Preferred embodiments of the present invention are subsequently described by referring to the enclosed drawings, where:
The backup storage locations can be identified using any available protocol such as, for example, SMB, HTTP, FTP, NFS, or any other standard or non-standard protocol capable of communicating with storage devices or storage locations. After the scanning step, numerous possible backup storage locations are known to the method, from which appropriate storage locations are finally chosen to be used for backup, depending on a security level parameter.
To this end, the security level parameter is associated with one or more backup storage locations according to a security association rule, indicating selected backup storage locations for a backup strategy with a security level indicated by the associated security level parameter. That is, according to the security demands, backup storage locations used in the backup procedure are automatically selected, i.e. the security level parameter is associated with one or more backup storage locations previously identified in scanning step 2.
According to the method detailed in
To increase the safety of the backup even further, further embodiments of the present invention associate the security level parameter to different available backup-options. In further embodiments of the invention, the security level parameter decides about a requirement of an encryption and on the security level of the encryption. That is, if a user demands a high security level, encryption is automatically enabled and the encryption algorithms used are chosen in dependency on the security level parameter.
This has the advantage that the user does not have to decide on possible security options or to choose between different encryption algorithms, since these decisions require a basic knowledge of the underlying mathematical algorithms, which is normally not known to the user and which is, furthermore, hard to learn.
According to a further embodiment of the present invention, the security level parameter is furthermore associated with a frequency of backups, that is the frequency of backups is chosen depending on the security level required. Normally, when the security level is raised, the frequency of backups will become higher. According to an alternative embodiment, the frequency of backups may be independently chosen by the user, as judging the influence of the frequency of the backup does not require any special knowledge. Particularly, a regular backup strategy may be created, initiating a backup at regularly spaced time intervals, chosen in dependency on the security level parameter. Furthermore, an instantaneous frequency mode may be implemented, which causes an immediate backup of content, once the content has changed. A further alternative selection is a combination of the above two frequency schedules, that is the content is backed-up immediately when it changes and, additionally, full-, differential-, or incremental-backups are initiated in a frequency indicated by the security level parameter.
According to a further embodiment, the file types and/or storage locations of a content to be backed-up are automatically selected in dependency on the security level parameter. This assures, without any additional knowledge of the user, that all personal files, e.g. stored in the “My Pictures” and “My Documents” folders are preserved, without the user knowing about the presence of those folders and that their digital camera pictures are normally automatically stored to those locations. This holds also true for other, less obvious files such as, for example, the links stored in a web-browser or the e-mails locally stored on disc (normally stored in specific file types or locations not necessarily known to the user). Implementing the inventive concept, those files can be backed-up and preserved, without the user knowing much about the folder-hierarchy of the operating system or software used.
According to a further embodiment of the present invention, a backup strategy for a backup-program is created, which allows to preserve more than one recent version of a file to be backed-up. That is, when the file is altered the previous as well as the actual version of the file is preserved. A higher security demand normally means that the number of recent file-versions is increased. That is, even if the file is accidentally altered and saved, one would have access to a previous version of the file.
According to a further embodiment of the present inventions, this capability is automatically provided, depending on the security level indicated by the security level parameter. In an alternative embodiment, the number of recent file-versions to be preserved can be automatically set, since the meaning of this parameter appears to be obvious to the normal user. In a further embodiment of the present invention, an association of every available security level to different numbers of backup storage locations is performed once, e.g. at the start of the backup-program and the association is stored in a list. This has the advantage that a potentially computationally costly scan of the environment of the client hosting the backup-program and the computation of the backup-strategy only has to be performed once. The association can be reutilized later, by accessing the association between the security level parameter and the backup storage locations.
According to the embodiments of the present invention, the client 6 implements the method for generating a backup strategy. This can, for example, be a piece of software only intended to generate a backup strategy or a backup-software, which generates the backup strategy and, at the same time, performs the backup. In the example of
Depending on the security level parameter, selected backup storage locations are chosen. In that sense, the security level parameter is associated to one or more backup storage locations according to a security association rule. If, for example, a high security level is demanded, the security association rule would select at least one backup storage location, which is physically separate from client 6. This could, for example, be tape-storage 18 in the LAN, provided the tape-storage 18 is located in a different room or even in a different building. To allow for such an appropriate choice, some embodiments of the present invention do additionally determine a distance estimation for each backup storage location, which indicates a physical distance between the client and each backup storage location. Such an estimation can, for example, be based on the number of hops a IP-packet or message requires until it reaches its receiver, that is the identified backup storage location. The higher the number of hops, the greater the probability that the backup storage location is far away from the client 6. A further possibility would be to derive the distance estimation based on the IP addresses of the identified backup storage locations, when the IP-protocol is used for communication. Different sub-networks could then, for example, indicate a remote backup storage location such as, for example, the internet-storage-server 24. Another possibility to derive the distance estimation could be to query the identified backup storage locations using some management-protocol as, for example, SNMP, to directly receive an answer indicating the location of the identified backup storage locations.
For very high security demands, the internet-storage-server 24 may be selected, which is physically separated by the complete LAN 10, such that even when the entire LAN-infrastructure breaks down (for example, by a fire in the respective company), a complete backup of data can be preserved. To this end, the security association rule additionally takes also into account cost-estimates when deciding upon the selected backup storage locations, in case the internet-storage-server 24 is commercially run, that is when storage space on the internet-storage-server 24 is not for free. Therefore, an additional rentability/security tradeoff is performed by a security association rule, when deciding on the selected backup storage location.
According to a further embodiment of the present invention, the client 6 hosting an embodiment of a backup-program is capable of identifying the further client 14 as hosting an embodiment of the backup-program as well. That is, the backup-programs are implemented to recognize each other using some proprietary protocol or some standard-protocol, when scanning the environment of the clients hosting the backup-programs. Such, when scanning the environment of the client, the other client's running backup-programs as well may offer storage space of their local hard discs to the client 6. Some embodiments of backup-programs additionally allow to synchronize content between the client 6 and the further client 14, utilizing the backup-program. That is, specific file types or folders can be simultaneously maintained up-to-date, i.e. the file versions stored on the client 6 and the further client 14 will at any time be the same. This allows a user to work within the same environment on client 6 as well as on client 14, at the same time providing a backup of the user's files, as these are simultaneously stored on both clients.
In a strategy refinement step 56, the backup strategy may optionally be specified in more detail by a content-input 58. The content-input may be performed by the user or may be required by the backup-program, such that the content to be backed-up is also defined by an external input. This input can, for example define the file types to be backed-up or the folders, which are to be backed-up. Alternatively, the content to be backed-up can be automatically generated, e.g. based on the security level parameter.
As an alternative to the provision of the security level parameter prior to the association of the security level parameter with the backup storage locations, the security level parameter may be provided as an additional input to the backup generation 56, after the association has taken place. As described before, the association previously performed would be reused to generate the backup strategy 56.
Once the backup strategy has been derived, an optional backup-step 60 may be performed, copying or transferring the content to be backed-up to the selected storage locations. As indicated in
In an alternative embodiment, the user is regularly prompted to update its desired security level by providing a new security level parameter, such that the backup strategy may be modified to match the user's security demand at any time.
Summarizing, while the configuration and possibilities of the user's PC systems and client-systems vary widely, e.g. in terms of the amount of data to be saved, the capability of access to different storage systems or the internet connectivity for utilizing on-line storage, the inventive approach for programmatically or automatically determining backup routines, frequency of backups and backup storage locations, offers flexible and easy solutions for assuring the highest safety for the precious digital data, which a user has collected over years.
Without learning anything about backups or data security, the user has to answer only one question:
How safe do I want to have my backup?—Different security levels depending on the capabilities of the user's systems (PCs or other clients).
Optionally, a second question may be answered, regarding the file types:
What do I want to preserve?—General types of content like: documents, pictures, etc. as well as program settings, e-mails, games and the like.
Decisions on the backup scenarios, the type and frequency of backups, the best locations to store the backups, are taken automatically by the software following the inventive approach. Files and folders can be observed in regard to changes and backup actions can be taken.
In alternative embodiments, the user may still have the chance to adopt the proposed options for his individuals demands, if he wants to. However, there is no need to do that in case the user just wants to insure his digital data or life to be saved and does not want to worry about the details.
Some embodiments of the invention relate to backup-programs or backup-software, incorporating this approach and which are of very high usability only offering a slim GUI (graphical user interface), requiring only the most important settings, in particular, the setting of a desired security level parameter.
The backup-program would not bother the user with asking question after question, nor would it present a highly overloaded dialogue with numerous options and complicated configuration possibilities.
This provides the major advantage to the user that data security is provided to the user without having the user to think about how to accomplish a secure and reliable backup. To this end, the software scans the system for its configuration and possibilities to hold the backup data. It will identify possible storage devices—internal and external ones, it will check for network drives and FTP servers within the LAN (local area network) and also utilize WAN (wide area network) online storage if WAN or internet connectivity is available.
Dependant on the security level set by the user, the software calculates a backup scenario and decides on the settings for various backup procedures and the frequency of backup runs. Internally, the software is equipped with an extensive set of rules (security association rule), which are considered for the automatic (programmatic) decisions of the software or the backup-program. Thus, the aforementioned embodiments of the present invention present an opportunity for providing a new and innovative concept for backup strategy generation and software that enriches the user's life with high usability and ease-of-use, while preserving the digital data and the user's digitial life for the futures.
Although the inventive embodiments have previously been discussed mainly using conventional computer-networks or PCs, the inventive concept is by no means restricted to the application of conventional PCs or networks. The concept may be applied to any other client capable of storing data such as, for example, mobile phones, mobile video or music players, portable satellite navigation systems, navigation applications and entertainment systems of cars, boats or airplanes and the like. Wherever digital media or content is to be preserved, the application of the inventive concept will result in the benefits described in the previous paragraphs.
Depending on certain implementation requirements of the inventive methods, the inventive methods can be implemented in hardware or in software. The implementation can be performed using a digital storage medium, in particular a disk, DVD or a CD having electronically readable control signals stored thereon, which cooperate with a programmable computer system such that the inventive methods are performed. Generally, the present invention is, therefore, a computer program product with a program code stored on a machine readable carrier, the program code being operative for performing the inventive methods when the computer program product runs on a computer. In other words, the inventive methods are, therefore, a computer program having a program code for performing at least one of the inventive methods when the computer program runs on a computer.
While the foregoing has been particularly shown and described with reference to particular embodiments thereof, it will be understood by those skilled in the art that various other changes in the form and details may be made without departing from the spirit and scope thereof. It is to be understood that various changes may be made in adapting to different embodiments without departing from the broader concepts disclosed herein and comprehended by the claims that follow.
Number | Date | Country | |
---|---|---|---|
60828612 | Oct 2006 | US |