1. Field of the Invention
The present invention relates generally to performing data backup operations across a computer network.
2. Description of the Prior Art
The creation and value of personal digital content is dramatically increasing as people acquire new digital devices. In private households and in businesses, there are increasingly large collections of digital data. Digital photos stored on a PC have replaced shoeboxes full of family photos. Moving Picture Experts Group Audio Layer 3 (MP3) music collections have displaced shelves of Compact Discs (CDs) or vinyl records. Digital video and Personal Video Recorder (PVR)-recorded television are poised to replace videotape collections. The devices generating the digital files have become more sophisticated and therefore the resultant data file sizes have become significantly larger. The amount of digital data that people have has risen dramatically in recent years and, with this rise, there has been an attendant increase in the need for simple data backup.
The revolution in digital data has swept through faster than backup options have been able to mature. Personal Computer (PC) storage has notorious vulnerabilities. Almost everyone who owns a PC has experienced the loss of data.
Existing backup solutions, developed mostly for the corporate market, are expensive, bulky and overly complicated. For an everyday consumer the electronic data backup process is not easy and not everyone is technically savvy enough to use the current backup products. A need exists for an extremely simple, fully automated, and affordable backup appliance for digital data. Considering the impact of possibly losing irreplaceable family photos and documents due to computer failures, virus, theft or disasters, a user may want to have a copy of personal electronic data files in another device or location. Storing data with an online service provider is one option to have data redundancy or having a central device connected to the local area network is another option.
Thus one strategy for data backup is to use online data storage backup services offered by companies offering remote data storage facilities. In this way, instead of making copies of data locally, a user can opt to have the backed up data stored on a remote server using the interact for file transfer. Typically the user is required to sign up with a service provider and pay a monthly fee for storage of the backed up data or to obtain a copy of the backed up data for purposes of restoring lost or damaged data. It also requires having to install the provider's software and high speed internet connectivity to facilitate the rapid transfer of files. These services typically charge monthly or yearly fees based on the amount of data being backed up. While there are advantages to the online remote backup since the servers are located away from the home with lower risk of losing data to theft or disaster, such services can be a very expensive option for large amounts of data.
In a case where a user has multiple computers and wants to back them up there are some ways, though none that are very convenient. One example is having an external hard drive based backup device that connects to the computer via a Universal Serial Bus (USB) port and may have backup software on the backup drive itself. Thus a user can connect the backup device to the computer and it will be backed up to the device. But in the case of multiple computers the user is required to carry out this process with each of the computers one after the other. Thus if a user forgets to connect the backup device to a particular computer for an extended duration and the computer fails the data that was created during this period is lost.
Alternatively, a user may want to backup all data from different computers in an office or home to one central but local device so that data can be uniformly accessed from any computer. Typically a Network Attached Storage (NAS) fills this role by being plugged into the Ethernet port of the router of a local area network. A traditional NAS device is relatively expensive and requires complicated configuration. Further, it requires that the accompanying software be installed on each of the computers connected to the local area network (LAN) that need to be backed up.
A NAS unit is essentially a self-contained stripped down computer connected to a network, with the sole purpose of providing data storage services to other devices on the network. NAS units usually do not have a keyboard or display, and are controlled and configured over the network, often by connecting via an internet browser to their network (IP) address. A general-purpose operating system is not needed on a NAS device, and often minimal-functionality or stripped-down operating systems are used instead.
The NAS contains a network card with an Ethernet port which allows it to be connected to an Ethernet port of a router. A NAS maintains its own Internet Protocol (IP) address comparable to a computer and other Transmission Control Protocol/Internet Protocol (TCP/IP) devices. Using a software program that normally is provided together with the NAS hardware, a user can set up automatic or manual backups and file copies between the NAS and other network connected computers.
Additionally the software installed on each computer to be backed up needs to be manually configured in terms of specifying where the data to be backed up is located, what data is to be backed up and how often to backup the data.
What is needed therefore is a simplified data backup solution that can backup one or more the computers without requiring all the cost, complexity and user input of known solutions.
In one example is a system for backing up network connected data sources, the system comprising: a backup device containing a data storage area and a communications interface for connection to a first data source of the network connected data sources; a computer readable medium containing program code executable by a processor to perform without user input the steps of: configuring the first data source for communication across the network with a second data source of the network connected data sources; performing a backup of the first data source by storing data to be backed up from the first data source to the backup device; performing a backup of the second data source by: establishing communication across the network between the first data source and the second data source; receiving at the first data source from the second data source across the established communication data to be backed up from the second data source; and storing to the backup device the received data to be backed up from the second data source.
In another example is a method of backing up network connected data sources, the method comprising: automatically and without user input launching and installing software from a backup device to a first data source of the network connected data sources upon detection of connection of the backup device to the first data source, the installed software configured to automatically and without user input perform the steps of: configuring the first data source for network backup communications; performing a backup of data from the first data source to the backup device connected to the first data source; establishing communication across the network between the first data source and a second data source of the network connected data sources, the software from the backup device having previously been automatically and without user input launched and installed on the second data source; performing a backup of data from the second data source to the backup device by: receiving at the first data source from the second data source across the established communication data to be backed up from the second data source; and storing to the backup device the received data to be backed up from the second data source.
In still another example is a method of backing up data to a backup device from a first and a second network connected data source, the method comprising: automatically launching and installing on the first data source backup software from the backup device in response to detection of the backup device being connected to the first data source; backing up data from the first data source to the backup device connected to the first data source using the backup software; automatically launching and installing on the second data source backup software from the backup device in response to detection of the backup device being connected to the second data source; backing up data from the second data source to the backup device connected to the second data source using the backup software; establishing communication across the network between the first data source and the second data source; backing up data from the first data source to the backup device connected to the second data source using the backup software.
A system and method is provided for automatically backing up one or more computers across a network to a backup device coupled to the network through a computer connected to the network with little or no user input required.
In one embodiment, the backup device is a memory device and associated hardware containing software that will both perform a backup of data on a data source to which the memory device is connected and also communicate across a network with other data sources to perform a backup of data from those other data sources. The software can be launched automatically via an optional emulation component contained within the memory device as described in U.S. Pat. No. 7,818,160 which is incorporated by reference herein in its entirety. Alternatively, the software can be included on a portion of the memory device to be manually launched by a user of the device. In another alternative, the software can be included on a non-transitory computer readable medium such as an optical disc which may be, e.g., a Compact Disc Read Only Memory (CD-ROM) or a Digital Versatile Disc (DVD), that is physically separate from the memory device itself but that will launch when the CD-ROM is inserted into a player of a data source. In another alternative, the software can be downloaded from another computer such as a web server accessible across a network such as the internet. But regardless of implementation and whether the software will be automatically launched or will require some user involvement, the backup device of the present invention can still perform the functionalities of installation and configuration, as well as performing the backup operation itself, in an automated fashion thus eliminating the need for user input to accomplish such functionality.
It is to be understood that, in the present specification, launching software is the process of initiating the running of some executable program code, one previously existing example of which occurs when a user double-clicks on an “.exe” file to begin the program code execution (and it is to be further understood that launching herein does not refer to merely starting the running of some program code already installed on a data source). Launching is in contrast to, again in the context of the present specification, installation and configuration, which are the processes of placing executable code onto a data source for the purposes of execution which typically involves providing information about the program code to an operating system of the data source, etc., and making various settings and programmatic changes to enable the intended operation of the executable code within the data source.
In one embodiment the backup device preferably has a memory device, e.g., a hard drive that has more than one partition on it. One partition is formatted like a CD-ROM and emulates an autorun device. The other partition is used for data backup. Thus when the backup device is connected to a data source the data source enumerates two separate devices; a CD-ROM and a hard drive. The CD-ROM partition contains the software and an autorun.inf file. When the backup device is connected to the data source it reads the autrun.inf file and launches the software to which the autorun.inf file points.
Using the backup device with the emulation component as an exemplary embodiment, a user connects the backup device to a networked connected data source which triggers the launch, installation and configuration of software on the first data source thereby performing a backup operation of data from the first data source to the backup device. To elaborate, the software is launched on the first data source automatically due to the emulation component thus causing the software to be automatically installed on the first data source which results in the software being ready to perform a backup of the first data source and also causes the software (and portions of the first data source as described elsewhere herein) to be configured for communication across the network as needed. Again, this results in the software performing a backup operation of data from the first data source to the backup device.
The user then connects the backup device to a second network connected data source which triggers the launch, installation and configuration of software on the second data source thereby performing a backup operation of data from the second data source to the backup device. Furthermore, as explained further elsewhere herein, the software installed on the second data source triggers a (typically incremental but could be a full) backup of data from the first data source across the network through the second data source to the backup device.
This is repeated for each network connected data source the user connects to the backup device to thereby be backed up. Additional backups of these various network connected data sources can also be performed and further, the backup device may be reconnected to any one of the network connected data sources for further backups of the various network connected data sources.
In the figure are shown communications between three data sources DS1, DS2 and DS3 connected to a local area network. The backup device is physically connected to DS1 thus making DS1 a local data source. Using UDP the software running on DS1 periodically sends a broadcast message consisting of three parts “I am alive+backup device location+status.” Thus, in this example, the datagram message 301 of “alive/DS1/free” is communicating that the backup device is “alive,” that it is connected to “DS1” and that the backup device (and associated software) is “free” meaning that it is available for use by other data sources. This datagram message 301 is broadcast across the network from DS1 and is therefore received by both DS2 and DS3 as shown in the figure. In response to this datagram message, in this example 303, DS2 responds to DS1 using TCP with a request to use the backup device. DS1 then responds back to DS2 using TCP with a communication that the backup “device is yours.” DS2 then responds back to DS1 to perform a backup process by sending data to DS1 to be stored on the backup device connected to DS1.
Periodically, e.g., at 305 and 309 in the figure, DS1 sends a UDP datagram message of “alive/DS1/busy” across the network thus communicating that the backup device is “alive,” is connected to data source “DS1,” but that it is “busy” performing a backup operation for some data source. Because this datagram message 309 is broadcast across the network from DS1 it is therefore received by both DS2 and DS3 as shown in the figure.
Periodically, e.g., at 307 in the figure, DS1 sends a TCP message to DS2 asking whether it is “finished” doing a backup to the backup device connected to DS1. In this example, DS2 replies with a TCP message that “no” it is not yet finished.
This sequence of UDP datagram messages and TCP message are repeated until, as shown in the figure at 311, at some point DS1 sends to DS2 the TCP message asking whether it is “finished” doing the backup and DS2 replies with a TCP message that “yes” it is finished. It is at this point 313 that DS1 once again sends out a UDP datagram message of “alive/DS1/free” across the network to be received by any other network connected data sources running the software.
In the example shown in the figure at 315, DS1 then receives a TCP message from DS3 with a request to use the backup device connected to DS1. DS1 then responds back to DS3 using TCP with a communication that the backup “device is yours.” DS3 then responds back to DS1 to perform a backup process by sending data to DS1 to be stored on the backup device connected to DS1.
As with the sequence described regarding DS2, once the backup of DS3 is complete as shown in the figure at 319, DS1 sends a UDP broadcast datagram “alive/DS1/free” as shown at 321.
This sequence can continue until all network connected data sources having the software previously installed have been backed up or the backup device is disconnected from DS1 or DS1 is shut down. Note that the backup device can also be connected to any other data source connected to the network and the described process can be repeated with the newly connected data source acting as the local data source.
Referring now to
As part of the configuration the software running on the local data source checks, in step 403, to see if the “Files and Folder Sharing” feature is enabled. “File and Folder Sharing” is a feature that is offered in Microsoft Windows operating systems that allows users with multiple computers connected through a local area network to share files amongst the computers. Such functionality means one no longer has to copy files to a removable disk or a USB flash drive to transfer them from one computer to another and the files can be opened from other computers connected to the network. If “Files and Folder Sharing” is not enabled then the software turns on this feature in step 405.
Various additional steps are performed in some embodiments. For example, if wireless connectivity is running on the data source then the software can be added to an exception list within a set of rules for the wireless connectivity thus allowing the software to intemperate wirelessly. As another example, if certain needed services (e.g., Computer Browser Service, Workstation Service, Server Service and TCP/IP Netbios) are not currently running then they will be started by the software.
Once “Files and Folder Sharing” is enabled, in step 407, the software running on the local data source causes the backup device to be mapped and added as a shared drive to the local data source.
In step 409, the software running on the local data source broadcasts the location of the backup device across the network to any remote data source connected to the network. Using the software installed and running on them, remote data sources, where the software of the invention is installed but the backup device is not directly connected, pick up the location broadcast message (using what may be called a “listener” process) and map the backup device location on the local data source as a shared drive in step 411. The backup process of the software running on the remote data sources can then be invoked on these remote data sources and the data from these remote Data Sources can be backed up to the backup device connected to the local data source over the local area network (LAN) in step 413.
Referring now to
As part of the configuration the software running on the local data source creates a new user on the local data source with the “Files and Folder Sharing” feature enabled in step 503. This approach can be used in lieu of the approach of
Once “Files and Folder Sharing” is enabled, the software running on the local data source causes the backup device to be mapped and added as a shared drive to the local data source in step 505.
In step 507, the software running on the local data source broadcasts the location of the backup device as well as the newly created user credentials across the network to any remote data source connected to the network. Using the software installed and running on them, remote data sources, where the software of the invention is installed but the backup device is not directly connected, pick up the broadcast message (using a listener process) and map the backup device location on the local data source as a shared drive in step 509. The backup process of the software running on the remote data sources can then be invoked on these remote data sources so the remote data sources can connect to the local data source using the received newly created user credentials in step 511. Then the data from these remote data sources can be backed up to the backup device connected to the local data source over the local area network (LAN) in step 513.
Referring now to
In step 605, the software on a remote data source receives the broadcast message via the listener process included in the software on each data source thus causing it to invoke a backup process on the remote data source.
In step 607, the backup process on the remote data source identifies the files to be backed up.
In step 609, the software on the remote data source establishes a socket connection with the local data source via the P2P client included in the software on each data source.
in step 611 the software on the remote data source sends the files identified to be backed up across the network to the local data source using the socket connection so the files can be stored on the backup device connected to the local data source.
The approach of
It is to be understood that the approaches described with reference to
In another embodiment the backup starts immediately after a large file or a user designated file is saved on a data source. In yet another embodiment, the backup starts immediately after a configurable number of files have been saved on a data source. In another embodiment the backup starts after the saved data on a data source reaches a certain user configurable size (e.g., 100 MB).
In one embodiment, the files are backed up based on a schedule either pre-configured in the software by the manufacturer or user configurable. In one embodiment of the invention, the user can schedule a backup time for either one or all data sources, and they are backed up as per the schedule set by the user. If a backup schedule window is missed the backup can then be performed when the backup device is reconnected to a data source and broadcasts its location across the network.
In one embodiment, the backup from the data sources connected to the local area network to the backup device is a continuous backup process. In such a scenario, the files are backed to the backup device essentially as soon as they are changed or saved on the data source.
In one embodiment the user can initiate the backup process for any Data Source connected to the local area network by using a graphical user interface of the software.
In one embodiment, the backup is performed essentially immediately when the backup device of the invention is connected to any of the data sources attached to the local area network.
In one embodiment, the backup is performed in a sequence, e.g., the local data source to which the backup device is attached is backed up first and then any remote data sources are backed up. In an alternative embodiment, the opposite sequence is performed. In a still further embodiment, the local data source is backed up while any remote data sources are backed up.
In one embodiment, the software that is automatically launched from the backup device preferably backs up the data source upon connection. The software also has the intelligence to selectively search the data source for digital files based on a certain criteria, e.g., by file extension. Once selective files have been identified, with or without any user modifications to the selections as may be accomplished via a Graphical User Interface (GUI), the software is also responsible for transmitting these over the local area network to the local data source to which the backup device is connected to thereby be backed up. Thus the software preferably may have a pre-defined list of most prevalent file extensions of data files built-in (included by the manufacturer) and optionally the user may choose to add to this list preferably using a GUI.
In the Microsoft Windows Vista operating system (OS) unlike earlier versions of Microsoft's OSs (e.g., Windows XP, Windows 2000 etc.), a larger number of external and internal devices can use the native AutoRun functionality of the operating system. Up to Microsoft Windows XP, a CD-ROM and a Floppy Drive were the only two devices which were allowed by the OS to execute the AutoRun functionality and devices like external hard drives and USB Flash Drives were unable to make use of this functionality and had to “emulate” as a CD-ROM or a Floppy Drive to “fool” the earlier Microsoft Windows operating systems into thinking that an AutoRun enabled device (e.g. a CD-ROM) had been connected to it.
With Microsoft Windows Vista any external device that reports itself as a “removable” device can take advantage of the AutoRun functionality. Thus in one embodiment, to take advantage of this feature in Microsoft Windows Vista, the backup device reports itself as a “removable” device, triggering the AutoRun functionality which launches the software application initiating the extraction of the digital files from the Data Source to the VNAS device for backup.
The data source as referred to herein, especially in the described embodiments, is typically a personal computer with a set of electronic data files to be backed-up. However, such data source is not limited to the examples cited here and could be a home personal computer (PC), corporate PC, a server, a laptop, a set-top box, an Apple Macintosh computer, a cellular phone, a smartphone, a personal digital assistant (PDA), a personal video recorder (PVR), etc., running any number of different operating systems as diverse as the Microsoft Windows family, the Apple Macintosh Operating System (MacOS), any variation of Linux or Unix, Palm Computing Operating System (PalmOS), or such operating systems used for such devices available in the market today or the ones that will become available as a result of the advancements made in such industries.
The examples noted here are only for illustrative purposes and there may be further embodiments possible with a different set of components. While several embodiments are described, there is no intent to limit the disclosure to the embodiment or embodiments disclosed herein. On the contrary, the intent is to cover all alternatives, modifications, and equivalents obvious to the ones familiar with the art.
In one embodiment, the user flagged files are backed up before others files. Thus all user flagged files from all data sources are backed up before all other files are backed up. There may be combinations of the above embodiments, and the invention is not limited to any one of those, but the intent is to covers all combinations that are apparent to the ones skilled in the art.
In the foregoing specification, the invention is described with reference to specific embodiments thereof, but those skilled in the art will recognize that the invention is not limited thereto. Various features and aspects of the above-described invention may be used individually or jointly. Further, the invention can be utilized in any number of environments and applications beyond those described herein without departing from the broader spirit and scope of the specification. The specification and drawings are, accordingly, to be regarded as illustrative rather than restrictive. It will be recognized that the terms “comprising,” “including,” and “having,” as used herein, are specifically intended to be read as open-ended terms of art.
This application claims the benefit of U.S. Provisional Patent Application No. 61/337,435 filed on Feb. 4, 2010 and entitled “Method and a System for a Virtual Network Attached Storage Device,” which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5212784 | Sparks | May 1993 | A |
5666215 | Fredlund et al. | Sep 1997 | A |
5835759 | Moore et al. | Nov 1998 | A |
5959280 | Kamitami | Sep 1999 | A |
5960411 | Hartman et al. | Sep 1999 | A |
6119153 | Dujari et al. | Sep 2000 | A |
6131148 | West | Oct 2000 | A |
6282710 | Boehler | Aug 2001 | B1 |
6401214 | Li | Jun 2002 | B1 |
6405362 | Shih et al. | Jun 2002 | B1 |
6411943 | Crawford | Jun 2002 | B1 |
6469967 | Mau | Oct 2002 | B1 |
6473794 | Guheen | Oct 2002 | B1 |
6477575 | Koeppel et al. | Nov 2002 | B1 |
6487558 | Hitchcock | Nov 2002 | B1 |
6488581 | Stockdale | Dec 2002 | B1 |
6496979 | Chen et al. | Dec 2002 | B1 |
6505236 | Pollack | Jan 2003 | B1 |
6529992 | Thomas | Mar 2003 | B1 |
6567273 | Liu | May 2003 | B1 |
6588662 | Hu | Jul 2003 | B1 |
6603676 | Kitagawa | Aug 2003 | B2 |
6606644 | Ford et al. | Aug 2003 | B1 |
6609173 | Watkins | Aug 2003 | B1 |
6611850 | Shen | Aug 2003 | B1 |
6654797 | Kamper | Nov 2003 | B1 |
6684229 | Luong et al. | Jan 2004 | B1 |
6701456 | Biessener | Mar 2004 | B1 |
6731536 | McClain et al. | May 2004 | B1 |
6751681 | Torii et al. | Jun 2004 | B2 |
6813682 | Bress et al. | Nov 2004 | B2 |
6813725 | Hanes | Nov 2004 | B1 |
6832107 | Mashiko | Dec 2004 | B2 |
6839721 | Schwols | Jan 2005 | B2 |
6845464 | Gold | Jan 2005 | B2 |
6856425 | Ozawa et al. | Feb 2005 | B2 |
6868227 | Luman | Mar 2005 | B2 |
6876461 | Usami | Apr 2005 | B2 |
6879988 | Basin et al. | Apr 2005 | B2 |
6889376 | Barritz | May 2005 | B1 |
6898517 | Froeberg | May 2005 | B1 |
6901493 | Maffezzoni | May 2005 | B1 |
6943681 | Rezvani et al. | Sep 2005 | B2 |
6976253 | Wierman et al. | Dec 2005 | B1 |
6985248 | Parulski et al. | Jan 2006 | B2 |
6986030 | Shmueli et al. | Jan 2006 | B2 |
6993760 | Peev et al. | Jan 2006 | B2 |
7017155 | Peev et al. | Mar 2006 | B2 |
7024529 | Yamada | Apr 2006 | B2 |
7054260 | Rilum et al. | May 2006 | B2 |
7054594 | Bloch et al. | May 2006 | B2 |
7095519 | Stewart | Aug 2006 | B1 |
7111121 | Oishi et al. | Sep 2006 | B2 |
7136288 | Hoogerdijk | Nov 2006 | B2 |
7137034 | Largman | Nov 2006 | B2 |
7162500 | Iguchi | Jan 2007 | B2 |
7165082 | DeVos | Jan 2007 | B1 |
7200546 | Nourmohamadian | Apr 2007 | B1 |
7207033 | Kung | Apr 2007 | B2 |
7213766 | Ryan et al. | May 2007 | B2 |
7266668 | Hartung | Sep 2007 | B2 |
7302538 | Liu | Nov 2007 | B2 |
7305577 | Zhang | Dec 2007 | B2 |
7308528 | Kitamura | Dec 2007 | B2 |
7330997 | Odom | Feb 2008 | B1 |
7334226 | Ramachandran et al. | Feb 2008 | B2 |
7363510 | Bobrow | Apr 2008 | B2 |
7401194 | Jewell | Jul 2008 | B2 |
7461144 | Beloussov | Dec 2008 | B1 |
7519767 | Slater | Apr 2009 | B2 |
7558928 | DeVos | Jul 2009 | B1 |
7606946 | Kobayashi et al. | Oct 2009 | B2 |
7739429 | Shih | Jun 2010 | B2 |
7761456 | Cram et al. | Jul 2010 | B1 |
7818160 | Collins et al. | Oct 2010 | B2 |
20010047389 | Prahlad et al. | Nov 2001 | A1 |
20010056425 | Richard | Dec 2001 | A1 |
20020023198 | Kokubun et al. | Feb 2002 | A1 |
20020026575 | Wheeler et al. | Feb 2002 | A1 |
20020036850 | Lenny et al. | Mar 2002 | A1 |
20020064111 | Horie | May 2002 | A1 |
20020112171 | Ginter et al. | Aug 2002 | A1 |
20020162009 | Shmueli et al. | Oct 2002 | A1 |
20020184115 | Mueller et al. | Dec 2002 | A1 |
20020184459 | Taussig et al. | Dec 2002 | A1 |
20020184559 | Qin et al. | Dec 2002 | A1 |
20020188566 | Inchalik et al. | Dec 2002 | A1 |
20020191788 | Inchalik et al. | Dec 2002 | A1 |
20020196729 | Fairman et al. | Dec 2002 | A1 |
20020196940 | Isaacson et al. | Dec 2002 | A1 |
20030011809 | Suzuki et al. | Jan 2003 | A1 |
20030048735 | Sawada et al. | Mar 2003 | A1 |
20030050940 | Robinson | Mar 2003 | A1 |
20030058763 | Noda | Mar 2003 | A1 |
20030069750 | Siegel et al. | Apr 2003 | A1 |
20030074529 | Crohas | Apr 2003 | A1 |
20030105643 | Chen et al. | Jun 2003 | A1 |
20030120740 | Beeman et al. | Jun 2003 | A1 |
20030149662 | Shore | Aug 2003 | A1 |
20030156341 | Ito | Aug 2003 | A1 |
20030163610 | Stevens | Aug 2003 | A1 |
20030182471 | Harris et al. | Sep 2003 | A1 |
20030190137 | Pesce | Oct 2003 | A1 |
20030195737 | Shapiro et al. | Oct 2003 | A1 |
20030225971 | Oishi et al. | Dec 2003 | A1 |
20030233525 | Reeves | Dec 2003 | A1 |
20040008209 | Adams et al. | Jan 2004 | A1 |
20040044863 | Trimmer et al. | Mar 2004 | A1 |
20040078514 | Kung et al. | Apr 2004 | A1 |
20040083473 | Thomas et al. | Apr 2004 | A1 |
20040088456 | Zhang | May 2004 | A1 |
20040145988 | Watanabe | Jul 2004 | A1 |
20040153614 | Bitner et al. | Aug 2004 | A1 |
20040167941 | Prahlad et al. | Aug 2004 | A1 |
20040172427 | Thomas et al. | Sep 2004 | A1 |
20040172489 | Shikada | Sep 2004 | A1 |
20040184174 | Woo | Sep 2004 | A1 |
20040193744 | Paley | Sep 2004 | A1 |
20040199600 | Dorundo et al. | Oct 2004 | A1 |
20040230653 | Liao | Nov 2004 | A1 |
20040230863 | Buchhorn | Nov 2004 | A1 |
20040243745 | Bolt | Dec 2004 | A1 |
20050010835 | Childs et al. | Jan 2005 | A1 |
20050015536 | Lee | Jan 2005 | A1 |
20050015559 | Shen et al. | Jan 2005 | A1 |
20050021880 | Robbin et al. | Jan 2005 | A1 |
20050027956 | Tomasov et al. | Feb 2005 | A1 |
20050033911 | Kitamura et al. | Feb 2005 | A1 |
20050052548 | Delaney | Mar 2005 | A1 |
20050060356 | Saika | Mar 2005 | A1 |
20050071524 | Liu et al. | Mar 2005 | A1 |
20050080973 | Lee | Apr 2005 | A1 |
20050081006 | Shackelford et al. | Apr 2005 | A1 |
20050083741 | Chang et al. | Apr 2005 | A1 |
20050086326 | Manning et al. | Apr 2005 | A1 |
20050114450 | DeVos | May 2005 | A1 |
20050157315 | Kato | Jul 2005 | A1 |
20050157603 | Tseng | Jul 2005 | A1 |
20050174676 | Lin | Aug 2005 | A1 |
20050182872 | Shih | Aug 2005 | A1 |
20050193389 | Murphy et al. | Sep 2005 | A1 |
20050213146 | Parulski | Sep 2005 | A1 |
20050216746 | Saika | Sep 2005 | A1 |
20050216794 | Yagawa | Sep 2005 | A1 |
20050226059 | Kavuri et al. | Oct 2005 | A1 |
20050228836 | Bacastow et al. | Oct 2005 | A1 |
20050245249 | Wierman et al. | Nov 2005 | A1 |
20050246583 | Robinson | Nov 2005 | A1 |
20050253554 | DiFazio et al. | Nov 2005 | A1 |
20050268339 | Bobrow | Dec 2005 | A1 |
20050278432 | Feinleib et al. | Dec 2005 | A1 |
20060010078 | Rezvani et al. | Jan 2006 | A1 |
20060031289 | Experton | Feb 2006 | A1 |
20060036553 | Gupta et al. | Feb 2006 | A1 |
20060041639 | Lamkin et al. | Feb 2006 | A1 |
20060059308 | Uratani et al. | Mar 2006 | A1 |
20060069921 | Camaisa et al. | Mar 2006 | A1 |
20060075293 | Bodlaender | Apr 2006 | A1 |
20060080521 | Barr et al. | Apr 2006 | A1 |
20060101191 | Pinson | May 2006 | A1 |
20060123189 | Bitner et al. | Jun 2006 | A1 |
20060143376 | Matze et al. | Jun 2006 | A1 |
20060161635 | Lamkin et al. | Jul 2006 | A1 |
20060161802 | Wang et al. | Jul 2006 | A1 |
20060164891 | Mills | Jul 2006 | A1 |
20060179448 | Smith et al. | Aug 2006 | A1 |
20060190722 | Sharma et al. | Aug 2006 | A1 |
20060198202 | Erez | Sep 2006 | A1 |
20060200623 | Gonzalez et al. | Sep 2006 | A1 |
20060218435 | van Ingen et al. | Sep 2006 | A1 |
20060224846 | Amarendran et al. | Oct 2006 | A1 |
20070006017 | Thompson et al. | Jan 2007 | A1 |
20070043888 | Suzuki et al. | Feb 2007 | A1 |
20070043898 | Suzuki et al. | Feb 2007 | A1 |
20070043973 | Schneider | Feb 2007 | A1 |
20070083354 | Collins et al. | Apr 2007 | A1 |
20070179955 | Croft et al. | Aug 2007 | A1 |
20070214332 | Sonoda et al. | Sep 2007 | A1 |
20070250655 | Ferchau et al. | Oct 2007 | A1 |
20080133827 | Topham et al. | Jun 2008 | A1 |
20080215873 | Bobrow | Sep 2008 | A1 |
Number | Date | Country |
---|---|---|
1168322 | Jan 2002 | EP |
1233409 | Aug 2002 | EP |
1717697 | Nov 2006 | EP |
0019294 | Apr 2000 | WO |
0127768 | Apr 2001 | WO |
0184265 | Nov 2001 | WO |
0218009 | Mar 2002 | WO |
0239231 | May 2002 | WO |
030314933 | Feb 2003 | WO |
03048944 | Jun 2003 | WO |
2004067286 | Aug 2004 | WO |
2005086002 | Sep 2005 | WO |
2007041849 | Apr 2007 | WO |
2007041850 | Apr 2007 | WO |
Entry |
---|
http://web.archive.org/web/20050125085304/http://www.bjorn3d.com/read.php?cID=748, p. 2, Jan. 25, 2005. |
Brown, Christopher L. T., “Analysis of the ATA Protected Area,” technical white paper, TechPathways LLC, www.techpathways.com, 2002. |
Brown University, “Image File Format,” www.archive.org, http://web.archive.org/web/20060622060840/http://cs.brown.edu/stc/summer/workshop/summer—formats.html, pp. 1-2. |
Clark, Scott, “U3—Official portable USB apps platform,” Everything USB website via archive.org, www.everythingusb.com/u3.html, pp. 1-5, Oct. 13, 2005. |
CNET.com, “Lapback 1.9.8,” Sep. 3, 2005. |
Consumer Report, “Backup drives essential but underused,” pp. 30-31, Sep. 2006. |
Duryee, Tricia, “Store your digital content on a hard drive in the sky,” Tech Monday, San Jose Mercury News, pp. 5E, Jul. 4, 2006. |
Evans, Mark, “Hard drive self-tests,” Quantum Corporation, T10/99-179 rev 0, Apr. 26, 1999. |
Group Fetch, “Mailbox fetch,” http://www.groupfetch.com, 2006. |
IBM, “Automatic tape backup of customer's critical direct access storage device areas,” IBM Technical Disclosure Bulletin, 39(12):37-38, Dec. 1, 1996. |
InboxRULES, “Save message,” Ornic USA, LLC, 1996-2007. |
Mira.com, “Frequently asked questions about Mira,” mira.com and archive.org, http://web.archive.org/ web/20050206184942/www.mira.com/product/file—backup—guide.html, pp. 1-5, Feb. 2005. |
Mira.com. “Why Mira is different . . . and better,” mira.com and archive.org, http://web.archive.org/web/20050206192005/www.mira.com/product/why—mira—is—different.html, p. 5, Feb. 2005. |
Musselwhite, Dr. Caroline et al., “AAC Intervention,” http://www.aacintervention.com/tipfive.html, pp. 1-3, 2005. |
Musselwhite, Dr. Caroline et al., “About graphics/digital images,” AACIntervention, pp. 1-6. |
Microsoft, “Outlook, Outlook Express, and Windows mail attachment tools . . . ,” Outlook attachment and picture extractor, http://www.OPE2000.com, 2006. |
Parvaneh, Marc K., “CD-ROMtm Overview & Implementations,” ODC White Paper, Optical Disc Corporation. |
PCMag, “U3 Preview,” Sep. 21, 2005. |
Wong, Nicole, “One key stroke saves your data,” First Look, Tech Insider, San Jose Mercury News, pp. 2E, Apr. 2, 2007. |
Rothman, Wilson, “Now it's easy to back up data on a network,” The New York Times, http://nytimes.com, Mar. 30, 2006. |
Seagate, “Enhanced drive self-test—winning the war against unnecessary drive returns,” Executive Summary, Personal Storage Product Marketing, No. TP-302.1, Jun. 2000. |
NSoftware, “Attachment extractor for Outlook Express v. 1.5,” 2003-2008 NSoftware. |
Software Central, “Lapback U3,” 2005. |
Takahashi, Dean, “Backup drive fits in a pocket,” First Look, Tech Insider, San Jose Mercury News, pp. 2E, Jun. 4, 2007. |
TurnKey Technology Solutions, http://www.turnkeytechnology.biz/, Apr. 10, 2007. |
U3, “U3 Smart Drive Computing Platform,” Jun. 2005. |
Wikipedia, “Audio file format,” http://www.wikipedia.org, p. 1-4, Jul. 29, 2006. |
Wikipedia, “Image file formats,” http://www.wikipedia.org, p. 1-5, Jul. 13, 2006. |
Wikipedia, “MPEG4 part 14,” http://www.wikipedia.org. p. 1-3, Jun. 5, 2006. |
Number | Date | Country | |
---|---|---|---|
20110191769 A1 | Aug 2011 | US |
Number | Date | Country | |
---|---|---|---|
61337435 | Feb 2010 | US |