Computing technology has transformed the way we work and play. The functionality of computing systems is dependent upon both hardware and software. Hardware includes, for example, output and input devices, processors, memory and storage devices, communication devices, power supply, cooling devices, and the like. Software, on the other hand, contains processor instructions and data, and is present in either or both of the memory and storage devices. The processor instructions are readable by the processor(s) and direct the operation of the processors to control the other hardware or perform calculations. The data is also critical as it allows the computing system to maintain state, and thereby preserve a proper context for operation.
Occasionally, it would be advantageous to enforce permissions on how data is used. For example, in a recovery environment, the data may be recovery data such as a volume image that had previously been backed up to a backup storage device. When subsequently restoring the recovery data to a computing system after a failure, it would be advantageous to determine if the restore is authorized on the computing system.
One conventional method for enforcing permissions for a computing system to use data is for the computing system to connect to an appropriate network site on the Internet, and provide appropriate credentials or other information to thereby allow the computing system to provide some security that the requested action on the data is authorized. Sometimes, those credentials are based upon the hardware environment of the computing system. However, not all computing systems are configured with an available Internet connection. Furthermore, in a recovery environment, a computing system that has been able to connect to the Internet may not be capable of accessing the Internet until further stages of the restore process. In addition, in a recovery environment, the computing system that restores the data may be different from the computing system that backed up the data. Accordingly, the hardware environment may have changed, thereby making it difficult to use a hardware imprint to validate the license to restore the data.
The foregoing problems with the prior state of the art are overcome by the principles of the present invention, which are directed towards mechanisms for enforcing permissions on stored data. Prior to storing the data, a data structure containing the data is accessed, and then modified too include a license that represents permission(s) for how the data should be used when the data structure is later accessed. The modified data structure is then stored, after perhaps some optional transformation. When the data structure is later accessed, the license is acquired from the data structure. The license is then used to determine whether or not to honor specific requests to use the data. The license may be the sole source for information used to determine whether or not to honor specific requests. In one embodiment, the data structure is a volume image, and the license relates to whether or not the data may be restored, and under what conditions and restrictions.
Additional embodiments of the invention will be set forth in the description that follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The embodiments of the invention may be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. These and other embodiments of the present invention will become more fully apparent from the following description and appended claims, or may be learned by the practice of the invention as set forth hereinafter.
In order to describe the manner in which the above-recited and other advantages and features of the invention can be obtained, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments of the invention and are not therefore to be considered to be limiting of its scope, the invention will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
The principles of the present invention relate to mechanisms for enforcing permissions on stored data. Prior to storing the data, a data structure containing the data is accessed, and then modified to include a license that represents permission(s) for how the data should be used when the data structure is later accessed. The modified data structure is then stored, after perhaps some optional transformation. When the data structure is later accessed, the license is acquired from the data structure. The license is then used to determine whether or not to honor specific requests to use the data. In one embodiment, the data structure is a volume image, and the license relates whether or not the data may be restored, and under what conditions. The determination of whether or not to honor specific requests may be made based entirely on information within the license.
First, a general computing system will be described with respect to
Computing systems are now increasingly taking a wide-variety of forms. Computing systems may, for example, be handheld devices, appliances, laptop computers, desktop computers, mainframes, or distributed computing systems. In this description and in the claims, the term “computing system” is defined broadly as including any device or system (or combination thereof) that includes at least one processor, and a memory capable of having thereon computer-executable instructions that may be executed by the processor. The memory may take any form and may depend on the nature and form of the computing system. A computing system may be distributed over a network environment and may include multiple constituent computing systems.
Referring to
As used herein, the term “module” or “component” can refer to software objects or routines that execute on the computing system. The different components, modules, engines, and services described herein may be implemented as objects or processes that execute on the computing system (e.g., as separate threads). While the system and methods described herein may be implemented in software, implementations in hardware, and in combinations of software and hardware are also possible and contemplated.
In the description that follows, embodiments of the invention are described with reference to acts that are performed by one or more computing systems. If such acts are implemented in software in the form of a computer program product, one or more processors of the associated computing system that performs the act direct the operation of the computing system in response to having executed computer-executable instructions from one or more computer-readable media. An example of such an operation involves the manipulation of data. The computer-executable instructions (and the manipulated data) may be stored in the memory 104 of the computing system 100.
Computing system 100 may also contain communication channels 108 that allow the computing system 100 to communicate with other computing systems over, for example, network 110. Communication channels 108 are examples of communications media. Communications media typically embody computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and include any information-delivery media. By way of example, and not limitation, communications media include wired media, such as wired networks and direct-wired connections, and wireless media such as acoustic, radio, infrared, and other wireless media. The term computer-readable media as used herein includes both storage media and communications media.
The method 300 optionally begins in some embodiments with a computing system (also called herein a “storing computing system”) that stores a data structure that includes data, but does not include a license (act 301). For instance, referring to
As previously mentioned, storing the data structure without the license (act 301) is only present in some embodiments of the invention. Regardless, a computing system (hereinafter referred to as a “licensing computing system”) accesses the data structure that includes the data (act 302). In this description and in the claims, “accessing” a data structure does not necessarily mean that the entire data structure is transferred from storage, but perhaps only a small portion of the data structure is accessed. Referring to
The licensing computing system 220 then modifies the data structure 212 to include a license 222 (act 303). The license 222 represents one or more permissions for how the data 213 should be used when the data structure is later accessed. The accessing 221 may be a local storage access or a remote access over a network. The storage computing system 210 and the licensing computing system 220 may be the same computing system, although not required. The licensing computing system 220 then stores (as represented by arrow 223) the modified data structure 212′ to storage 224 (act 304). Storage 224 may, but need not, be the same as storage 214.
A computing system (hereinafter also reference to the “data using computing system”) then accesses the modified data structure (act 305). For instance, referring to
The data using computing system then accesses the license from within the data structure (act 306). Referring to
Referring to
The data using computing system then evaluates the license to determine whether or not the requested action is permitted under the license (decision block 308). The software that evaluates the license may be secure so that the data using computing system only performs an action on the data if authorized under the license. Accordingly, if it is determined that the requested action is not authorized (No in decision block 308), the requested action is not performed (act 309). Otherwise, if the requested action is authorized (Yes in decision block 308), the requested action is performed (act 310).
The general principles of the present invention described and illustrated with respect to
One of the scenarios involves a backup and recovery environment. In one embodiment, the licensing computing system 220 is a client or server and the modified data structure 212′ is a volume image (or a file) having an embedded license. The storage 224 may be a backup storage that serves the client or server, as well as potentially many other computing systems as well. The data using computing system 230 may be a system to which the data is to be restored, and might not be the same as the system that backed up the data. For instance, perhaps the system that was backed up was destroyed during a disaster event. The system that is to be recovered need not even have the same hardware or even access to the Internet in order to identify permissions to recover the data. The system may simply, for example, use a CD ROM program to execute a recovery program whereby the license is evaluated, and permissions strictly honored.
For instance, removable storage media (e.g., such as a CD-ROM, disk, or the like) may contain license validation computer-executable instructions that, when executed by one or more processors of the computing system 230, cause the computing system 230 to determine what actions are licensed and/or what actions are not licensed. These computer-executable instructions and the license may be structured such that the determination of what is and/or what is not licensed is dependent only upon information within the license itself.
In that embodiment, no external information would be required. Accordingly, the computing system 230 would not require access to any external sources of information in order to evaluate the license. In a recovery environment, this permits the license to be evaluated even if the computing system 230 has not yet been restored to a state in which it can access other sources of information. For instance, perhaps the computing system 230 has not yet been restored to a point where it can access the Internet. Instead, the computing system 230 would just access and execute the license validation instructions on the removable media.
The permissions for recovery may include, for example, whether or not to allow any sort of recovery, whether or not to allow recovery on a different system than the system that backed up the data (regardless of whether or not the hardware platform is the same), whether or not to allow recovery to a system in which the hardware platform is the same, whether or not to allow recovery to multiple systems, whether or not to allow recovery of certain types of files, whether or not to allow remote recovery (in which recovery is enabled without the user being present before the computing system being restored to) and the like.
In another backup/recovery scenario, the storing computing system 210 is the system being backed up, and the licensing computing system 220 is a computing system that manages the backed up data. The licensing computing system 220 centralizes the licensing process for the storing computing system 210 as well as perhaps other computing systems. That way, the system being backed up need not have the functionality to obtain and insert a recovery license.
Accordingly, the principles of the present invention permit for a determination of whether or not to allow requested actions on data without relying upon any particular hardware configuration, or network access. This may be used in a wide-variety of environments, including a backup and recovery environment.
The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes, which come within the meaning and range of equivalency of the claims, are to be embraced within their scope.
Number | Name | Date | Kind |
---|---|---|---|
5634012 | Stefik et al. | May 1997 | A |
5638443 | Stefik et al. | Jun 1997 | A |
5715403 | Stefik | Feb 1998 | A |
5771354 | Crawford | Jun 1998 | A |
5805699 | Akiyama et al. | Sep 1998 | A |
6662284 | Gold | Dec 2003 | B2 |
6684308 | McNeil | Jan 2004 | B2 |
6920565 | Isaacson et al. | Jul 2005 | B2 |
6944734 | Anzai et al. | Sep 2005 | B2 |
7010809 | Hori et al. | Mar 2006 | B2 |
7017019 | Watanabe et al. | Mar 2006 | B2 |
7117329 | Watanabe et al. | Oct 2006 | B2 |
7249107 | Yaacovi | Jul 2007 | B2 |
7296068 | Sarma et al. | Nov 2007 | B1 |
7325247 | Kotani et al. | Jan 2008 | B2 |
7339869 | Ishibashi et al. | Mar 2008 | B2 |
7383462 | Osaki et al. | Jun 2008 | B2 |
7415115 | Ma | Aug 2008 | B2 |
7529927 | Peinado et al. | May 2009 | B2 |
7590856 | Morino et al. | Sep 2009 | B2 |
20010008016 | Kotani et al. | Jul 2001 | A1 |
20010020241 | Kawamoto et al. | Sep 2001 | A1 |
20010037357 | Anzai et al. | Nov 2001 | A1 |
20020116589 | Gold | Aug 2002 | A1 |
20020131594 | Hori et al. | Sep 2002 | A1 |
20020136405 | Hori | Sep 2002 | A1 |
20020188704 | Gold et al. | Dec 2002 | A1 |
20020196940 | Isaacson et al. | Dec 2002 | A1 |
20030028592 | Ooho et al. | Feb 2003 | A1 |
20030061136 | Inoue | Mar 2003 | A1 |
20030161064 | Hori et al. | Aug 2003 | A1 |
20030172035 | Cronce et al. | Sep 2003 | A1 |
20030177379 | Hori et al. | Sep 2003 | A1 |
20040103257 | Watanabe et al. | May 2004 | A1 |
20040143818 | Kijima et al. | Jul 2004 | A1 |
20040196759 | Ishibashi et al. | Oct 2004 | A1 |
20040215644 | Edwards et al. | Oct 2004 | A1 |
20040215909 | Imai et al. | Oct 2004 | A1 |
20040228493 | Ma | Nov 2004 | A1 |
20040230817 | Ma | Nov 2004 | A1 |
20040236588 | Millard et al. | Nov 2004 | A1 |
20050071590 | Watanabe et al. | Mar 2005 | A1 |
20050099612 | Kirovski | May 2005 | A1 |
20050154907 | Han et al. | Jul 2005 | A1 |
20050160044 | Hori et al. | Jul 2005 | A1 |
20050182732 | Miller et al. | Aug 2005 | A1 |
20050241002 | Ueda | Oct 2005 | A1 |
20060005048 | Osaki et al. | Jan 2006 | A1 |
20060041421 | Ta et al. | Feb 2006 | A1 |
20060059103 | Ebihara et al. | Mar 2006 | A1 |
20060085792 | Traut | Apr 2006 | A1 |
20060164258 | Garibotto et al. | Jul 2006 | A1 |
20060168580 | Harada et al. | Jul 2006 | A1 |
20060179327 | Musa et al. | Aug 2006 | A1 |
20060287961 | Mori et al. | Dec 2006 | A1 |
20070061528 | Shibata et al. | Mar 2007 | A1 |
20070174606 | Nakano et al. | Jul 2007 | A1 |
20070223705 | Kasahara et al. | Sep 2007 | A1 |
20080052536 | Shimizu et al. | Feb 2008 | A1 |
20080260155 | Kasahara et al. | Oct 2008 | A1 |