide geographic redundancy, data security, and portability.
  • Backups differ from archives in the sense that archives are the primary copy of data and backups are a secondary copy of data.
  • Data backup systems differ from fault-tolerant systems in the sense that data backup systems assume that a fault will cause a data loss event and fault-tolerant systems assume a fault will not cause a data loss event.
  • Any backup strategy starts with the concept of a data repository.
  • the backup data needs to be stored somehow and probably should be organized to a degree. It can be as simple as a manual process which uses a sheet of paper with a list of all backup tapes and the dates they were written or a more sophisticated automated setup with a computerized index, catalog, or relational database.
  • Different repository models have different advantages. This is closely related to choosing a backup rotation scheme. The following paragraphs summarize the various existing backup models presently in use.
  • An unstructured repository may simply be a writable media consisting of, for example, a stack of floppy disks or CD-R media with minimal information about what data from the computer system was backed up onto this whteable media and when the backup(s) occurred. This is the easiest backup method to implement, but probably the least likely to achieve a high level of recoverability due to the dearth of indexing information that is associated with the data that is backed up.
  • Full + Incremental A Full + Incremental data backup model aims to make storing several copies of the source data more feasible.
  • a full backup of all files from the computer system is taken.
  • an incremental backup of only the files that have changed since the previous full or incremental backup is taken. Restoring the whole computer system to a certain point in time requires locating not only the full backup taken previous to that certain point in time but also all the incremental backups taken between that full backup and the particular point in time to which the system is supposed to be restored.
  • the full backup version of the data is then processed, using the set of incremental changes, to create a present view of the data as of that designated certain point in time.
  • This data backup model offers a high level of security that selected data can be restored to its present state and this data backup model can be used with removable media such as tapes and optical disks.
  • the downside of this data backup process is dealing with a long series of incremental changes and the high storage requirements entailed in this data backup process, since a copy of every changed file in each incremental backup is stored in memory.
  • a Full + Differential data backup model differs from a Full + Incremental data backup model in that after the full backup is taken of all files on the computer system, each incremental backup of the files captures all files created or changed since the full backup, even though some may have been included in a previous partial backup.
  • the advantage of this data backup model is that restoring the whole computer system to a certain point in time involves recovering only the last full backup and then overlaying it with the last differential backup.
  • a Mirror + Reverse Incremental data backup model is similar to a Full +
  • Incremental data backup model The difference is that instead of an aging full data backup, followed by a series of incremental data backups; this model offers a mirror that reflects the state of the computer system as of the last data backup and a history of reverse incremental data backups.
  • One benefit of this data backup method is that it only requires an initial full data backup. Each incremental data backup is immediately applied to the mirror and the files they replace are moved to a reverse incremental backup.
  • This data backup model is not suited to the use of removable media since every data backup must be done in comparison to the data backup mirror version of the data. This process, when used to restore the whole computer system to a certain point in time, is also intensive in its use of memory.
  • This data backup model takes the data backup process a step further and instead of scheduling periodic data backups, the data backup system immediately logs every change made on the computer system. This is generally done by saving byte or block-level differences rather than file-level differences. It differs from simple disk mirroring in that it enables a roll-back of the log and thus can restore an old image of data. Restoring the whole computer system to a certain point in time using this method requires that the original version of the data must be processed to incorporate every change recorded in each differential change to recreate the present version of the data. Problems
  • existing data backup systems fail to ensure that the user can simply plug in to the computer system to "back-up" the data stored therein, and also enable recovery of a revision of a file from a point-in-time, and enable all of the hard disk(s) in the computer system to be restored to a point-in-time.
  • Existing data backup systems fail to efficiently track and store the state of multiple file systems over time, while allowing for correct disk-level and file-level restoration, to a point-in-time, without storing a significant amount of redundant data.
  • These data backup systems require the user to learn new technology, understand the file system of the computer system, learn how to schedule data backup sessions, and learn new controls that must be used for this new functionality.
  • the restoration of lost files is difficult using these data backup systems and there is a failure to address the security of the data that is being saved on the backup system.
  • the memory module includes one or more memory devices for data storage as well as software, including a control software component that is automatically installed on the monitored computer systems when the monitored computer system is first connected to the memory module, as well as associated module software for maintaining a record of the data stored on the memory devices and controlling the operation of the memory devices.
  • the Secure Networked Data Shadowing System automatically stores the data which is retrieved from the memory of each of the monitored computer systems on to the memory devices located in the memory module in a single format, while representing it in a data management database in two formats: disk sectors and files.
  • the Secure Networked Data Shadowing System thereby efficiently tracks and stores the state of multiple file systems resident on a plurality of monitored computer systems over time, while allowing for correct disk-level and file-level restoration, to a point-in- time, without storing redundant data.
  • Security of the data that is stored on the shared Secure Networked Data Shadowing System is effected by a plurality of measures which collectively provide multiple dimensions of security.
  • the data that is transferred between the monitored computer systems and the Secure Networked Data Shadowing System is encrypted by the monitored computer system, using a cryptokey that has public and private components.
  • the data file that is stored on the shared Secure Networked Data Shadowing System is processed using a hash function prior to encryption, so the contents of this file are uniquely identified.
  • the encrypted file is received by the shared Secure Networked Data Shadowing System, it is stored in its encrypted form in memory and the hash index is used to identify the encrypted file.
  • the Secure Networked Data Shadowing System achieves a significant amount of data storage efficiency by implementing a "data de-duplication" process to avoid storing multiple copies of the same files.
  • the Secure Networked Data Shadowing System identifies instances of duplication via the hash index that is created for each file. Identical hash indexes are indicative of identical files. Therefore, files that have the same hash index can be reduced to a single copy without any loss of data as long as the file structure information for each instance of the file is maintained.
  • a plurality of the monitored computer systems can all reference the same file stored in the Secure Networked Data Shadowing System, since the local identification of this file is computer-centric, but the memory location in the Secure Networked Data Shadowing System is the same for all instances.
  • the Secure Networked Data Shadowing System operates autonomously, freeing the user from needing to interact with the Secure Networked Data Shadowing System to have the memory of their monitored computer system backed up.
  • the backup is nearly always up to date so long as the Secure Networked Data Shadowing System is connected to the monitored computer system.
  • the Secure Networked Data Shadowing System incorporates database technology to optimize the data storage and retrieval for normal operations, and the database of file directory information itself resides on the monitored computer system hard drive, while a backup copy of the database is written periodically to the Secure Networked Data Shadowing System.
  • the file changes, creations, relocations, and deletions are tracked through time, with the Secure Networked Data Shadowing System enabling point-in- time restoration of individual files as well as file systems on any of the monitored computer systems, including monitored computer systems that are remotely located.
  • the full system restore capability enables the reconstruction of the entire memory of the monitored computer system, including: operating system, applications, and data files for a given point in time without requiring the intervention of the user.
  • the control software component that executes on the monitored computer system tracks the appropriate file changes occurring through time and then performs normal backup activities once the Secure Networked Data Shadowing System memory module is reconnected to the monitored computer system via the network.
  • Figure 1 illustrates the basic architecture of the present Secure Networked Data Shadowing System operational in a typical network environment
  • Figures 2A and 2B illustrate, in flow diagram form, the operation of the present Secure Networked Data Shadowing System during the initial installation of the Secure Networked Data Shadowing System on a monitored computer system;
  • Figure 3 illustrates, in flowchart form, the operation of the present Secure Networked Data Shadowing System to store a copy of the data that is presently added to the monitored computer system's memory
  • Figure 4 illustrates, in flowchart form, the operation of the present Secure Networked Data Shadowing System to create and store an integrity point to benchmark changes in the monitored computer system's memory
  • Figure 5 illustrates, in flow diagram form, the operation of the present Secure Networked Data Shadowing System to retrieve data stored therein for restoration of a file in the memory of the monitored computer system;
  • Figure 6 illustrates, in flow diagram form, the operation of the present Secure Networked Data Shadowing System to retrieve data stored therein for restoration of the entirety of the memory of the monitored computer system.
  • File system the system utilized by the computer operating system to organize, store, and access information contained in the computer system memory.
  • File navigation system the textual, hierarchical navigation interface used by the computer operating system to provide a user with an organized manner of storing, identifying, locating, and operating on files for user operations contained in the computer system memory.
  • Method file an indirect means of storing information about a related file (e.g., file size and creation date for a data file).
  • “Page file” a computer operating system defined and created file which is specific to the present session running on the computer system; the page file represents short-lived data that is not valid or meaningful to a subsequent session and is therefore of no value to retain.
  • “Integrity Point” a collection of files and file references which exist at a particular time to represent the files that were current and valid for that time; restoration of an integrity point ensures that files are consistent and meaningful to the computer operating system and applications that may require multiple files to be self-consistent.
  • File Reference Number or FRN - a unique identifier for a given file or folder entry in the file system file table.
  • NTFS "NTFS" - Acronym associated with the file system for a computer operating system.
  • the file system provides an important feature known as journaling, which creates a queue of file changes, creations, deletions, or relocations.
  • FIG. 1 illustrates the basic architecture of the present Secure Networked Data Shadowing System operational in a typical network environment.
  • monitored computer systems 1 10-1 1 OB There are a plurality of monitored computer systems 1 10-1 1 OB and each typically includes a processor 1 12-1 12B, memory 1 13-1 13B (such as a disk drive, although any form of read/write memory can be used, and the term "memory" is used herein to describe this element), and a data communication medium link, such as an input/output port 1 1 1- 1 1 1 B, or wireless interface and the like.
  • the Secure Networked Data Shadowing System comprises a memory module 101 that is connected to the monitored computer systems 1 10-1 1 OB via existing data communication mediums 150, 151 to store the shadowed data.
  • the data communication medium illustrated herein includes a Local Area Network 150 which serves to interconnect monitored computer systems 1 10, 1 10A to the memory module 101.
  • a media interface 152 can also be used to interconnect the Local Area Network 150 to a data communication medium 151 , such as the Internet, to enable remotely located monitored computer systems 1 10B to access the memory module 101 .
  • any data communication medium can be used, whether wired or wireless and regardless of the data communication protocol used.
  • the memory module 101 includes a memory device 102 and its associated memory module software 104 and database 105 for managing the data storage as well as a control software component 103 that is automatically installed on each monitored computer system 1 10-1 1 OB when the memory module 101 is first connected to the monitored computer systems 1 10-1 1 OB.
  • the memory module 101 can include a plurality of memory devices 102 or even a large capacity mass storage system which is equipped with a server to execute the memory module software 104 and store the control software component 103 for installation on each of the monitored computer systems 1 10 as they are initially included in the extended network illustrated in Figure 1.
  • the memory module software 104 maintains a listing of the various monitored computer systems 1 10-1 1 OB that are served by the memory module 101 and manages the allocation of memory in memory device 102 to ensure that the data residing therein for one monitored computer system 1 10 is not accessible by another monitored computer system 1 10B.
  • the memory module software 104 manages the communications with the plurality of monitored computer systems 1 10-1 10B to ensure the timely storage of data received from the monitored computer systems 1 10-1 1 OB on to the memory device 102.
  • the monitored computer systems 1 10-1 10B may be devices that are all part of the distributed computer network of a single entity, with the data communication LAN 150 being an internal LAN.
  • the data communication LAN 150 being an internal LAN.
  • the Secure Networked Data Shadowing System can address these different environments and is capable of creating and managing virtual partitions between the different entities or different groups within a single entity.
  • the description focuses on the operation of a single monitored computer system 1 10 as it is initialized, stores the baseline image of its disk(s) on memory device 102, and processes data file updates and well as file restoration. These various operations are typically executed by the various monitored computer systems 1 10-1 1 OB as needed and autonomously, with the user of each monitored computer system 1 10-1 1 OB not being required to manage the operation of the Secure Networked Data Shadowing System and the monitored computer systems 1 10-1 1 OB operating independent of each other.
  • the Secure Networked Data Shadowing System requires minimal user interaction, and the "Autorun" feature the resident operating system can be used, for example, to support an automatic installation of the Secure Networked Data Shadowing System software component 103.
  • the Secure Networked Data Shadowing System calls the "Autorun" software resident on the operating system of the monitored computer system 1 10 to initiate the installation application portion of the control software component 103 which is stored on the memory module 101 of the Secure Networked Data Shadowing System.
  • a mountable media can be used to initiate installation of the control software component 103 from the monitored computer system 1 10.
  • the installation application then identifies that this is an initial installation of the Secure Networked Data Shadowing System with the monitored computer system 1 10.
  • the memory module software 104 requests system information from the operating system of the monitored computer system 1 10 and stores this system information in a database 105.. This system information is subsequently used to determine if the Secure Networked Data Shadowing System has been previously connected to monitored computer system 1 10. If the Secure Networked Data Shadowing System has already been installed, the monitored computer system 1 10 activates memory module 101 and starts talking to it.
  • FIGS 2A and 2B illustrate, in flow diagram form, the operation of the present Secure Networked Data Shadowing System during the initial installation of the Secure Networked Data Shadowing System on a monitored computer system 1 10, where the Secure Networked Data Shadowing System is linked to this monitored computer system 1 10 and an initial shadow copy of the contents of the monitored computer system's memory is created in the memory module 101 of the Secure Networked Data Shadowing System.
  • the Secure Networked Data Shadowing System optionally self-authenticates at step 201 when it is first attached to the monitored computer system 1 10 by ensuring that the serial number encoded into the memory device 102 of the Secure Networked Data Shadowing System memory module 101 matches the serial number entry inserted into the control software component 103. During manufacturing, the serial number is queried from the memory device 102, inserted into the control software component 103, and stored onto the Secure Networked Data Shadowing System in a manner to circumvent unauthorized replication of the Secure Networked Data Shadowing System software onto additional memory devices.
  • the Secure Networked Data Shadowing System then begins installation and initialization of the Secure Networked Data Shadowing System for the monitored computer system 1 10 at step 202.
  • the Secure Networked Data Shadowing System can utilize the simple "Autorun" feature of the resident operating system.
  • the control software component 103 of the Secure Networked Data Shadowing System is loaded on to the monitored computer system 1 10 at step 202 and at step 203, the monitored computer system 1 10 is interrogated by the control software component 103 of the Secure Networked Data Shadowing System to obtain data which defines the hardware topology and device signatures of the monitored computer system 1 10. This signature information is used to "pair" the Secure Networked Data Shadowing System to the monitored computer system 1 10 and is stored in memory module software 104 at step 204.
  • the Secure Networked Data Shadowing System displays a simple dialog box to the user at step 205 via the display screen of the monitored computer system 1 10 to indicate that they agree to the Secure Networked Data Shadowing System user license agreement.
  • This simplified user agreement dialog is required to ensure that the user is agreeable with the terms set forth in the end user license agreement. If the user did not intend to install the Secure Networked Data Shadowing System, or is dissatisfied with the end user license agreement, nothing remains on the monitored computer system 1 10 pertaining to the Secure Networked Data Shadowing System.
  • the user Upon successful installation of the Secure Networked Data Shadowing System, the user is not required to take further action to ensure the protection and backup of the data that is presently stored and subsequently added, deleted or modified on the memory 1 13 of their monitored computer system 1 10.
  • the user is required to leave the monitored computer system 1 10 attached to the memory module 101 of the Secure Networked Data Shadowing System for an initial period of time in order to have an initial valid backup of their data files and directory structures from the monitored computer system 1 10 to the memory module 101 of the Secure Networked Data Shadowing System at step 206, but attaching monitored computer system 1 10 to the memory module 101 of the Secure Networked Data Shadowing System is the only action step required of the user.
  • the control software component 103 concurrently monitors the ongoing memory activity of the monitored computer system 1 10 while the initial data backup is being executed without requiring the modification of the monitored computer system 1 10 or the use of complex interconnection processes.
  • the Secure Networked Data Shadowing System efficiently stores the data retrieved from the memory 1 13 of the monitored computer system 1 10 in a single format, while representing it internally in two formats: disk sectors and files.
  • a Meta File System may be implemented in the Secure Networked Data Shadowing System to describe the state of each active file system and the underlying physical disk or disks, at a point-in-time, with integrity.
  • the Meta File System is an internally consistent, related-in-time, collection of critical data and metadata from the file systems and physical disks under its protection.
  • the Meta File System may collect certain data, and do so in a way that correctness is ensured.
  • Typical Meta-File data that is collected may include:
  • a serialized journal of file system changes over time. Copies of the file object contents resulting from file system changes over time.
  • the challenge of creating a consistent-in-time view of multiple active file systems is met by combining the collected data into a single database and organizing and accessing it via data management algorithms resident in the Secure Networked Data Shadowing System.
  • the first step in this initial data transfer process is to generate a master index of all contents of the monitored computer system's memory 1 13 at step 206.
  • the control software component 103 discovers each storage device (memory 1 13) on the monitored computer system 1 10 and creates a corresponding Object Model for each Storage Device (TRStorageDevice).
  • the Storage Device objects are children of the monitored computer system 1 10. While they all share some base level attributes, they can specialize for different aspects of the physical device.
  • control software component 103 For each TRStorage device, control software component 103 identifies all of the unique disk regions that it contains, and creates an object model for each (TRDiskRegion). While all TRDiskRegions share some basic traits, they specialize themselves according to the type of Region they describe. For instance, examples of unique disk regions include the Master Boot Record (MBR), the partition table, a file system region (NTFS or FAT32 partition), a hidden OEM recovery partition, and seemingly unused "slices" that are the leftovers between formal partitions. Secure Networked Data Shadowing System identifies and accounts for every single sector on a physical storage device and creates an appropriate TRDiskRegion object to manage and index them.
  • MRR Master Boot Record
  • NTFS or FAT32 partition file system region
  • secure Networked Data Shadowing System identifies and accounts for every single sector on a physical storage device and creates an appropriate TRDiskRegion object to manage and index them.
  • Block Regions comprise a span of disk sectors (start, from sector zero, and length), and are simply archived as a block range onto the Secure Networked Data Shadowing System memory device 102.
  • This master index includes processing the master boot record and file system at step 207 to generate an index of every partition, file and folder on the monitored computer system 1 10, and this index data for each partition, file and folder is entered into a database 1 14 residing on the monitored computer system memory 1 13 as well as optionally a database 105 in the memory module 101 .
  • the master boot record contains information about the arrangement of data on the monitored computer system memory 1 13. These contents may be arranged with subsets of data such that there is a primary bootable partition and alternate, non- bootable partitions. An entry in the master boot record determines the status of these partitions, as well as size and binary offset values for each partition. Capturing and processing this information permits the Secure Networked Data Shadowing System to automatically reconstruct the entire contents of the monitored computer system memory 1 13.
  • the database exists largely to facilitate a (faster) way to search and retrieve file history and revisioning. The method used to lay down the "copy/backup" of the file system of the monitored computer system 1 10, enables recreation of the data contained in the database 1 14 from the Secure Networked Data Shadowing System itself.
  • the file system for the primary bootable partition is processed at step 208 to record each file and folder entry, placing records into the database 1 14 residing on the monitored computer system memory 1 13.
  • This database 1 14 contains information about each file and folder and is accessed primarily during file retrieval requests and is also updated with changes to individual files and folders to create a chronological record of changes.
  • This same database 1 14 is mirrored (database 105) onto the Secure Networked Data Shadowing System memory module 101 whenever the monitored computer system 1 10 is connected to the memory module 101 of the Secure Networked Data Shadowing System.
  • the mirrored database 105 is used primarily during full-system restoration where the monitored computer system memory 1 13 may have failed and the mirrored database 105 contains records of each file and folder residing in the binary data copied to the Secure Networked Data Shadowing System memory device 102.
  • TRDiskRegions that do have a recognized file system create an Object Model for the file system "Volume” (TRVolume).
  • TRVolume Object Model for the file system "Volume”
  • a Volume understands the concepts and navigation of its contained file system, and the concept of its associated mount point.
  • Secure Networked Data Shadowing System begins the second step of this process by copying the binary information from the monitored computer system memory 1 13 with the exception of a subset of the memory 1 13.
  • the exception subset consists of: areas not allocated, or identified as in use, by any of the partitions as well as areas identified as temporary information by the operating system.
  • An example of the temporary information is the operating system page file, which is useful only during the current session and is meaningless to a subsequent session.
  • the copy process identifies a Secure Networked Data Shadowing System storage device and writes the non-NTFS file objects onto the Secure Networked Data Shadowing System memory device 102 at step 21 1 . Once all of these objects are written into memory device 102, the Secure Networked Data Shadowing System writes all of the NTFS files on to memory device 102 at step 212 in a directory hierarchy that mimics their physical and logical relationships on the monitored computer system 1 10. Below is a simple base directory tree of a Secure Networked Data Shadowing System (depth of the contained file systems has been omitted.
  • control software component 103 knows that the
  • Secure Networked Data Shadowing System storage device 103 was mounted on drive “R:' and all archiving operations are going to directory "data" which is located in the memory module 101.
  • the next indicia in this string is the name of the monitored computer system 1 10 that provided the content "REBITDEV05", then the physical disk signature (i.e., 072CE3A9, 072CE3A9, etc.). If the disk drive has data that is to be archived, it is then organized into Region objects that are simply sequentially numbered (RegionO, Regioni , etc.). If a region contains an understood file system/volume, its volume identifier is used in the persistent storage to map its path.
  • the Object Models for each element of the monitored computer system 1 10 are themselves stored in file system streams on the Secure Networked Data Shadowing System memory device 102.
  • the TRMachine object is "saved" as a hidden stream inside of the r: ⁇ data ⁇ REBITDEV05 ⁇ directory entry, and the volume object for R: ⁇ data ⁇ REBITDV05 ⁇ 072CE3A9 ⁇ Region1 ⁇ ddffc3ed-7035- 1 1 dc-9485-000c29fddfb0 ⁇ is saved as a hidden stream on that directory entry.
  • the files are not actually stored with the name they had on the monitored computer system 1 10. Rather, they are stored with a file name that is a unique hash value of the contents of that file.
  • a file system "soft link” then is used in the directory structure above to point to the data of the hash value named "blob" of data that is the file from the monitored computer system 1 10. The user only sees the soft link.
  • Secure Networked Data Shadowing System stores the hashed value named file. If any two files hash to the same value (meaning they are binary identical), only one copy need be hosted in storage, and the symbolic links for both host copies point to the same stored content. This attribute of functionality is the first level of intrinsic data de-duplication.
  • the Secure Networked Data Shadowing System enables Journaling at step 209 for the active file systems residing on the physical disk being imaged.
  • the Secure Networked Data Shadowing System at step 210 sets the flag in the database indicating an Integrity Point is desired by creating a set of cursors against the active file system journals, which set of cursors are termed the "Start Cursors". The Journal process begins identifying and queuing files to act upon.
  • the Secure Networked Data Shadowing System at step 21 1 creates and compresses an image of the active file systems into the memory device 101 of the memory module 101 of the Secure Networked Data Shadowing System. To save memory space, the active file systems are queried for their allocated regions of the physical disk and only allocated regions are read and compressed.
  • the Secure Networked Data Shadowing System indexes the active file systems to extract relevant metadata for every file object in the file system and records it in a database.
  • the Secure Networked Data Shadowing System identifies and indexes all directories contained within the file navigation system by File Reference Number, or FRN, and identifies and inserts entries into the database for each cluster run representing the file.
  • the Secure Networked Data Shadowing System initializes the baseline by inserting entries in the database signifying completion of the initialization.
  • the Secure Networked Data Shadowing System at step 213 creates a second set of cursors against the active file system journals, termed the "Most Recent Entries".
  • the Secure Networked Data Shadowing System enables Change Tracking, and at step 215, the journals for the active file systems are processed from the Start Cursor to the Most Recent Entry, to record records of changes in the database, including file object contents. Upon reaching a point in time where no files remain in the queue to process, the appropriate actions are taken to insert an Integrity Point entry into the database.
  • the Secure Networked Data Shadowing System records an Integrity Point in the database to which the baseline image and file object change records are related. This is the data required to allow a self-consistent Disk Recovery at the point-in-time which the Integrity Point represents.
  • the full disk copy and the file changes, creations, deletions, or relocations that occurred during the full disk copy are collected into a set to represent a fully restorable point called the Integrity Point.
  • FIG. 3 illustrates, in flowchart form, the operation of the present Secure Networked Data Shadowing System to store a copy of data that are newly added to the monitored computer system's memory 1 13.
  • the Secure Networked Data Shadowing System process registers with the operating system change journal in order to receive notification of changes occurring to files and folders residing on the monitored computer system memory 1 13.
  • the change journal then dynamically notifies the Secure Networked Data Shadowing System of changes, permitting the Secure Networked Data Shadowing System to determine the appropriate action to take.
  • File creation, movement, content changes, and renaming are all events requiring action, and each action is entered into an action queue for processing.
  • the Secure Networked Data Shadowing System action queue is utilized for periods where the monitored computer system 1 10 is connected or disconnected to the memory module 101 of the Secure Networked Data Shadowing System. If the monitored computer system 1 10 is connected to the memory module 101 of the Secure Networked Data Shadowing System, the Secure Networked Data Shadowing System processes each action queue entry, updating the entry in the database 1 14 and, if necessary, compressing and transferring the file binary contents to the Secure Networked Data Shadowing System memory module 101.
  • the action queue is utilized for recording actions that are to be performed once the monitored computer system 1 10 is connected to the memory module 101 of the Secure Networked Data Shadowing System.
  • This recording process permits the Secure Networked Data Shadowing System to prioritize the actions to be performed, selecting the files of highest importance to be processed before lower priority files. This is the continuous process of maintaining the data required to assemble a consistent-in- time view of the file systems.
  • the process of change tracking begins immediately after the Initialization and Indexing is complete, as described above.
  • Journal processing is continuous and occurs whether or not the monitored computer system 1 10 is connected to the memory module 101 of the Secure Networked Data Shadowing System.
  • the control software component 103 of the Secure Networked Data Shadowing System at step 301 queries the file system journals for any more recent changes, starting from the last entry previously processed.
  • the control software component 103 at step 302 then creates a change record in the action queue in database 1 14 and increments the journal cursor for each relevant journal entry.
  • the control software component 103 creates a change record in the action queue in database 1 14 and increments the journal cursor.
  • the control software component 103 watches for new entries. Data Synchronization
  • Data Synchronization is intermittent and occurs only when the monitored computer system 1 10 is connected to the memory module 101 of the Secure Networked Data Shadowing System. When the monitored computer system 1 10 is connected to the memory module 101 of the Secure Networked Data Shadowing
  • the control software component 103 starts processing at step 304 from the first unprocessed change record in the action queue in database 1 14. For the oldest change record, and all related, unprocessed change records, the control software component 103 at step 305 determines if each is still relevant (for example, if the file was created and is already deleted, it is not relevant). The control software component 103 at step 306 removes all non-relevant change records from the action queue in database 1 14. Alternatively, at step 307, the control software component 103 takes the appropriate action for each relevant change record. If the file was created, the control software component 103 stores new file and file-version records in the action queue in database 1 14 and copies the file-version's contents to the Secure Networked Data
  • Shadowing System memory module 101 at step 308. If the file was moved or renamed, the control software component 103 creates a new file record in the action queue in database 1 14, relates all file-versions from the old file record with the new file record, and marks the old file record as deleted at step 309. If the file was deleted, the control software component 103 marks the file record in the action queue in database 1 14 as deleted at step 310. If a directory was created, the control software component 103 stores a new directory record in the action queue in database 1 14. If a directory was moved or renamed, the control software component 103 creates a new directory record in the action queue in database 1 14, relates all file records from the old directory record with the new directory record, and marks the old directory record as deleted at step
  • control software component 103 marks the directory record in the action queue in database 1 14 as deleted at step 313. Finally, at step 314, the control software component 103 removes the change record from the action queue in database 1 14 and processing returns to step 305. Create An Integrity Point
  • FIG. 4 illustrates, in flowchart form, the operation of the present Secure Networked Data Shadowing System to create and store an integrity point to benchmark changes in the monitored computer system's memory 1 13.
  • Disk Recovery for a point-in-time.
  • the process of creating an Integrity Point requires reading and storing a self-consistent "snapshot" of the meta files maintained on-disk by the active file systems. This requires monitoring these file systems for changes occurring while the snapshot is created and deciding if they invalidate the snapshot, requiring another attempt.
  • Exemplary operations include the following.
  • Each active file system is queried (or directly parsed) by the control software component 103 at step 401 to determine the physical locations on-disk that is has allocated for its own use (File System Regions). These File System Regions contain the data structures that define a consistent state of the file system and must be self-consistent.
  • the control software component 103 queries each active file system's journal at step 402 for its next record index and this value is kept as a cursor.
  • the control software component 103 instructs the operating system to flush all active file systems to memory 102 at step 403 and the File System Regions for each active file system are read directly from disk 1 13 at the sector level and stored in an archive on the Secure Networked Data Shadowing System at step 404.
  • the control software component 103 again queries each active file system's journal at step 405 for its next record index and this value is compared with the previously recorded cursor. If the cursors match, then at step 406 the Integrity Point is "confirmed" and marked as such in the database 1 14. If the cursors do not match, the offending journal is queried for the inter-cursor entries at step 407. The entries are examined by the control software component 103 at step 408 and a decision is made whether or not they invalidate the snapshot. If so, the process is repeated from step 401 until a valid snapshot is achieved.
  • step 410 If the snapshot is valid, then at step 410, all file objects that resulted from change records occurring between the previous Integrity Point and this one are related to this Integrity Point record in the database 1 14 and the Integrity Point is marked as "sealed.”
  • the database application is instructed at step 41 1 to perform a backup operation, resulting in the placement of a compressed representation of the database 1 14 onto the memory module 101 of the Secure Networked Data Shadowing System.
  • the Secure Networked Data Shadowing System achieves a significant amount of data storage efficiency by implementing a "data de-duplication" process to avoid storing multiple copies of the same files.
  • the plurality of monitored computer systems 1 10-1 1 OB typically all have the same programs resident in the memory 1 13-1 13B of these systems.
  • the programs occupy a significant amount of data storage capacity and replicating a copy of each program for each monitored computer system 1 10-1 1 OB wastes a significant amount of memory capacity in memory device 102.
  • the users at the plurality of monitored computer systems 1 10- 1 10B are typically employed by the same organization and many of the customer data files resident on the monitored computer systems 1 10-1 1 OB may be duplicates of each other.
  • the memory module software 104 identifies instances of duplication via the hash index that is created for each file. Identical hash indexes are indicative of identical files. Therefore, files that have the same hash index can be reduced to a single copy without any loss of data as long as the file structure information for each instance of the file is maintained. Thus, a plurality of the monitored computer systems 1 10-1 1 OB can all reference the same file stored in the memory device 102 of the memory module 101 , since the local identification of this file is computer-centric, but the memory location in memory device 104 is the same for all instances.
  • the new version of this file is written in its entirety into the memory device 104 of the memory module 101 and a new hash index is created for this version of the file. This does not impact the other monitored computer systems, since their file structure still points to the prior version of the file which still remains in the memory device 104 of the memory module 101.
  • the use of the hash index for identifying files stored in memory module 101 has the added benefits of enabling the identification of duplicate copies of a file as well as annonomizing the file, since this new moniker for the file fails to reveal its source or place in the file system structure of the originating monitored computer system.
  • FIG. ⁇ illustrates, in flow diagram form, the operation of the present Secure Networked Data Shadowing System to retrieve data stored therein for restoration of a file in the memory 1 13 of the monitored computer system 1 10. This is the operation to "reconstitute" the contents of a file at a point-in-time.
  • This file-version may reside in the baseline disk image stored to the Secure Networked Data Shadowing System during initialization or in a file-version archive on the Secure Networked Data Shadowing System.
  • the database 1 14 contains records of each file that has been stored on the Secure Networked Data Shadowing System, including the files captured during initialization. Over the course of time, data which enables the restoration of multiple versions of a given file may be stored on the Secure Networked Data Shadowing System, creating the ability to retrieve a version of a file from one of several points-in- time.
  • a file is modified on the monitored computer system 1 10
  • the new data is hashed named and stored on the monitored computer system 1 10
  • the old version of the file is removed, and replaced with only a description of its binary differences to the new version (Reverse X-Delta).
  • This strategy allows for Secure Networked Data Shadowing System to keep pristine copies of all current files, while being able to regenerate previous versions at all times while minimizing data storage space requirements on the Secure Networked Data Shadowing System itself.
  • the process of retrieving a file from the database and related location of the Secure Networked Data Shadowing System begins at step 501 where the user opens user interface and navigates through the hierarchical file and folder system to locate the desired file or folder.
  • the user selects the desired file or folder at step 502 and uses "drag and drop” functionality to move the selected file or folder to another folder location (e.g., 'Desktop' or 'My Documents') on the monitored computer system.
  • the operating system at step 503 Upon releasing the mouse button, the operating system at step 503 generates a request from the Secure Networked Data Shadowing System for data related to the source file identified by the user interface.
  • the database then is queried at step 504 to locate the present version of the selected file and its binary differences to the new version, traced back to the point-in-time selected by the user.
  • the Secure Networked Data Shadowing System retrieves the pristine copy of the current file and delivers the file to the user. Otherwise, the Secure Networked Data Shadowing System at step 506 uses the collection of binary differences to trace the selected file backwards in time to recreate the selected version of the file as indicated by the user and then delivers the reconstructed file to the user. The user reads and seeks on the data stream interface at step 507 and processes the contents as desired.
  • Disk Recovery Figure 6 illustrates, in flow diagram form, the operation of the present Secure
  • Networked Data Shadowing System to retrieve data stored therein for restoration of the entirety of the memory 1 13 of the monitored computer system 1 10. This is the operation required to restore the complete state of a physical disk 1 13 of the monitored computer system 1 10 at a point-in-time.
  • the available points-in-time are defined by previously stored Integrity Points.
  • the goal of a Disk Recovery is to "reconstitute" a self-consistent image of the subject physical disk 1 13 to the sector level and write this to a hard disk 1 13 on the monitored computer system 1 10.
  • the monitored computer system 1 10 In order to write to the physical system disk 1 13, it is necessary to boot the monitored computer system 1 10 from an alternative media and ensure that the file systems on hard disk(s) 1 13 are not in use at step 601 .
  • the user At step 602, the user must ensure that the environment is acceptable.
  • the Secure Networked Data Shadowing System is connected to the monitored computer system 1 10 at step 603 and must be accessible.
  • the subject hard disk(s) 1 13 must be available and large enough to receive the restoration disk image.
  • the subject hard disk(s) 1 13 do not need to be formatted, but can be formatted if desired.
  • any file systems present on the subject hard disk(s) are unmounted and the user selects an Integrity Point to restore onto the subject hard disk(s) 1 13 at step 606.
  • the baseline non-NTFS disk image(s) stored on the Secure Networked Data Shadowing System is written directly to the subject hard disk(s) 1 13 sector-by-sector at step 607.
  • the database 1 14 is queried at step 608 for the snapshot corresponding to the closest file system image to the selected baseline.
  • the snapshot is written to the subject hard disk(s) and, for each file object, the database 1 14 is queried at step 610 for the file object's storage location.
  • the file object's contents are written directly to its disk location at step 61 1.
  • the subject drive(s) 1 13 are now ready for use and the monitored computer system 1 10 may be rebooted at step 612.
  • the Secure Networked Data Shadowing System makes note of distinguishing features of the monitored computer system 1 10 such that the connection of the Secure Networked Data Shadowing System memory module 101 to a second, non-host computer system is quickly identified.
  • the connection of the Secure Networked Data Shadowing System memory module 101 to a second, non-host computer system is quickly identified.
  • Secure Networked Data Shadowing System "Autorun" initialization application asks the user if they want access to the files stored within the Secure Networked Data Shadowing System memory module 101 or if they wish to re-initialize the Secure Networked Data Shadowing System to pair with the newly connected computer system. If the user wishes to re-initialize with the newly connected computer system, all backup data from the previous monitored computer system 1 10 is eliminated, and a message indicating the same is displayed. If the user wishes to access files contained on the memory module 101 , the Secure Networked Data Shadowing System initializes a limited application permitting the user to utilize the same graphical user interface as before. The user may then locate and drag-and-drop files onto the newly connected computer system hard disk drive.
  • the operating system on the monitored computer system recognizes specific files contained in the base directory of a disk drive or Secure Networked Data Shadowing System newly connected to the monitored computer system 1 10.
  • the file of type 'autorun. inf alerts the operating system to the presence of a sequence of operations to be performed, as defined within the file.
  • the Secure Networked Data Shadowing System upon successful installation onto the monitored computer system 1 10, alters this 'autorun.inf file to behave differently if plugged into a subsequent, or guest, computer system. This altered 'autorun.inf file instructs the Secure Networked Data Shadowing System to make available the contents of the drive by reconstructing and interrogating the duplicated database.
  • the monitored computer system's files such as digital photographs and music files, may be transferred from the Secure Networked Data Shadowing System onto the guest computer system for display or sharing as desired.
  • the file explorer system of the guest computer system is utilized.
  • the display of the contents of the Secure Networked Data Shadowing System mimics the display of the contents of the user's typical computer system.
  • the Secure Networked Data Shadowing System automatically stores the data on the memory module in a single format, while representing it in a data management database in two formats: disk sectors, and files.
  • the Secure Networked Data Shadowing System thereby efficiently tracks and stores the state of multiple file systems over time, while allowing for correct disk-level and file-level restoration, to a point-in-time, without storing redundant data.

Abstract

The Secure Networked Data Shadowing System is connected to a plurality of monitored computer systems via an existing communication medium to store the shadowed data. The data is encrypted by the monitored computer system using a cryptokey, and the data file is processed using a hash function prior to encryption, so the contents of this file are uniquely identified. Thus, the encrypted file is stored in its encrypted form and the hash index is used to identify the encrypted file. A 'data de-duplication' process avoids storing multiple copies of the same files by identifying instances of duplication via the hash index. Files that have the same hash index can be reduced to a single copy without any loss of data as long as the file structure information for each instance of the file is maintained.

Description

SYSTEM FOR AUTOMATICALLY SHADOWING ENCRYPTED DATA AND FILE
DIRECTORY STRUCTURES
FIELD OF THE INVENTION
This invention relates to systems that are used to provide data backup for individual computer systems.
BACKGROUND OF THE INVENTION
It is a problem both to safeguard data that is stored on a computer system and to restore all or portions of this data that are lost or corrupted. Many computer systems have no protection systems in place and the loss of data from these computer systems is irrevocable. Other computer systems make use of attached data backup systems to store a copy of the data that is stored in the computer memory and updates thereto for eventual retrieval to restore data that is lost from or corrupted in the computer system memory. However, the use of these existing data backup systems is laborious and can be confusing to the casual user. Furthermore, in the instance of network connected computer systems, the use of a common shared data backup system wastes a significant amount of memory by storing multiple copies of the same data and raises the issue of security of the data that is stored on the shared data backup system. The shared data backup system must not only be secure from intrusion from outside sources, but the files stored on the shared data backup system must also be secure from access by other individuals who are authorized to store their files on the shared data backup system. Presently, there does not exist a shared data backup system that properly addresses these issues.
In information technology, backup refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. These additional copies are typically called "backups." Backups are useful primarily for two purposes. The first is to restore a computer to an operational state following a disaster (called disaster recovery). The second is to restore one or more files after they have been accidentally deleted or corrupted. Backups are typically that last line of defense against data loss, and consequently the least granular and the least convenient to use.
Since a data backup system contains at least one copy of all data worth saving, the data storage requirements are considerable, which data storage requirements can be exacerbated by the method used to perform the data backup where change tracking is wasteful of memory. Organizing this storage space and managing the backup process is a complicated undertaking. A data repository model can be used to provide structure to the data storage device for the management of the data that is backed up. In the modern era of computing, there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these data backup devices can be arranged to provide geographic redundancy, data security, and portability.
Before data is ever sent to its data backup storage location, it is selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Many organizations and individuals require that they have some confidence that the backup process is working as expected and work to define measurements and validation techniques to confirm the integrity of the backup process. It is also important to recognize the limitations and human factors involved in any backup scheme.
Due to a considerable overlap in technology, backups and data backup systems are frequently confused with archives and fault-tolerant systems. Backups differ from archives in the sense that archives are the primary copy of data and backups are a secondary copy of data. Data backup systems differ from fault-tolerant systems in the sense that data backup systems assume that a fault will cause a data loss event and fault-tolerant systems assume a fault will not cause a data loss event.
Data Repository Models
Any backup strategy starts with the concept of a data repository. The backup data needs to be stored somehow and probably should be organized to a degree. It can be as simple as a manual process which uses a sheet of paper with a list of all backup tapes and the dates they were written or a more sophisticated automated setup with a computerized index, catalog, or relational database. Different repository models have different advantages. This is closely related to choosing a backup rotation scheme. The following paragraphs summarize the various existing backup models presently in use.
Unstructured
An unstructured repository may simply be a writable media consisting of, for example, a stack of floppy disks or CD-R media with minimal information about what data from the computer system was backed up onto this whteable media and when the backup(s) occurred. This is the easiest backup method to implement, but probably the least likely to achieve a high level of recoverability due to the dearth of indexing information that is associated with the data that is backed up.
Full + Incremental A Full + Incremental data backup model aims to make storing several copies of the source data more feasible. At first, a full backup of all files from the computer system is taken. After that full backup is completed, an incremental backup of only the files that have changed since the previous full or incremental backup is taken. Restoring the whole computer system to a certain point in time requires locating not only the full backup taken previous to that certain point in time but also all the incremental backups taken between that full backup and the particular point in time to which the system is supposed to be restored. The full backup version of the data is then processed, using the set of incremental changes, to create a present view of the data as of that designated certain point in time. This data backup model offers a high level of security that selected data can be restored to its present state and this data backup model can be used with removable media such as tapes and optical disks. The downside of this data backup process is dealing with a long series of incremental changes and the high storage requirements entailed in this data backup process, since a copy of every changed file in each incremental backup is stored in memory. Full + Differential
A Full + Differential data backup model differs from a Full + Incremental data backup model in that after the full backup is taken of all files on the computer system, each incremental backup of the files captures all files created or changed since the full backup, even though some may have been included in a previous partial backup. The advantage of this data backup model is that restoring the whole computer system to a certain point in time involves recovering only the last full backup and then overlaying it with the last differential backup.
Mirror + Reverse Incremental A Mirror + Reverse Incremental data backup model is similar to a Full +
Incremental data backup model. The difference is that instead of an aging full data backup, followed by a series of incremental data backups; this model offers a mirror that reflects the state of the computer system as of the last data backup and a history of reverse incremental data backups. One benefit of this data backup method is that it only requires an initial full data backup. Each incremental data backup is immediately applied to the mirror and the files they replace are moved to a reverse incremental backup. This data backup model is not suited to the use of removable media since every data backup must be done in comparison to the data backup mirror version of the data. This process, when used to restore the whole computer system to a certain point in time, is also intensive in its use of memory.
Continuous Data Protection
This data backup model takes the data backup process a step further and instead of scheduling periodic data backups, the data backup system immediately logs every change made on the computer system. This is generally done by saving byte or block-level differences rather than file-level differences. It differs from simple disk mirroring in that it enables a roll-back of the log and thus can restore an old image of data. Restoring the whole computer system to a certain point in time using this method requires that the original version of the data must be processed to incorporate every change recorded in each differential change to recreate the present version of the data. Problems
In spite of all of these various methods of data backup, existing data backup systems (including both hardware and software) fail to ensure that the user can simply plug in to the computer system to "back-up" the data stored therein, and also enable recovery of a revision of a file from a point-in-time, and enable all of the hard disk(s) in the computer system to be restored to a point-in-time. Existing data backup systems fail to efficiently track and store the state of multiple file systems over time, while allowing for correct disk-level and file-level restoration, to a point-in-time, without storing a significant amount of redundant data. These data backup systems require the user to learn new technology, understand the file system of the computer system, learn how to schedule data backup sessions, and learn new controls that must be used for this new functionality. Furthermore, the restoration of lost files is difficult using these data backup systems and there is a failure to address the security of the data that is being saved on the backup system.
BRIEF SUMMARY OF THE INVENTION
The above-described problems are solved and a technical advance achieved by the present System For Automatically Shadowing Encrypted Data And File Directory Structures For A Plurality Of Network Connected Computers Using A Network Attached Memory With Single Instance Storage (termed "Secure Networked Data Shadowing System" herein), which comprises a memory module that is connected to a plurality of monitored computer systems via an existing communication medium, such as a Local Area Network, a data communication medium (Internet), and an input/output port of the monitored computer system to store the shadowed data. The memory module includes one or more memory devices for data storage as well as software, including a control software component that is automatically installed on the monitored computer systems when the monitored computer system is first connected to the memory module, as well as associated module software for maintaining a record of the data stored on the memory devices and controlling the operation of the memory devices.
The Secure Networked Data Shadowing System automatically stores the data which is retrieved from the memory of each of the monitored computer systems on to the memory devices located in the memory module in a single format, while representing it in a data management database in two formats: disk sectors and files. The Secure Networked Data Shadowing System thereby efficiently tracks and stores the state of multiple file systems resident on a plurality of monitored computer systems over time, while allowing for correct disk-level and file-level restoration, to a point-in- time, without storing redundant data.
Security of the data that is stored on the shared Secure Networked Data Shadowing System is effected by a plurality of measures which collectively provide multiple dimensions of security. In particular, the data that is transferred between the monitored computer systems and the Secure Networked Data Shadowing System is encrypted by the monitored computer system, using a cryptokey that has public and private components. The data file that is stored on the shared Secure Networked Data Shadowing System is processed using a hash function prior to encryption, so the contents of this file are uniquely identified. Thus, when the encrypted file is received by the shared Secure Networked Data Shadowing System, it is stored in its encrypted form in memory and the hash index is used to identify the encrypted file.
The Secure Networked Data Shadowing System achieves a significant amount of data storage efficiency by implementing a "data de-duplication" process to avoid storing multiple copies of the same files. The Secure Networked Data Shadowing System identifies instances of duplication via the hash index that is created for each file. Identical hash indexes are indicative of identical files. Therefore, files that have the same hash index can be reduced to a single copy without any loss of data as long as the file structure information for each instance of the file is maintained. Thus, a plurality of the monitored computer systems can all reference the same file stored in the Secure Networked Data Shadowing System, since the local identification of this file is computer-centric, but the memory location in the Secure Networked Data Shadowing System is the same for all instances.
The Secure Networked Data Shadowing System operates autonomously, freeing the user from needing to interact with the Secure Networked Data Shadowing System to have the memory of their monitored computer system backed up. The backup is nearly always up to date so long as the Secure Networked Data Shadowing System is connected to the monitored computer system. The Secure Networked Data Shadowing System incorporates database technology to optimize the data storage and retrieval for normal operations, and the database of file directory information itself resides on the monitored computer system hard drive, while a backup copy of the database is written periodically to the Secure Networked Data Shadowing System.
In addition, the file changes, creations, relocations, and deletions are tracked through time, with the Secure Networked Data Shadowing System enabling point-in- time restoration of individual files as well as file systems on any of the monitored computer systems, including monitored computer systems that are remotely located. The full system restore capability enables the reconstruction of the entire memory of the monitored computer system, including: operating system, applications, and data files for a given point in time without requiring the intervention of the user.
If the monitored computer system is disconnected from the Secure Networked Data Shadowing System memory module for any length of time, the control software component that executes on the monitored computer system tracks the appropriate file changes occurring through time and then performs normal backup activities once the Secure Networked Data Shadowing System memory module is reconnected to the monitored computer system via the network.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 illustrates the basic architecture of the present Secure Networked Data Shadowing System operational in a typical network environment;
Figures 2A and 2B illustrate, in flow diagram form, the operation of the present Secure Networked Data Shadowing System during the initial installation of the Secure Networked Data Shadowing System on a monitored computer system;
Figure 3 illustrates, in flowchart form, the operation of the present Secure Networked Data Shadowing System to store a copy of the data that is presently added to the monitored computer system's memory; Figure 4 illustrates, in flowchart form, the operation of the present Secure Networked Data Shadowing System to create and store an integrity point to benchmark changes in the monitored computer system's memory;
Figure 5 illustrates, in flow diagram form, the operation of the present Secure Networked Data Shadowing System to retrieve data stored therein for restoration of a file in the memory of the monitored computer system; and
Figure 6 illustrates, in flow diagram form, the operation of the present Secure Networked Data Shadowing System to retrieve data stored therein for restoration of the entirety of the memory of the monitored computer system.
DETAILED DESCRIPTION OF THE INVENTION
Definitions
The following terms as used herein have the following meanings.
"File system" - the system utilized by the computer operating system to organize, store, and access information contained in the computer system memory.
"File navigation system" - the textual, hierarchical navigation interface used by the computer operating system to provide a user with an organized manner of storing, identifying, locating, and operating on files for user operations contained in the computer system memory.
"Change journal" - a computer operating system provided system to identify and track any file changes, creations, deletions, or relocations.
"Meta file" - an indirect means of storing information about a related file (e.g., file size and creation date for a data file).
"Page file" - a computer operating system defined and created file which is specific to the present session running on the computer system; the page file represents short-lived data that is not valid or meaningful to a subsequent session and is therefore of no value to retain. "Integrity Point" - a collection of files and file references which exist at a particular time to represent the files that were current and valid for that time; restoration of an integrity point ensures that files are consistent and meaningful to the computer operating system and applications that may require multiple files to be self-consistent.
"File Reference Number" or FRN - a unique identifier for a given file or folder entry in the file system file table.
"NTFS" - Acronym associated with the file system for a computer operating system. The file system provides an important feature known as journaling, which creates a queue of file changes, creations, deletions, or relocations.
System Architecture
Figure 1 illustrates the basic architecture of the present Secure Networked Data Shadowing System operational in a typical network environment. There are a plurality of monitored computer systems 1 10-1 1 OB and each typically includes a processor 1 12-1 12B, memory 1 13-1 13B (such as a disk drive, although any form of read/write memory can be used, and the term "memory" is used herein to describe this element), and a data communication medium link, such as an input/output port 1 1 1- 1 1 1 B, or wireless interface and the like. The Secure Networked Data Shadowing System comprises a memory module 101 that is connected to the monitored computer systems 1 10-1 1 OB via existing data communication mediums 150, 151 to store the shadowed data. For the sake of example, the data communication medium illustrated herein includes a Local Area Network 150 which serves to interconnect monitored computer systems 1 10, 1 10A to the memory module 101. A media interface 152 can also be used to interconnect the Local Area Network 150 to a data communication medium 151 , such as the Internet, to enable remotely located monitored computer systems 1 10B to access the memory module 101 . However, any data communication medium can be used, whether wired or wireless and regardless of the data communication protocol used.
The memory module 101 includes a memory device 102 and its associated memory module software 104 and database 105 for managing the data storage as well as a control software component 103 that is automatically installed on each monitored computer system 1 10-1 1 OB when the memory module 101 is first connected to the monitored computer systems 1 10-1 1 OB.
In this networked environment, the memory module 101 can include a plurality of memory devices 102 or even a large capacity mass storage system which is equipped with a server to execute the memory module software 104 and store the control software component 103 for installation on each of the monitored computer systems 1 10 as they are initially included in the extended network illustrated in Figure 1. The memory module software 104 maintains a listing of the various monitored computer systems 1 10-1 1 OB that are served by the memory module 101 and manages the allocation of memory in memory device 102 to ensure that the data residing therein for one monitored computer system 1 10 is not accessible by another monitored computer system 1 10B. Furthermore, the memory module software 104 manages the communications with the plurality of monitored computer systems 1 10-1 10B to ensure the timely storage of data received from the monitored computer systems 1 10-1 1 OB on to the memory device 102.
The monitored computer systems 1 10-1 10B may be devices that are all part of the distributed computer network of a single entity, with the data communication LAN 150 being an internal LAN. Alternatively, there can be a division of the monitored computer systems 1 10-1 1 OB such that they are part of at least two entities and there can also be multiple LANs (only one shown in Figure 1 ) serving these various collections of monitored computer systems. In any case, the Secure Networked Data Shadowing System can address these different environments and is capable of creating and managing virtual partitions between the different entities or different groups within a single entity.
However, in order to simplify the following description of operation of the Secure Networked Data Shadowing System, the description focuses on the operation of a single monitored computer system 1 10 as it is initialized, stores the baseline image of its disk(s) on memory device 102, and processes data file updates and well as file restoration. These various operations are typically executed by the various monitored computer systems 1 10-1 1 OB as needed and autonomously, with the user of each monitored computer system 1 10-1 1 OB not being required to manage the operation of the Secure Networked Data Shadowing System and the monitored computer systems 1 10-1 1 OB operating independent of each other.
The simplicity and ease-of-use of the Secure Networked Data Shadowing
System requires minimal user interaction, and the "Autorun" feature the resident operating system can be used, for example, to support an automatic installation of the Secure Networked Data Shadowing System software component 103. Thus, upon the first connection of the memory module 101 of the Secure Networked Data Shadowing System to the monitored computer system 1 10, the Secure Networked Data Shadowing System calls the "Autorun" software resident on the operating system of the monitored computer system 1 10 to initiate the installation application portion of the control software component 103 which is stored on the memory module 101 of the Secure Networked Data Shadowing System. (Alternatively, a mountable media can be used to initiate installation of the control software component 103 from the monitored computer system 1 10.) The installation application then identifies that this is an initial installation of the Secure Networked Data Shadowing System with the monitored computer system 1 10. The memory module software 104 requests system information from the operating system of the monitored computer system 1 10 and stores this system information in a database 105.. This system information is subsequently used to determine if the Secure Networked Data Shadowing System has been previously connected to monitored computer system 1 10. If the Secure Networked Data Shadowing System has already been installed, the monitored computer system 1 10 activates memory module 101 and starts talking to it.
Initialization
Figures 2A and 2B illustrate, in flow diagram form, the operation of the present Secure Networked Data Shadowing System during the initial installation of the Secure Networked Data Shadowing System on a monitored computer system 1 10, where the Secure Networked Data Shadowing System is linked to this monitored computer system 1 10 and an initial shadow copy of the contents of the monitored computer system's memory is created in the memory module 101 of the Secure Networked Data Shadowing System.
The Secure Networked Data Shadowing System optionally self-authenticates at step 201 when it is first attached to the monitored computer system 1 10 by ensuring that the serial number encoded into the memory device 102 of the Secure Networked Data Shadowing System memory module 101 matches the serial number entry inserted into the control software component 103. During manufacturing, the serial number is queried from the memory device 102, inserted into the control software component 103, and stored onto the Secure Networked Data Shadowing System in a manner to circumvent unauthorized replication of the Secure Networked Data Shadowing System software onto additional memory devices.
The Secure Networked Data Shadowing System then begins installation and initialization of the Secure Networked Data Shadowing System for the monitored computer system 1 10 at step 202. In place of the traditional software installation process whereby the user is required to insert a mountable media into a selected drive of the monitored computer system 1 10 in order to install software, the Secure Networked Data Shadowing System can utilize the simple "Autorun" feature of the resident operating system. The control software component 103 of the Secure Networked Data Shadowing System is loaded on to the monitored computer system 1 10 at step 202 and at step 203, the monitored computer system 1 10 is interrogated by the control software component 103 of the Secure Networked Data Shadowing System to obtain data which defines the hardware topology and device signatures of the monitored computer system 1 10. This signature information is used to "pair" the Secure Networked Data Shadowing System to the monitored computer system 1 10 and is stored in memory module software 104 at step 204.
The Secure Networked Data Shadowing System displays a simple dialog box to the user at step 205 via the display screen of the monitored computer system 1 10 to indicate that they agree to the Secure Networked Data Shadowing System user license agreement. This simplified user agreement dialog is required to ensure that the user is agreeable with the terms set forth in the end user license agreement. If the user did not intend to install the Secure Networked Data Shadowing System, or is dissatisfied with the end user license agreement, nothing remains on the monitored computer system 1 10 pertaining to the Secure Networked Data Shadowing System.
Upon successful installation of the Secure Networked Data Shadowing System, the user is not required to take further action to ensure the protection and backup of the data that is presently stored and subsequently added, deleted or modified on the memory 1 13 of their monitored computer system 1 10. The user is required to leave the monitored computer system 1 10 attached to the memory module 101 of the Secure Networked Data Shadowing System for an initial period of time in order to have an initial valid backup of their data files and directory structures from the monitored computer system 1 10 to the memory module 101 of the Secure Networked Data Shadowing System at step 206, but attaching monitored computer system 1 10 to the memory module 101 of the Secure Networked Data Shadowing System is the only action step required of the user. The control software component 103 concurrently monitors the ongoing memory activity of the monitored computer system 1 10 while the initial data backup is being executed without requiring the modification of the monitored computer system 1 10 or the use of complex interconnection processes.
The Secure Networked Data Shadowing System efficiently stores the data retrieved from the memory 1 13 of the monitored computer system 1 10 in a single format, while representing it internally in two formats: disk sectors and files. The
Secure Networked Data Shadowing System also efficiently tracks and stores the state of multiple file systems that are resident on the monitored computer system 1 10 over time, while allowing for correct disk-level and file-level restoration, to a point-in-time, without storing redundant data. A Meta File System may be implemented in the Secure Networked Data Shadowing System to describe the state of each active file system and the underlying physical disk or disks, at a point-in-time, with integrity. The Meta File System is an internally consistent, related-in-time, collection of critical data and metadata from the file systems and physical disks under its protection. The Meta File System may collect certain data, and do so in a way that correctness is ensured. Typical Meta-File data that is collected may include:
A baseline image of the non-NTFS sectors which are formatted on each physical disk installed in the monitored computer system 1 10. A complete indexing of the file systems contained on each physical disk for a designated point-in-time. This index includes the mapping of file objects to their location on the physical disk.
A serialized journal of file system changes over time. Copies of the file object contents resulting from file system changes over time.
Multiple self-consistent "snapshots" of the on-disk metadata for each active file system at a point-in-time.
The challenge of creating a consistent-in-time view of multiple active file systems is met by combining the collected data into a single database and organizing and accessing it via data management algorithms resident in the Secure Networked Data Shadowing System.
Memory Indexing
The first step in this initial data transfer process is to generate a master index of all contents of the monitored computer system's memory 1 13 at step 206. The control software component 103 discovers each storage device (memory 1 13) on the monitored computer system 1 10 and creates a corresponding Object Model for each Storage Device (TRStorageDevice). The Storage Device objects are children of the monitored computer system 1 10. While they all share some base level attributes, they can specialize for different aspects of the physical device.
For each TRStorage device, control software component 103 identifies all of the unique disk regions that it contains, and creates an object model for each (TRDiskRegion). While all TRDiskRegions share some basic traits, they specialize themselves according to the type of Region they describe. For instance, examples of unique disk regions include the Master Boot Record (MBR), the partition table, a file system region (NTFS or FAT32 partition), a hidden OEM recovery partition, and seemingly unused "slices" that are the leftovers between formal partitions. Secure Networked Data Shadowing System identifies and accounts for every single sector on a physical storage device and creates an appropriate TRDiskRegion object to manage and index them.
TRDiskRegions that do not have a recognizable file system, are treated as "Block Regions." Block regions comprise a span of disk sectors (start, from sector zero, and length), and are simply archived as a block range onto the Secure Networked Data Shadowing System memory device 102.
This master index includes processing the master boot record and file system at step 207 to generate an index of every partition, file and folder on the monitored computer system 1 10, and this index data for each partition, file and folder is entered into a database 1 14 residing on the monitored computer system memory 1 13 as well as optionally a database 105 in the memory module 101 .
The master boot record contains information about the arrangement of data on the monitored computer system memory 1 13. These contents may be arranged with subsets of data such that there is a primary bootable partition and alternate, non- bootable partitions. An entry in the master boot record determines the status of these partitions, as well as size and binary offset values for each partition. Capturing and processing this information permits the Secure Networked Data Shadowing System to automatically reconstruct the entire contents of the monitored computer system memory 1 13. The database exists largely to facilitate a (faster) way to search and retrieve file history and revisioning. The method used to lay down the "copy/backup" of the file system of the monitored computer system 1 10, enables recreation of the data contained in the database 1 14 from the Secure Networked Data Shadowing System itself. In the case of Secure Networked Data Shadowing System, most of the Object Models that model a feature or attribute of the monitored computer system 1 10 are persisted to the Secure Networked Data Shadowing System memory module 101 as file system streams in a directory structure that matches or emulates the physical hierarchy from where they came from.
After processing the master boot record, the file system for the primary bootable partition is processed at step 208 to record each file and folder entry, placing records into the database 1 14 residing on the monitored computer system memory 1 13. This database 1 14 contains information about each file and folder and is accessed primarily during file retrieval requests and is also updated with changes to individual files and folders to create a chronological record of changes. This same database 1 14 is mirrored (database 105) onto the Secure Networked Data Shadowing System memory module 101 whenever the monitored computer system 1 10 is connected to the memory module 101 of the Secure Networked Data Shadowing System. The mirrored database 105 is used primarily during full-system restoration where the monitored computer system memory 1 13 may have failed and the mirrored database 105 contains records of each file and folder residing in the binary data copied to the Secure Networked Data Shadowing System memory device 102. TRDiskRegions that do have a recognized file system create an Object Model for the file system "Volume" (TRVolume). A Volume understands the concepts and navigation of its contained file system, and the concept of its associated mount point.
Memory Copy Upon completion of processing the master boot record and file system, the
Secure Networked Data Shadowing System begins the second step of this process by copying the binary information from the monitored computer system memory 1 13 with the exception of a subset of the memory 1 13. The exception subset consists of: areas not allocated, or identified as in use, by any of the partitions as well as areas identified as temporary information by the operating system. An example of the temporary information is the operating system page file, which is useful only during the current session and is meaningless to a subsequent session.
The copy process identifies a Secure Networked Data Shadowing System storage device and writes the non-NTFS file objects onto the Secure Networked Data Shadowing System memory device 102 at step 21 1 . Once all of these objects are written into memory device 102, the Secure Networked Data Shadowing System writes all of the NTFS files on to memory device 102 at step 212 in a directory hierarchy that mimics their physical and logical relationships on the monitored computer system 1 10. Below is a simple base directory tree of a Secure Networked Data Shadowing System (depth of the contained file systems has been omitted.
R:\data\REBITDV05\072CE3A9
R:\data\REBITDV05\19F418B5
R:\data\REBITDV05\647931 C9
R:\data\REBITDV05\647931 D6 R:\data\REBITDV05\072CE3A9\RegionO
R:\data\REBITDV05\072CE3A9\Region1
R:\data\REBITDV05\072CE3A9\Region2
R:\data\REBITDV05\072CE3A9\Region1\{ddffc3ed-7035-
11 dc-9485-000c29fddfb0} R:\data\REBITDV05\072CE3A9\Region2\{ddffc3f3-7035-
11 dc-9485-000c29fddfb0}
R:\data\REBITDV05\19F418B5\RegionO
R:\data\REBITDV05\19F418B5\Region1
R:\data\REBITDV05\19F418B5\Region1 \{732534f9-cb5a- 11 db-befe-806e6f6e6963}
R:\data\REBITDV05\647931 C9\Region0
R:\data\REBITDV05\647931 C9\Region1
R:\data\REBITDV05\647931 C9\Region1\{a93586cc-cb5f-
11 db-b097-000c29e897d0} R:\data\REBITDV05\647931 D6\RegionO
R:\data\REBITDV05\647931 D6\Region1
R:\data\REBITDV05\647931 D6\Region2
R:\data\REBITDV05\647931 D6\Region1\{a93586d2-cb5f-
11 db-b097-000c29e897d0} To understand this, the control software component 103 knows that the
Secure Networked Data Shadowing System storage device 103 was mounted on drive "R:' and all archiving operations are going to directory "data" which is located in the memory module 101. The next indicia in this string is the name of the monitored computer system 1 10 that provided the content "REBITDEV05", then the physical disk signature (i.e., 072CE3A9, 072CE3A9, etc.). If the disk drive has data that is to be archived, it is then organized into Region objects that are simply sequentially numbered (RegionO, Regioni , etc.). If a region contains an understood file system/volume, its volume identifier is used in the persistent storage to map its path. In the case of R:\data\REBITDV05\072CE3A9\Region1Hddffc3ed-7035-1 1 dc-9485-000c29fddfb0}, on this system, it happens that this is an NTFS volume, and a full mirror of the file system for drive "C:" of the monitored computer system 1 10.
A key point here is that the Object Models for each element of the monitored computer system 1 10 are themselves stored in file system streams on the Secure Networked Data Shadowing System memory device 102. For example, the TRMachine object is "saved" as a hidden stream inside of the r:\data\REBITDEV05\ directory entry, and the volume object for R:\data\ REBITDV05\072CE3A9\Region1\{ddffc3ed-7035- 1 1 dc-9485-000c29fddfb0} is saved as a hidden stream on that directory entry.
What this means is, from the Secure Networked Data Shadowing System file system alone, all of the object relationships and their Meta data can be reconstructed with no database. Further, when a file is eventually archived to the Secure Networked Data Shadowing System, all of its associated history and Meta data are stored as hidden streams in the file entry itself. The database 1 14 can be completely reconstructed from the Secure Networked Data Shadowing System storage file system itself.
In addition, in the Secure Networked Data Shadowing System storage architecture, the files are not actually stored with the name they had on the monitored computer system 1 10. Rather, they are stored with a file name that is a unique hash value of the contents of that file. A file system "soft link" then is used in the directory structure above to point to the data of the hash value named "blob" of data that is the file from the monitored computer system 1 10. The user only sees the soft link. Secure Networked Data Shadowing System stores the hashed value named file. If any two files hash to the same value (meaning they are binary identical), only one copy need be hosted in storage, and the symbolic links for both host copies point to the same stored content. This attribute of functionality is the first level of intrinsic data de-duplication.
To continue, when a file is modified on the monitored computer system 1 10, the new data is hashed named and stored on the monitored computer system 1 10, and the old version of the file is removed, and replaced with only a description of its binary differences to the new version (Reverse X-Delta). This strategy allows for Secure Networked Data Shadowing System to keep pristine copies of all current files, while being able to regenerate previous versions at all times while minimizing data storage space requirements on the Secure Networked Data Shadowing System itself.
Because of the time required to read the memory 1 13 of the monitored computer system 1 10, and because it contains an active file system, the Secure Networked Data Shadowing System enables Journaling at step 209 for the active file systems residing on the physical disk being imaged. In addition, the Secure Networked Data Shadowing System at step 210 sets the flag in the database indicating an Integrity Point is desired by creating a set of cursors against the active file system journals, which set of cursors are termed the "Start Cursors". The Journal process begins identifying and queuing files to act upon. Once the cursors are created, the Secure Networked Data Shadowing System at step 21 1 creates and compresses an image of the active file systems into the memory device 101 of the memory module 101 of the Secure Networked Data Shadowing System. To save memory space, the active file systems are queried for their allocated regions of the physical disk and only allocated regions are read and compressed.
At step 212, the Secure Networked Data Shadowing System indexes the active file systems to extract relevant metadata for every file object in the file system and records it in a database. The Secure Networked Data Shadowing System identifies and indexes all directories contained within the file navigation system by File Reference Number, or FRN, and identifies and inserts entries into the database for each cluster run representing the file. The Secure Networked Data Shadowing System initializes the baseline by inserting entries in the database signifying completion of the initialization. Once the image and index are complete, the Secure Networked Data Shadowing System at step 213 creates a second set of cursors against the active file system journals, termed the "Most Recent Entries".
At step 214, the Secure Networked Data Shadowing System enables Change Tracking, and at step 215, the journals for the active file systems are processed from the Start Cursor to the Most Recent Entry, to record records of changes in the database, including file object contents. Upon reaching a point in time where no files remain in the queue to process, the appropriate actions are taken to insert an Integrity Point entry into the database.
Finally, at step 216, the Secure Networked Data Shadowing System records an Integrity Point in the database to which the baseline image and file object change records are related. This is the data required to allow a self-consistent Disk Recovery at the point-in-time which the Integrity Point represents. Thus, the full disk copy and the file changes, creations, deletions, or relocations that occurred during the full disk copy are collected into a set to represent a fully restorable point called the Integrity Point.
Change Tracking
Figure 3 illustrates, in flowchart form, the operation of the present Secure Networked Data Shadowing System to store a copy of data that are newly added to the monitored computer system's memory 1 13. The Secure Networked Data Shadowing System process registers with the operating system change journal in order to receive notification of changes occurring to files and folders residing on the monitored computer system memory 1 13. The change journal then dynamically notifies the Secure Networked Data Shadowing System of changes, permitting the Secure Networked Data Shadowing System to determine the appropriate action to take. File creation, movement, content changes, and renaming are all events requiring action, and each action is entered into an action queue for processing.
The Secure Networked Data Shadowing System action queue is utilized for periods where the monitored computer system 1 10 is connected or disconnected to the memory module 101 of the Secure Networked Data Shadowing System. If the monitored computer system 1 10 is connected to the memory module 101 of the Secure Networked Data Shadowing System, the Secure Networked Data Shadowing System processes each action queue entry, updating the entry in the database 1 14 and, if necessary, compressing and transferring the file binary contents to the Secure Networked Data Shadowing System memory module 101.
During periods of time that the monitored computer system 1 10 is not connected to the memory module 101 of the Secure Networked Data Shadowing System, the action queue is utilized for recording actions that are to be performed once the monitored computer system 1 10 is connected to the memory module 101 of the Secure Networked Data Shadowing System. This recording process permits the Secure Networked Data Shadowing System to prioritize the actions to be performed, selecting the files of highest importance to be processed before lower priority files. This is the continuous process of maintaining the data required to assemble a consistent-in- time view of the file systems. The process of change tracking begins immediately after the Initialization and Indexing is complete, as described above.
Journal Processing
Journal processing is continuous and occurs whether or not the monitored computer system 1 10 is connected to the memory module 101 of the Secure Networked Data Shadowing System. The control software component 103 of the Secure Networked Data Shadowing System at step 301 queries the file system journals for any more recent changes, starting from the last entry previously processed. The control software component 103 at step 302 then creates a change record in the action queue in database 1 14 and increments the journal cursor for each relevant journal entry. For each relevant journal entry, the control software component 103 creates a change record in the action queue in database 1 14 and increments the journal cursor. When the journal entries are exhausted (up-to-date), the control software component 103 watches for new entries. Data Synchronization
Data Synchronization is intermittent and occurs only when the monitored computer system 1 10 is connected to the memory module 101 of the Secure Networked Data Shadowing System. When the monitored computer system 1 10 is connected to the memory module 101 of the Secure Networked Data Shadowing
System, the control software component 103 starts processing at step 304 from the first unprocessed change record in the action queue in database 1 14. For the oldest change record, and all related, unprocessed change records, the control software component 103 at step 305 determines if each is still relevant (for example, if the file was created and is already deleted, it is not relevant). The control software component 103 at step 306 removes all non-relevant change records from the action queue in database 1 14. Alternatively, at step 307, the control software component 103 takes the appropriate action for each relevant change record. If the file was created, the control software component 103 stores new file and file-version records in the action queue in database 1 14 and copies the file-version's contents to the Secure Networked Data
Shadowing System memory module 101 at step 308. If the file was moved or renamed, the control software component 103 creates a new file record in the action queue in database 1 14, relates all file-versions from the old file record with the new file record, and marks the old file record as deleted at step 309. If the file was deleted, the control software component 103 marks the file record in the action queue in database 1 14 as deleted at step 310. If a directory was created, the control software component 103 stores a new directory record in the action queue in database 1 14. If a directory was moved or renamed, the control software component 103 creates a new directory record in the action queue in database 1 14, relates all file records from the old directory record with the new directory record, and marks the old directory record as deleted at step
312. If a directory was deleted, the control software component 103 marks the directory record in the action queue in database 1 14 as deleted at step 313. Finally, at step 314, the control software component 103 removes the change record from the action queue in database 1 14 and processing returns to step 305. Create An Integrity Point
Figure 4 illustrates, in flowchart form, the operation of the present Secure Networked Data Shadowing System to create and store an integrity point to benchmark changes in the monitored computer system's memory 1 13.
This is the operation required to store the information necessary to execute a
Disk Recovery for a point-in-time. The process of creating an Integrity Point requires reading and storing a self-consistent "snapshot" of the meta files maintained on-disk by the active file systems. This requires monitoring these file systems for changes occurring while the snapshot is created and deciding if they invalidate the snapshot, requiring another attempt. Exemplary operations include the following.
Before attempting to create an Integrity Point, Journal Processing and Data Synchronization must be up-to-date. Each active file system is queried (or directly parsed) by the control software component 103 at step 401 to determine the physical locations on-disk that is has allocated for its own use (File System Regions). These File System Regions contain the data structures that define a consistent state of the file system and must be self-consistent. The control software component 103 then queries each active file system's journal at step 402 for its next record index and this value is kept as a cursor. The control software component 103 instructs the operating system to flush all active file systems to memory 102 at step 403 and the File System Regions for each active file system are read directly from disk 1 13 at the sector level and stored in an archive on the Secure Networked Data Shadowing System at step 404.
The control software component 103 again queries each active file system's journal at step 405 for its next record index and this value is compared with the previously recorded cursor. If the cursors match, then at step 406 the Integrity Point is "confirmed" and marked as such in the database 1 14. If the cursors do not match, the offending journal is queried for the inter-cursor entries at step 407. The entries are examined by the control software component 103 at step 408 and a decision is made whether or not they invalidate the snapshot. If so, the process is repeated from step 401 until a valid snapshot is achieved. If the snapshot is valid, then at step 410, all file objects that resulted from change records occurring between the previous Integrity Point and this one are related to this Integrity Point record in the database 1 14 and the Integrity Point is marked as "sealed." The database application is instructed at step 41 1 to perform a backup operation, resulting in the placement of a compressed representation of the database 1 14 onto the memory module 101 of the Secure Networked Data Shadowing System.
Network Data De-Duplication
The Secure Networked Data Shadowing System achieves a significant amount of data storage efficiency by implementing a "data de-duplication" process to avoid storing multiple copies of the same files. For example, the plurality of monitored computer systems 1 10-1 1 OB typically all have the same programs resident in the memory 1 13-1 13B of these systems. The programs occupy a significant amount of data storage capacity and replicating a copy of each program for each monitored computer system 1 10-1 1 OB wastes a significant amount of memory capacity in memory device 102. Similarly, the users at the plurality of monitored computer systems 1 10- 1 10B are typically employed by the same organization and many of the customer data files resident on the monitored computer systems 1 10-1 1 OB may be duplicates of each other.
The memory module software 104 identifies instances of duplication via the hash index that is created for each file. Identical hash indexes are indicative of identical files. Therefore, files that have the same hash index can be reduced to a single copy without any loss of data as long as the file structure information for each instance of the file is maintained. Thus, a plurality of the monitored computer systems 1 10-1 1 OB can all reference the same file stored in the memory device 102 of the memory module 101 , since the local identification of this file is computer-centric, but the memory location in memory device 104 is the same for all instances. When a file is revised by one of the monitored computer systems, the new version of this file is written in its entirety into the memory device 104 of the memory module 101 and a new hash index is created for this version of the file. This does not impact the other monitored computer systems, since their file structure still points to the prior version of the file which still remains in the memory device 104 of the memory module 101. Thus, the use of the hash index for identifying files stored in memory module 101 has the added benefits of enabling the identification of duplicate copies of a file as well as annonomizing the file, since this new moniker for the file fails to reveal its source or place in the file system structure of the originating monitored computer system.
File Version Retrieval
Figure δillustrates, in flow diagram form, the operation of the present Secure Networked Data Shadowing System to retrieve data stored therein for restoration of a file in the memory 1 13 of the monitored computer system 1 10. This is the operation to "reconstitute" the contents of a file at a point-in-time. This file-version may reside in the baseline disk image stored to the Secure Networked Data Shadowing System during initialization or in a file-version archive on the Secure Networked Data Shadowing System.
The database 1 14 contains records of each file that has been stored on the Secure Networked Data Shadowing System, including the files captured during initialization. Over the course of time, data which enables the restoration of multiple versions of a given file may be stored on the Secure Networked Data Shadowing System, creating the ability to retrieve a version of a file from one of several points-in- time. When a file is modified on the monitored computer system 1 10, the new data is hashed named and stored on the monitored computer system 1 10, and the old version of the file is removed, and replaced with only a description of its binary differences to the new version (Reverse X-Delta). This strategy allows for Secure Networked Data Shadowing System to keep pristine copies of all current files, while being able to regenerate previous versions at all times while minimizing data storage space requirements on the Secure Networked Data Shadowing System itself.
The process of retrieving a file from the database and related location of the Secure Networked Data Shadowing System begins at step 501 where the user opens user interface and navigates through the hierarchical file and folder system to locate the desired file or folder. The user selects the desired file or folder at step 502 and uses "drag and drop" functionality to move the selected file or folder to another folder location (e.g., 'Desktop' or 'My Documents') on the monitored computer system. Upon releasing the mouse button, the operating system at step 503 generates a request from the Secure Networked Data Shadowing System for data related to the source file identified by the user interface. The database then is queried at step 504 to locate the present version of the selected file and its binary differences to the new version, traced back to the point-in-time selected by the user.
If the user selects a present version of the file, at step 505, the Secure Networked Data Shadowing System retrieves the pristine copy of the current file and delivers the file to the user. Otherwise, the Secure Networked Data Shadowing System at step 506 uses the collection of binary differences to trace the selected file backwards in time to recreate the selected version of the file as indicated by the user and then delivers the reconstructed file to the user. The user reads and seeks on the data stream interface at step 507 and processes the contents as desired.
Disk Recovery Figure 6 illustrates, in flow diagram form, the operation of the present Secure
Networked Data Shadowing System to retrieve data stored therein for restoration of the entirety of the memory 1 13 of the monitored computer system 1 10. This is the operation required to restore the complete state of a physical disk 1 13 of the monitored computer system 1 10 at a point-in-time. The available points-in-time are defined by previously stored Integrity Points. The goal of a Disk Recovery is to "reconstitute" a self-consistent image of the subject physical disk 1 13 to the sector level and write this to a hard disk 1 13 on the monitored computer system 1 10.
In order to write to the physical system disk 1 13, it is necessary to boot the monitored computer system 1 10 from an alternative media and ensure that the file systems on hard disk(s) 1 13 are not in use at step 601 . At step 602, the user must ensure that the environment is acceptable. The Secure Networked Data Shadowing System is connected to the monitored computer system 1 10 at step 603 and must be accessible. At step 604, the subject hard disk(s) 1 13 must be available and large enough to receive the restoration disk image. The subject hard disk(s) 1 13 do not need to be formatted, but can be formatted if desired. At step 605, any file systems present on the subject hard disk(s) are unmounted and the user selects an Integrity Point to restore onto the subject hard disk(s) 1 13 at step 606.
The baseline non-NTFS disk image(s) stored on the Secure Networked Data Shadowing System is written directly to the subject hard disk(s) 1 13 sector-by-sector at step 607. The database 1 14 is queried at step 608 for the snapshot corresponding to the closest file system image to the selected baseline. At step 609, the snapshot is written to the subject hard disk(s) and, for each file object, the database 1 14 is queried at step 610 for the file object's storage location. The file object's contents are written directly to its disk location at step 61 1. The subject drive(s) 1 13 are now ready for use and the monitored computer system 1 10 may be rebooted at step 612.
Guest PC / Portable File Access
The Secure Networked Data Shadowing System makes note of distinguishing features of the monitored computer system 1 10 such that the connection of the Secure Networked Data Shadowing System memory module 101 to a second, non-host computer system is quickly identified. In this alternative connection condition, the
Secure Networked Data Shadowing System "Autorun" initialization application asks the user if they want access to the files stored within the Secure Networked Data Shadowing System memory module 101 or if they wish to re-initialize the Secure Networked Data Shadowing System to pair with the newly connected computer system. If the user wishes to re-initialize with the newly connected computer system, all backup data from the previous monitored computer system 1 10 is eliminated, and a message indicating the same is displayed. If the user wishes to access files contained on the memory module 101 , the Secure Networked Data Shadowing System initializes a limited application permitting the user to utilize the same graphical user interface as before. The user may then locate and drag-and-drop files onto the newly connected computer system hard disk drive.
The operating system on the monitored computer system recognizes specific files contained in the base directory of a disk drive or Secure Networked Data Shadowing System newly connected to the monitored computer system 1 10. The file of type 'autorun. inf alerts the operating system to the presence of a sequence of operations to be performed, as defined within the file. The Secure Networked Data Shadowing System, upon successful installation onto the monitored computer system 1 10, alters this 'autorun.inf file to behave differently if plugged into a subsequent, or guest, computer system. This altered 'autorun.inf file instructs the Secure Networked Data Shadowing System to make available the contents of the drive by reconstructing and interrogating the duplicated database. Through this method, user files of interest may be identified for copying onto the guest computer system. Therefore, the monitored computer system's files, such as digital photographs and music files, may be transferred from the Secure Networked Data Shadowing System onto the guest computer system for display or sharing as desired.
In order to make the access to files on the guest computer system as seamless as the access on the monitored computer system, the file explorer system of the guest computer system is utilized. By registering with, and making calls to, the file explorer system, the display of the contents of the Secure Networked Data Shadowing System mimics the display of the contents of the user's typical computer system.
Summary
The Secure Networked Data Shadowing System automatically stores the data on the memory module in a single format, while representing it in a data management database in two formats: disk sectors, and files. The Secure Networked Data Shadowing System thereby efficiently tracks and stores the state of multiple file systems over time, while allowing for correct disk-level and file-level restoration, to a point-in-time, without storing redundant data.

Claims

CLAIMSWhat is claimed as new and desired to be protected by Letters Patent of the United States is:
1. A data shadowing system for the automatic backup storage of data that is written in the memories of a plurality of monitored computer systems and the selective retrieval of this data for restoration to said memories, comprising: memory module means, connected to a plurality of monitored computer systems via a communication medium, for storing a shadow copy of the data which is written in the memories of the plurality of monitored computer systems; customer data file management means, resident in each of said plurality of monitored computer systems, comprising: customer data file mapping means for mapping file directory structures associated with the customer data written in the memory of the monitored computer system into file tree information which identifies original names of customer data files as stored on said monitored computer system, and a location in said memory module means which stores said customer data; customer data file hash means for processing each of said customer data files to generate an associated hash value of each of said customer data files; customer data encryption means for encrypting each of said customer data files using a cryptokey having public and private components; encrypted customer data file transmission means for transmitting said encrypted customer file, said hash value and a public encryption key to said memory module means; and customer data file storage means, located at said memory module means, for storing each of said encrypted customer data files, said associated hash value, and said public encryption key received from each of said monitored computer systems via said communication medium, in said memory module means.
2. The data shadowing system of claim 1 , further comprising: duplication means, responsive to a plurality of said encrypted customer data files having the same hash value, for storing a single instance of said encrypted customer data file in said memory module means.
3. The data shadowing system of claim 2 wherein said customer data file storage means additionally stores said file tree information as well as said associated hash value and public cryptokey for each of said plurality of encrypted customer data files having the same hash value with said single instance of said customer data file in said memory module means.
4. The data shadowing system of claim 2, further comprising: system file management means for automatically mapping system files written in the memory of the monitored computer system into file tree information which identifies original names of system files as stored on said monitored computer system and a location in said memory module means which stores said system files.
5. The data shadowing system of claim 4 wherein said system files comprise: computer files, exclusive of customer provided data, including at least one of: master boot record, partition table, and programs.
6. The data shadowing system of claim 4, further comprising: system file hash means for processing each of said system files to generate an associated hash value of each of said system files; wherein said memory module means further comprises: system file storage means for storing each of said system files and said associated hash value in said memory module means; and wherein said mapping database means stores said hash value of each of said customer data files in said database.
7. The data shadowing system of claim 6, further comprising: duplication means, responsive to a plurality of said system files having the same hash value, for storing a single instance of said system file in said memory module means.
8. The data shadowing system of claim 7 wherein said system file storage means additionally stores said file tree information for each of said plurality of system files having the same hash value and said associated hash value with said single instance of said system file in said memory module means.
9. The data shadowing system of claim 1 wherein said customer data file management means comprises: change journal means for automatically tracking changes to said customer data files, including: customer data file creation, customer data file movement, customer data file content changes, and customer data file renaming.
10. The data shadowing system of claim 9, further comprising: file history means, responsive to a modification of a customer data file, for generating file change data indicative of a difference between said customer data file and said modified customer data file; file tracking means for storing said file change data in said memory module means; and wherein said customer data file management means stores said file change data in said memory module means and substitutes said modified customer data file for said customer data file in said memory module means.
1 1.A method for the autonomous encrypted backup storage of data that is written in the memories of a plurality of monitored computer systems and the selective retrieval of this encrypted data for restoration to said memories, comprising: storing, in a memory module which is connected to a plurality of monitored computer systems via a communication medium, a shadow copy of the data which is written in the memories of the plurality of monitored computer systems; managing customer data files, resident in each of said plurality of monitored computer systems, comprising: mapping file directory structures associated with the customer data written in the memory of the monitored computer system into file tree information which identifies original names of customer data files as stored on said monitored computer system and a location in said memory module means which stores said customer data; processing each of said customer data files to generate an associated hash value of each of said customer data files; encrypting each of said customer data files using a cryptokey having public and private components; transmitting said encrypted customer file, said hash value and a public encryption key to said memory module; and storing customer data files, located at said memory module, each of said encrypted customer data files, said associated hash value, and said public encryption key received from each of said monitored computer systems via said communication medium, in said memory module.
12. The method for the autonomous encrypted backup storage of data of claim 1 1 , further comprising: storing, in response to a plurality of said encrypted customer data files having the same hash value, a single instance of said encrypted customer data file in said memory module.
13. The method for the autonomous encrypted backup storage of data of claim 12 wherein said step of storing customer data files additionally stores said file tree information as well as said associated hash value and public cryptokey for each of said plurality of encrypted customer data files having the same hash value with said single instance of said customer data file in said memory module.
14. The method for the autonomous encrypted backup storage of data of claim 12, further comprising: automatically mapping system files written in the memory of the monitored computer system into file tree information which identifies original names of system files as stored on said monitored computer system and a location in said memory module which stores said system files.
15. The method for the autonomous encrypted backup storage of data of claim 14 wherein said system files comprise: computer files, exclusive of customer provided data, including at least one of: master boot record, partition table, and programs.
16. The method for the autonomous encrypted backup storage of data of claim 14, further comprising: processing each of said system files to generate an associated hash value of each of said system files; wherein said step of storing a shadow copy of data files further comprises: storing each of said system files and said associated hash value in said memory module; and wherein said step of mapping customer data files stores said hash value of each of said customer data files in said database.
17. The method for the autonomous encrypted backup storage of data of claim 16, further comprising: storing, in response to a plurality of said system files having the same hash value, a single instance of said system file in said memory module.
18. The method for the autonomous encrypted backup storage of data of claim 17 wherein said system file storage means additionally stores said file tree information for each of said plurality of system files having the same hash value and said associated hash value with said single instance of said system file in said memory module means.
19. The method for the autonomous encrypted backup storage of data of claim 21 wherein said customer data file management means comprises: change journal means for automatically tracking changes to said customer data files, including: customer data file creation, customer data file movement, customer data file content changes, and customer data file renaming.
20. The method for the autonomous encrypted backup storage of data of claim 19, further comprising: file history means, responsive to a modification of a customer data file, for generating file change data indicative of a difference between said customer data file and said modified customer data file; file tracking means for storing said file change data in said memory module means; and wherein said customer data file management means stores said file change data in said memory module means and substitutes said modified customer data file for said customer data file in said memory module means.
PCT/US2008/082055 2007-10-31 2008-10-31 System for automatically shadowing encrypted data and file directory structures WO2009059183A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
DE112008002947T DE112008002947T5 (en) 2007-10-31 2008-10-31 System for automatic shadowing of encrypted data and file directory structures

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/933,155 2007-10-31
US11/933,155 US20080104146A1 (en) 2006-10-31 2007-10-31 System for automatically shadowing encrypted data and file directory structures for a plurality of network-connected computers using a network-attached memory with single instance storage

Publications (1)

Publication Number Publication Date
WO2009059183A1 true WO2009059183A1 (en) 2009-05-07

Family

ID=40595707

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/082055 WO2009059183A1 (en) 2007-10-31 2008-10-31 System for automatically shadowing encrypted data and file directory structures

Country Status (3)

Country Link
US (2) US20080104146A1 (en)
DE (1) DE112008002947T5 (en)
WO (1) WO2009059183A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8266105B2 (en) 2006-10-31 2012-09-11 Rebit, Inc. System for automatically replicating a customer's personalized computer system image on a new computer system
US8356174B2 (en) 2006-10-31 2013-01-15 Rebit, Inc. System for automatically shadowing encrypted data and file directory structures for a plurality of network-connected computers using a network-attached memory with single instance storage
CN108196965A (en) * 2017-12-28 2018-06-22 维沃移动通信有限公司 A kind of data processing method and device

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8977951B2 (en) 2006-08-21 2015-03-10 Adobe Systems Incorporated Methods and apparatus for automated wizard generation
US8739120B2 (en) * 2007-12-03 2014-05-27 Adobe Systems Incorporated System and method for stage rendering in a software authoring tool
US20090164529A1 (en) * 2007-12-21 2009-06-25 Mccain Greg Efficient Backup of a File System Volume to an Online Server
WO2009096955A1 (en) * 2008-01-30 2009-08-06 Hewlett-Packard Development Company, L.P. Encryption based storage lock
US8769223B2 (en) * 2008-03-31 2014-07-01 Symantec Corporation System and method for setting an activation state for a device used in a backup operation
US8682850B2 (en) * 2008-06-11 2014-03-25 International Business Machines Corporation Method of enhancing de-duplication impact by preferential selection of master copy to be retained
US8397084B2 (en) * 2008-06-12 2013-03-12 Microsoft Corporation Single instance storage of encrypted data
US7913114B2 (en) * 2008-07-31 2011-03-22 Quantum Corporation Repair of a corrupt data segment used by a de-duplication engine
US8290915B2 (en) * 2008-09-15 2012-10-16 International Business Machines Corporation Retrieval and recovery of data chunks from alternate data stores in a deduplicating system
US8447740B1 (en) * 2008-11-14 2013-05-21 Emc Corporation Stream locality delta compression
US8315992B1 (en) * 2008-11-26 2012-11-20 Symantec Corporation Affinity based allocation for storage implementations employing deduplicated data stores
US9218347B2 (en) 2009-02-13 2015-12-22 International Business Machines Corporation System and method for archiving to a single database table information located across multiple tables
US20100262797A1 (en) * 2009-04-10 2010-10-14 PHD Virtual Technologies Virtual machine data backup
US9419801B2 (en) * 2009-05-12 2016-08-16 Infrascale Inc. System and method for transmitting needed portions of a data file between networked computers
US8224792B2 (en) 2009-08-28 2012-07-17 International Business Machines Corporation Generation of realistic file content changes for deduplication testing
US20110055471A1 (en) * 2009-08-28 2011-03-03 Jonathan Thatcher Apparatus, system, and method for improved data deduplication
US20110093581A1 (en) * 2009-10-16 2011-04-21 Naveen Venkatachalam Coordinated Computer Network
US8150808B2 (en) 2009-10-21 2012-04-03 Delphix Corp. Virtual database system
US8161077B2 (en) 2009-10-21 2012-04-17 Delphix Corp. Datacenter workflow automation scenarios using virtual databases
US20110106815A1 (en) * 2009-11-02 2011-05-05 Lenovo (Singapore) Pte, Ltd. Method and Apparatus for Selectively Re-Indexing a File System
US8407189B2 (en) * 2009-11-25 2013-03-26 International Business Machines Corporation Finding and fixing stability problems in personal computer systems
WO2011076463A1 (en) 2009-12-23 2011-06-30 International Business Machines Corporation Deduplication of encrypted data
US8239403B2 (en) * 2009-12-30 2012-08-07 International Business Machines Corporation Enhancing soft file system links
GB201006442D0 (en) * 2010-04-17 2010-06-02 Univ Edinburgh Storing a directory tree structure
KR20110128567A (en) * 2010-05-24 2011-11-30 삼성전자주식회사 Method for controlling objects of user interface and apparatus of enabling the method
US8548944B2 (en) * 2010-07-15 2013-10-01 Delphix Corp. De-duplication based backup of file systems
US8392376B2 (en) * 2010-09-03 2013-03-05 Symantec Corporation System and method for scalable reference management in a deduplication based storage system
US8468174B1 (en) 2010-11-30 2013-06-18 Jedidiah Yueh Interfacing with a virtual database system
US8661259B2 (en) * 2010-12-20 2014-02-25 Conformal Systems Llc Deduplicated and encrypted backups
US8856741B2 (en) 2011-09-30 2014-10-07 Adobe Systems Incorporated Just in time component mapping
US10275397B2 (en) 2013-02-22 2019-04-30 Veritas Technologies Llc Deduplication storage system with efficient reference updating and space reclamation
US9442807B1 (en) * 2013-05-29 2016-09-13 Veritas Technologies, LLC Handling data segments in deduplication
US10628263B1 (en) 2013-08-02 2020-04-21 David Cowen Logfile-related technologies and techniques
US10503909B2 (en) 2014-10-31 2019-12-10 Hewlett Packard Enterprise Development Lp System and method for vulnerability remediation verification
WO2016068996A1 (en) * 2014-10-31 2016-05-06 Hewlett Packard Enterprise Development Lp Security record transfer in a computing system
US10180945B2 (en) * 2015-02-02 2019-01-15 Adobe Inc. Data replication from a cloud-based storage resource
CN105550345B (en) * 2015-12-25 2019-03-26 百度在线网络技术(北京)有限公司 File operation method and device
US10805273B2 (en) 2016-04-01 2020-10-13 Egnyte, Inc. Systems for improving performance and security in a cloud computing system
US10140171B2 (en) * 2016-04-14 2018-11-27 International Business Machines Corporation Method and apparatus for downsizing the diagnosis scope for change-inducing errors
US10503933B2 (en) * 2016-09-15 2019-12-10 Nuts Holdings, Llc Structured data folding with transmutations
US10331362B1 (en) * 2016-09-30 2019-06-25 EMC IP Holding Company LLC Adaptive replication for segmentation anchoring type
US10551814B2 (en) * 2017-07-20 2020-02-04 Fisher-Rosemount Systems, Inc. Generic shadowing in industrial process plants
US10552075B2 (en) * 2018-01-23 2020-02-04 Vmware, Inc. Disk-image deduplication with hash subset in memory
US11106375B2 (en) * 2019-04-04 2021-08-31 Netapp, Inc. Deduplication of encrypted data within a remote data store

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050027845A1 (en) * 2000-01-03 2005-02-03 Peter Secor Method and system for event impact analysis
US20070136200A1 (en) * 2005-12-09 2007-06-14 Microsoft Corporation Backup broker for private, integral and affordable distributed storage

Family Cites Families (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4266271A (en) * 1978-10-10 1981-05-05 Chamoff Martin E Reconfigurable cluster of data-entry terminals
US5367698A (en) * 1991-10-31 1994-11-22 Epoch Systems, Inc. Network file migration system
US5555371A (en) * 1992-12-17 1996-09-10 International Business Machines Corporation Data backup copying with delayed directory updating and reduced numbers of DASD accesses at a back up site using a log structured array data storage
US5638509A (en) * 1994-06-10 1997-06-10 Exabyte Corporation Data storage and protection system
US5864853A (en) * 1994-09-14 1999-01-26 Kabushiki Kaisha Toshiba Portable file system operable under various computer environments
US5852724A (en) * 1996-06-18 1998-12-22 Veritas Software Corp. System and method for "N" primary servers to fail over to "1" secondary server
US5905888A (en) * 1997-02-19 1999-05-18 On Spec Electronic, Inc. Bootable redundant hard disk attached to a PC's parallel port with rom-address auto-detect and configure during BIOS scan
US6073220A (en) * 1997-09-03 2000-06-06 Duocor, Inc. Apparatus and method for providing a transparent disk drive back-up
US6324544B1 (en) * 1998-10-21 2001-11-27 Microsoft Corporation File object synchronization between a desktop computer and a mobile device
DE60001931T2 (en) * 1999-04-28 2004-02-12 Tranxition Corp., Beaverton METHOD AND SYSTEM FOR AUTOMATIC TRANSLATION OF CONFIGURATION SETTINGS BETWEEN COMPUTER SYSTEMS
US6535998B1 (en) * 1999-07-26 2003-03-18 Microsoft Corporation System recovery by restoring hardware state on non-identical systems
US6704873B1 (en) * 1999-07-30 2004-03-09 Accenture Llp Secure gateway interconnection in an e-commerce based environment
US6847984B1 (en) * 1999-12-16 2005-01-25 Livevault Corporation Systems and methods for backing up data files
US6571285B1 (en) * 1999-12-23 2003-05-27 Accenture Llp Providing an integrated service assurance environment for a network
US6615286B1 (en) * 2000-02-14 2003-09-02 Intel Corporation Method and apparatus for updating device driver control data
US20030120822A1 (en) * 2001-04-19 2003-06-26 Langrind Nicholas A. Isolated control plane addressing
JP2005502096A (en) * 2001-01-11 2005-01-20 ゼット−フォース コミュニケイションズ インコーポレイテッド File switch and exchange file system
US7062490B2 (en) * 2001-03-26 2006-06-13 Microsoft Corporation Serverless distributed file system
US6832330B1 (en) * 2001-09-05 2004-12-14 Emc Corporation Reversible mirrored restore of an enterprise level primary disk
US7225204B2 (en) * 2002-03-19 2007-05-29 Network Appliance, Inc. System and method for asynchronous mirroring of snapshots at a destination using a purgatory directory and inode mapping
US7328225B1 (en) * 2002-03-27 2008-02-05 Swsoft Holdings, Ltd. System, method and computer program product for multi-level file-sharing by concurrent users
WO2004047078A2 (en) * 2002-11-20 2004-06-03 Filesx Ltd. Fast backup storage and fast recovery of data (fbsrd)
US7337317B2 (en) * 2003-07-03 2008-02-26 Hand Held Products, Inc. Memory data copying system for devices
US20050010918A1 (en) * 2003-07-11 2005-01-13 International Business Machines Corporation Autonomic image migration/deployment appliance
US7533372B2 (en) * 2003-08-05 2009-05-12 Microsoft Corporation Cross language migration
US7454443B2 (en) * 2003-08-26 2008-11-18 Tamir Ram Method, system, and program for personal data management using content-based replication
US20050283662A1 (en) * 2004-06-21 2005-12-22 Li Yi Q Secure data backup and recovery
US7206790B2 (en) * 2004-07-13 2007-04-17 Hitachi, Ltd. Data management system
US7310711B2 (en) * 2004-10-29 2007-12-18 Hitachi Global Storage Technologies Netherlands B.V. Hard disk drive with support for atomic transactions
US8918366B2 (en) * 2005-02-07 2014-12-23 Mimosa Systems, Inc. Synthetic full copies of data and dynamic bulk-to-brick transformation
US7685175B2 (en) * 2005-08-12 2010-03-23 Michael Lee Carroll Content manager
US8433732B2 (en) * 2006-08-18 2013-04-30 Falconstor, Inc. System and method for storing data and accessing stored data
EP2078269A4 (en) 2006-10-31 2011-02-23 Rebit Inc System for automatically shadowing data and file directory structures that are recorded on a computer memory
US20080104146A1 (en) 2006-10-31 2008-05-01 Rebit, Inc. System for automatically shadowing encrypted data and file directory structures for a plurality of network-connected computers using a network-attached memory with single instance storage
US8126851B2 (en) * 2006-10-31 2012-02-28 Rebit, Inc. System for automatically recovering a computer memory using shadowed data and file directory structures

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050027845A1 (en) * 2000-01-03 2005-02-03 Peter Secor Method and system for event impact analysis
US20070136200A1 (en) * 2005-12-09 2007-06-14 Microsoft Corporation Backup broker for private, integral and affordable distributed storage

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8266105B2 (en) 2006-10-31 2012-09-11 Rebit, Inc. System for automatically replicating a customer's personalized computer system image on a new computer system
US8356174B2 (en) 2006-10-31 2013-01-15 Rebit, Inc. System for automatically shadowing encrypted data and file directory structures for a plurality of network-connected computers using a network-attached memory with single instance storage
CN108196965A (en) * 2017-12-28 2018-06-22 维沃移动通信有限公司 A kind of data processing method and device
CN108196965B (en) * 2017-12-28 2020-07-28 维沃移动通信有限公司 Data processing method and device

Also Published As

Publication number Publication date
US20080104146A1 (en) 2008-05-01
US20100174684A1 (en) 2010-07-08
US8356174B2 (en) 2013-01-15
DE112008002947T5 (en) 2010-09-02

Similar Documents

Publication Publication Date Title
US8356174B2 (en) System for automatically shadowing encrypted data and file directory structures for a plurality of network-connected computers using a network-attached memory with single instance storage
US7899789B2 (en) System for automatically shadowing data and file directory structures for a plurality of network-connected computers using a network-attached memory
US8126851B2 (en) System for automatically recovering a computer memory using shadowed data and file directory structures
US9904601B2 (en) Synchronization of storage using comparisons of fingerprints of blocks
US7650341B1 (en) Data backup/recovery
US8005797B1 (en) File-level continuous data protection with access to previous versions
US8510271B1 (en) Application and file system data virtualization from image backup
US6269381B1 (en) Method and apparatus for backing up data before updating the data and for restoring from the backups
AU700681B2 (en) A method of operating a computer system
US8433863B1 (en) Hybrid method for incremental backup of structured and unstructured files
US20060294421A1 (en) Isolating and storing configuration data for disaster recovery
US8782003B1 (en) Synchronization of storage using log files and snapshots
US20020059505A1 (en) Method and apparatus for differential backup in a computer storage system
US20070043973A1 (en) Isolating and storing configuration data for disaster recovery for operating systems providing physical storage recovery
US9043280B1 (en) System and method to repair file system metadata
US8572045B1 (en) System and method for efficiently restoring a plurality of deleted files to a file system volume
US9176825B2 (en) Granular application data lifecycle sourcing from a single backup
US8266105B2 (en) System for automatically replicating a customer's personalized computer system image on a new computer system
US20070043969A1 (en) Isolating and storing configuration data for disaster recovery for operating systems providing physical storage recovery
EP1967952B1 (en) Method and apparatus for storage backup
Beldalker et al. Oracle Database Backup and Recovery Basics 10g Release 1 (10.1) Part No. B10735-01 Copyright© 2003 Oracle Corporation. All rights reserved. Primary Author: Antonio Romero Contributing Author: Lance Ashdown
Bednar et al. Oracle Database Backup and Recovery Basics, 10g Release 2 (10.2) B14192-02
Bednar et al. Oracle Database Backup and Recovery Basics, 10g Release 2 (10.2) B14192-03

Legal Events

Date Code Title Description
DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08843701

Country of ref document: EP

Kind code of ref document: A1

RET De translation (de og part 6b)

Ref document number: 112008002947

Country of ref document: DE

Date of ref document: 20100902

Kind code of ref document: P

122 Ep: pct application non-entry in european phase

Ref document number: 08843701

Country of ref document: EP

Kind code of ref document: A1