Real time backup system for computer users

ABSTRACT

This invention involves tracking and backing all the information that a user generates on its computer devices (including embedded devices) in real time. The local user server records all user actions and gestures (via various means that include TV cameras). All of this information (user actions and saved files in a computer) is then sent to a remote server via the Internet. This remote server has a virtual map of all the embedded devices on a computer that the person uses. The remote server immediately starts to interpret the user&#39;s actions (including user gestures). In one implementation, the invention stores user actions that are related to data generation (e.g. actions that called some links where data is stored, or executed some programs that generated data). In another variant the remote server generates and downloads the same files that are downloaded on the local user computer devices. For example, if a person begins to download a program, the server may also download the same program on a remote backup server. This way, if the user loses this program, it can be retrieved automatically through a provided server on the Internet. If user&#39;s files are backed up by regular backup periodically, relevant data that were stored by real time backup servers can be eliminated.

RELATED APPLICATIONS

This application is a divisional application of U.S. Ser. No.12/124,750, filed May 21, 2008, which is a continuation application ofapplication Ser. No. 10/768,795, filed Jan. 30, 2004, now U.S. Pat. No.7,499,957, which is a divisional application of U.S. Ser. No.09/564,617, filed May 4, 2000, now U.S. Pat. No. 6,711,699.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates generally to real time computer backupsystems, and, more specifically, to a mechanism for recording andinterpreting user actions (including user gestures) for real timebackup.

2. Discussion of the Prior Art

Users of personal computers often experience problems when attempting tosave data, for example, to a computer hard drive or floppy disk. Sourcesof problems include downloading of viruses, power outages, and makingsimple mistakes, which often result in the loss of importantinformation. There are backup systems that function to help prevent someof these problems.

A first backup system, described at http://www.systemrestore.com/NetMassand available from SystemSafe™, is an automated online backup andreal-time recovery solution through a server that provides typical userswith the same data management benefits as are available to the largestcorporations. These benefits include compression, sophisticatedencryption, network deployment, hands-off operation, ITpolicy/management, and offsite storage. Designed specifically to supportdesktop and laptop computers, the SystemSafe recovery systemautomatically backs up computer systems via a network connection to theNetMass data center. Simply put, the SystemSafe system automaticallycompresses, securely encrypts, and then transmits a user's data tooff-site storage locations on a user defined schedule. While this systemis a very effective backup system, it cannot work if the user is notconnected to the Internet, or it the user's modem is not working.

A second system, LiveVault, which is similar to the first system, usesreal time to backup information immediately and constantly. Unlikeconventional batch backup products, LiveVault backs up changes to datain real time. The technology integrates byte-level replication with anintelligent self-managing storage archive. Byte-level replicationprovides a low load on both the communications services and theproduction servers, while keeping current data fully protected. Thisenables, for the first time, server backup over lower cost, lower speedcommunications lines. The automated multi-tier online storage systemeliminates the need for repeated full backups by synthesizing fullbackups without placing additional demands on the communicationsnetwork.

A problem with this second system is that if the user terminates his/herconnection, all information that was being backed is immediately lost.

A third system, available through Double-Take and described athttp://www.nsisw.com/pages/dtakewin.htm, is similar to both the firstand second systems discussed above. Double-Take, however, backs up onlythe most current files in a computer and not entire files where only onesmall change may have occurred. After the initial synchronization offiles, Double-Take's real-time data replication transmits only thebyte-level changes, thus using the smallest amount of network bandwidthpossible. Other technologies may need to transmit an entire disk blockor may retransmit the whole file regardless of how much or how littledata actually changed. This provides the best possible protection at thelowest cost.

While this third system is the most effective of the three, it is stillvulnerable to a modem break down.

Other problems that occur with these back up systems is that they do notback up embedded devices that are not connected to the Internet, such asa clock, watch, television, and a radio. Additionally, having a constantand immediate connection with servers may make the process very slow andcause many problems.

It is highly desirable to provide a system for tracking and backing allinformation that a user generates on computer devices (includingembedded devices) in real time.

It is further highly desirable to provide a real-time backup system thattracks user generated information, including user actions and savedfiles in a computer, and sends the information to a remote server viathe Internet.

SUMMARY OF THE INVENTION

It is an object of the present invention to provide a system fortracking and backing all information that a user generates on the user'scomputer devices (including embedded devices) in real time.

Another object of this invention is to provide a real-time backup systemthat tracks user generated information, including user actions and savedfiles in a computer, and sends the information to a remote server viathe Internet.

The present invention relates to tracking and backing all theinformation that a user generates, including user actions and savedfiles in a computer, on the user's computer devices (including embeddeddevices) in real time. A server records user actions and gestures (viavarious devices such as TV cameras) and transmits all of thisinformation to a remote server via the Internet. This remote serverincludes a virtual map of all the embedded devices on a computer thatthe person uses. The server immediately starts to interpret the user'sactions (including user gestures) that are tracked, monitored andrecorded by television cameras to record user gestures.

In one implementation, the invention stores user actions that arerelated to data generation (e.g. actions that called some links wheredata is stored, or executed some programs that generated data). Inanother variant, the remote server generates and downloads the samefiles that are downloaded on the local user computer devices. Forexample, if a person begins to download a program, the server may alsodownload the same program on a remote backup server. This way, if theuser loses this program, the program can be retrieved automaticallythrough the provided server on the Internet. If user's files are backedup by regular backup periodically, relevant data that were stored byreal time backup servers may be eliminated.

BRIEF DESCRIPTION OF THE DRAWINGS

Further features, aspects and advantages of the apparatus and methods ofthe present invention will become better understood with regard to thefollowing description, appended claims, and accompanying drawings where:

FIG. 1 illustrates a general picture for a backup server.

FIG. 2 shows how a data base of user actions is organized.

FIG. 3 shows how a media identifier module works.

FIG. 4 generally illustrates the manner in which data is stored in thebackup server from FIG. 3.

FIG. 5 continues the explanation of the database of programs shown inFIG. 1.

FIG. 6 is an explanation of the history of user actions.

FIG. 7 describes a media identifier recognition module.

FIG. 8 illustrates command vs. data generation identification.

FIG. 9 shows remove conditions for the real-time back up system.

FIG. 10 is a flowchart of the method of real-time backup.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS OF THE INVENTION

FIG. 1 shows a general picture for a backup server. In this Figure, thereference number 100 represents the network. The user 101 is using manydevices such as a telephone 106, a computer 105, a watch 104, a recorder103, and a calculator 102. User 101 performs various actions on thedevices around him. These actions are recorded by a video camera 107,and by a processor 110 that is running in the computer 105. Otherembedded devices may also contain this processor 110 that records auser's actions. Some items are connected to the network, such as thecomputer 105, or the telephone 106. Other devices, such as the watch,104, or calculator 102, are not connected to the network.

A similar description can be seen for another user 101 at a differentlocation. This user also has several video cameras 107, and a computer105. Video cameras surround the user and his/her devices in more thanone area to provide a maximum back up for all the user's devices. Thevideo cameras can have more than one use. They can be used as forms ofsecurity and as ways to help provide information for backup. A user'sactions are stored in a database 106 of user actions. A user's actionsare interpreted by a translator server 108. The translator interpretswhich actions made by the user actually change the database. Thisinformation is sent to a backup server 109, where it is decided whatshould be saved and what actions should be performed. Any suitablegesture recognition procedure, for example, is disclosed in copendingapplication Ser. No. 09/079,754 for “Apparatus and Method For UserRecognition Employing Behavioral Passwords,” filed May 15, 1998, thedisclosure of which is herein incorporated by reference.

The backup server 109 also downloads files that were downloaded by theuser. In some cases, a user may generate new data by using a program,for example if the user was using a program that generates new primenumbers, the translator of the user's action would understand that inorder to obtain certain data, the translator needs executables. Thetranslator may require that some executables need to be downloaded inorder for the server to be able to keep up with the user's actions. Forinstance, if the user has a program that can generate new data, theserver would download the same program and enter the same commands asthe user did. This saves time because it reduces the time spent onhaving to copy and save data.

FIG. 2 shows how the data base of user actions is organized. The startand finish of the time alignment is recorded under column 200. Column201 contains the list of devices that user actions were performed on.For example, a laptop, television, recorder, telephone, controller,desktop, watches, and a palmtop. The form of media used to control thesedevices is located under column 202. For example, if a person used theirvoice to activate a device, that would be listed. Changes in the devicesare recorded under correlation column 206. Column 203 gives the names ofusers for each device. Column 204 lists the location of each device, andcolumn 205 lists the environment of each place.

FIG. 3 shows how the media identifier module works. The reference number300 represents the media identifier module. The media identifier moduleinterprets what form of media a person used to perform a function. Auser could function a program in many ways, such as by using voice, agesture, or typing 301. Module 302 is responsible for being able to tellthe difference between a command or a data generation identification.After the data is sent through module 302, the data are sent to module303 where the commands are interpreted. These commands could be commandssuch as commands to generate new data 304, change old data, or a userinterface 306. If the data is identified as data that generates newdata, the data are labeled in module 309. The data labeler labels dataaccording to whether they have a link or not. If the data has a link,the data is processed as a link data. Link module 307 connects commandswith data. For example, if certain data were found using a link, thelink module would show this. Module 308 lists the addresses of the linksthat need to be used to get data 310, storing data in backup, isdescribed below.

FIG. 4 provides a description of how data are stored in the backupserver from FIG. 3. Column 401 shows the types of data. This includesnew data, old data, links to data, and programs that generate data.Column 402 lists the names of the user's who created the data usingprograms. Column 403 shows the time all the data was generated. Thisalso includes when the data had been changed or when the data wereconnected to links. Column 404 lists all the commands used to create newdata. This is important for backup because this is used to restore filesand data. Column 405 shows the types of media used to operate a program.Media includes voice, gestures, typing, etc. Column 407 lists the linksto websites where data were obtained, so data could be obtained throughthe website instead of the user to save time. Column 408 lists locationsand column 409 lists remove conditions.

FIG. 5 continue the explanation of the database of programs, which wasdescribed above in connection with FIG. 1. Column 501 lists the programsused, such as signal processing, prime processing, and an html maker.Column 502 lists the name of the users for each program. Column 503 isresponsible for keeping track of the time for generation of data andchanges. This column is also responsible for keeping track of datahistory. Column 504 lists commands used to control programs. This isimportant because it helps restore data. Column 505 (operating system)shows what operating system holds data. Column 506 shows the devicesthat were being used by programs. Column 507 lists the sources that wereused to obtain data, such as voice, keyboard, or text. Column 500 is anindex which shows where data are to be stored.

FIG. 6 shows a database that gives and explanation of the history ofuser actions. Column 601 records the actions that are inputted tocontrol a program. Each action fits under a designated class. Forexample, if two actions (say, action 1) can cause the same program to dothe same thing (e.g. open same file?), then put these actions in thesame class, act 1. Similarly, some other actions are put in the sameclass, like act 2, act 3, etc. This is shown in column 602. This willalso be discussed in connection with another Figure. Column 603 is incharge of keeping a count of how often a class is formed by similaractions. It should be noted that actions do not stay in the input column601 for a long period of time. If these actions fall into a class, theactions are automatically withdrawn from the input column. Column 604creates a tree of the order of actions that took place when a programwas being used. For example, if a program was opened by saying acommand, this would become the start of the tree. Then, when theprogrammed new action took place, this would be put in the tree inaccordance to the first action. Column 605 is in charge of placing anindex to a file from the tree index 604. For example, the actions changedata so the index shows the files from after the latest change.

FIG. 7 describes the media identifier recognition module. The referencenumber 700 represents some form of media input, gestures, speaking,typing, etc., and the reference number 701 identifies the type of mediaused. This is done by telling where the data came from. For example, ifthe data are created by the user of a key board, the data are calledkeyboard input 703, but if the data are created by the use of amicrophone, the data are called voice input 702. Also, if the data arecreated using a video camera, the data are called video input 704, andhand written data are called written input 705. The next module is themedia data recognition. Voice 702 is recognized by Automatic speechrecognition system 706. The video 704 is recognized by gesturerecognition 707, or lip reading recognition 708. Finally, handwriting705 is recognized by the automatic hand writing system 709.

FIG. 8 explains command vs. data generation identification. Procedure800 receives input labels that were processed in FIG. 7. Elementrepresented at 801 is in charge of interpreting the media used by theuser. Reference number 802 represents gesture, 803 text, and 804audio/video, represent the form of media that the data are in when thedata are received into the backup server. The data that are gesturegenerated are then determined to be related or unrelated to datageneration. This is represented at 805 and 806. Text must be verified tobe a command or not, so the text is sent through a command verifier 808,and then it is determined if the text is a command or not. At 810, thedata are separated from the data that is a command and the data that isnot. If the data is a command, it is interpreted 809, but if the data isnot a command, it is stored 811. Audio/Video data is stored in a mediafile 807.

FIG. 9 shows what the remove conditions are for the real-time back upsystem. Module 900 shows that a regular back up is performed. This couldbe done weekly. This data can be removed. It is decided whether datashould be removed or not by the following circumstances: how old it is,if there are newer versions of this data, and how often it is beingused. This is decided by the time deadline module 901. Step 902determines the number of new backup copies that exceed the threshold.For example, if a new version of an old program has been released anddownloaded, the older version would be deleted. At step 903, theequivalent file or link is stored somewhere. The only condition where afile cannot be removed is shown in 904, where another database has linkto a file that another database needs.

FIG. 10 is a flowchart of the method of real-time backup. First, themethod, at step 1001, records a user's actions. Then the actions areidentified at step 1002. Then, the user actions are interpreted in auser media recognizer 1004, labeling of actions as commands or datagenerators take place. Step 1005 labels commands that are related todata generation. At step 1006, the data from 1004 is then stored. Step1007 stores the links to data programs and commands that generate data.Step 1008 is where data and links are removed if the conditions aresatisfied.

While the invention has been particularly shown and described withrespect to illustrative and preformed embodiments thereof, it will beunderstood by those skilled in the art that the foregoing and otherchanges in form and detail may be made therein without departing fromthe spirit and scope of the invention which should be limited only bythe scope of the appended claims.

The invention claimed is:
 1. A method for handling data in a real-timedata back up system, comprising: performing a regular back up of defineddata used by a user in a computer system by storing the defined data ina backup server, wherein at least some of the data were obtained by theuser by using action to call links to a plurality of websites; storingsaid actions by the user and the links to said plurality of websites;the back up server using said actions to call the links to the websitesto obtain additional data for the back up server through the websitesinstead of the user to save time; and determining whether data should beremoved or not from the backup server by the following circumstances:how old the data are, if there are newer versions of this data, and howoften the data are being used; wherein the only condition where a filecannot be removed is where another database has a link to a file thatanother database needs.
 2. A method of establishing a database ofprograms and using said programs in a computer backup system for backingup data used by a group of users, the method comprising: listing in afirst column the programs used; listing in a second column the names ofthe users for each program; using a third column for keeping track ofthe time for generation of data and changes; also using the third columnfor keeping track of data history; listing in a fourth column commandsused to control the programs; listing in a fifth column the operatingsystem used to hold data; listing in a sixth column the devices thatwere used by the programs; listing in a seventh column the sources thatwere used to obtain data; using an eighth column as an index showingwhere data is to be stored; one or more of the users entering one ormore of the commands listed in the fourth column to use one or more ofthe programs listed in the first column to obtain files and data and abackup server entering said one or more of the commands listed in thefourth column to use the one or more programs listed in the first columnto restore said files and data in the backup server.
 3. A method ofusing a database to explain the history of user's actions performed togenerate data, the method comprising: using a first column to recordsthe actions that are inputted to control a program by a user to causethe program to perform specified functions to generate specified data,wherein each of the actions fits under a designated class based on thespecified function said each of the actions causes the program toperform; showing in a second column the class in which each action isplaced; using a third column to keep a count of how often a class isformed by similar actions; if one or more of the actions fall into a oneof the classes in the second column, automatically withdrawing said oneor more of the actions from the input column; using a fourth column toshow a tree of the order a group of the actions that took place when theprogram was being used; using a fifth column for placing an index to afile from the tree index; and a backup server using said tree togenerate data and storing in the file indexed from the tree the datagenerated from using said tree.
 4. A method of operating a real-timedata backup system, comprising: recording a user's actions; identifyingthe actions; interpreting the user actions in a user media recognizer;labeling the actions as commands or data generators; labeling thecommands that are related to data generation; storing data in a backupserver; storing links to data programs and the commands that generatedata; when one of the users uses a plurality of the commands to obtaindefined data using one of the data programs, the backup server using thelinks to the data programs and the commands to obtain the same dataobtained by said one of the users; and removing the data and the linksif predefined conditions are satisfied.
 5. A program storage devicereadable by machine, tangibly embodying a program of instructionsexecutable by the machine to perform a method for operating a real-timedata backup system, the method comprising: recording a user's actions;identifying the actions; interpreting the user actions in a user mediarecognizer; labeling the actions as commands or data generators;labeling the commands that are related to data generation; storing datain a backup server; storing links to data programs and the commands thatgenerate data; when one of the users uses a plurality of the commands toobtain defined data using one of the data programs, the backup serverusing the links to the data programs and the commands to obtain the samedata obtained by said one of the users; and removing the data and thelinks if predefined conditions are satisfied.
 6. A program storagedevice according to claim 5, wherein the removing step includes the stepof determining whether data should be removed or not by the followingcircumstances: how old the data are, if there are newer versions of thisdata, and how often the data are being used; wherein the only conditionwhere a file cannot be removed is where another database has a link to afile that another database needs.