Electronic backup of applications

ABSTRACT

Systems and methods are provided for storing and restoring digital data. In some implementations, a method is provided. The method includes receiving, while a current view of an application is displayed in a user interface, a first user input requesting that a history view associated with the current view of the application be displayed, retrieve data associated with the history view, determining a presentation format for the data, and displaying the history view in response to the first user input in accordance with the presentation format, the history view including data associated with at least a first visual representation of an earlier version of the current view of the application.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of, and claims priority to, U.S.patent application Ser. No. 14/059,184, filed Oct. 21, 2013, entitled“ELECTRONIC BACKUP OF APPLICATIONS,” which is a continuation applicationof, and claims priority to, U.S. patent application Ser. No. 13/350,699,filed Jan. 13, 2012, now U.S. Pat. No. 8,566,289, Issued on Oct. 22,2013, entitled, “ELECTRONIC BACKUP OF APPLICATIONS,” which is acontinuation of, and claims priority to, U.S. patent application Ser.No. 11/760,721, filed Jun. 8, 2007, now U.S. Pat. No. 8,099,392, Issuedon Jan. 17, 2012, entitled, “ELECTRONIC BACKUP OF APPLICATIONS,” thecontents of which are incorporated herein by reference in their entiretyfor all purposes.

FIELD

The disclosed implementations relate generally to storing and restoringdigital data.

BACKGROUND

Modern graphical user interfaces allow a large number of graphicalobjects or items to be displayed on a display screen at the same time.Operating systems, e.g., Apple Mac OS®, provide user interfaces in whicha number of graphical user interface windows can be displayed,overlapped, resized, moved, configured, and reformatted according to theneeds of a user or a particular application. Taskbars, menus, virtualbuttons, and other user interface elements provide mechanisms foraccessing and activating windows even when they are hidden behind otherwindows.

With the sophisticated tools available, users are encouraged not only tocreate and save a multitude of items in their computers, but to reviseor otherwise improve on them over time. For example, a user can workwith a certain file and thereafter save the file's current version on astorage device. The next day, however, the user could have had secondthoughts about the revisions, or could have come up with new ideas, andtherefore opens the file again.

The revision process is usually straightforward if the user wants to addmore material to the file or make changes to what is there. But it istypically more difficult for a user who has changed his/her mind aboutchanges that were previously made and wants the file returned to aprevious version. Application programs for word processing typically letthe user “undo” previous edits of a text, at least up to a predefinednumber of past revisions. The undo feature also usually is configured sothat the previously made revisions must be undone in reversechronological order; that is, the user must first undo the most recentlymade edit, then the second-most recent one, and so on. If the user savesand closes the document and thereafter opens the document again, itmight not be possible to automatically undo any previous edits.

SUMMARY

Systems and methods are provided for storing and restoring digital data.In general, in one aspect, a method is provided. The method includesreceiving, while a current view of an application is displayed in a userinterface, a first user input requesting that a history view associatedwith the current view of the application be displayed, retrieve dataassociated with the history view, determining a presentation format forthe data, and displaying the history view in response to the first userinput in accordance with the presentation format, the history viewincluding data associated with at least a first visual representation ofan earlier version of the current view of the application. Otherembodiments of this aspect include corresponding systems, apparatus,computer program products, and computer readable media.

Implementations of the aspect can include one or more of the followingfeatures. The earlier version of the current view can include a firstelement, and the aspect can further include receiving, while the historyview is displayed, a second user input requesting that the current viewof the application be modified according to the earlier version, atleast with regard to the first element and modifying, in response to thesecond user input, the current view of the application according to theearlier version, at least with regard to the first element. Thepresentation format can include an application interface that is similarto the interface provided in the current view of the application.Generating the history view of the application interface can includegenerating a simplified application interface. Generating a simplifiedapplication interface can include omitting metadata associated with theapplication interface from display. The aspect can further includegenerating a restored items folder in the current application and wheremodifying the current view of the application includes storing the firstelement in the restored items folder.

In general, in one aspect, a method is provided. The method includesidentifying application data to store during a first backup operation,the application data including a plurality of application files and anindex, storing the application data during the first backup operation,and storing a backup index, the backup index being a subset of theindex. Other embodiments of this aspect include corresponding systems,apparatus, computer program products, and computer readable media.

Implementations of the aspect can include one or more of the followingfeatures. The aspect can further include initiating a second backupoperation, including storing changed application data relative to thefirst backup operation and updating the backup index. The applicationcan be an e-mail application.

In general, in one aspect, a system is provided. The system includes anapplication, the application including a user interface providinginteraction with data associated with the application, a backupcomponent configured to store backup data capturing views of theapplication, and a helper application, the helper application beingconfigured to interpret the backup data in order to generate visualrepresentations for a backup interface. The system can further includean interface coupling the backup component and the helper application,the interface providing a communication link between the backupcomponent and the helper application such that a backup user interfacecan display a captured view of the application. Other embodiments ofthis aspect include corresponding systems, apparatus, computer programproducts, and computer readable media.

Particular embodiments of the subject matter described in thisspecification can be implemented to realize one or more of the followingadvantages. An intuitive interface is provided for restoring applicationdata efficiently. Application data can be restored using a backupinterface without integrating the application with a backup application.

The details of one or more embodiments of the invention are set forth inthe accompanying drawings and the description below. Other features,aspects, and advantages of the invention will become apparent from thedescription, the drawings, and the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an example computer system.

FIG. 2 is a block diagram of an example architecture for providingbackup operations.

FIG. 3 is a flow diagram of an example method illustrating a use of abackup component with a particular application.

FIG. 4 is a flow diagram of an example method illustrating a backuprestoration scenario.

FIG. 5 is a screen shot depicting an example e-mail application userinterface.

FIG. 6 is a screen shot depicting an example of an initial state for abackup interface after the backup component has been activated.

FIG. 7 is a screen shot depicting the backup interface of FIG. 6 wherean item of a snapshot has been selected for restoration.

FIG. 8 is a screen shot showing the e-mail application after somecontents from a snapshot have been restored using the backup interface.

DETAILED DESCRIPTION

FIG. 1 is a block diagram of an example computer system 100. The system100 can be used for backup operations including capturing at least oneearlier version of a user interface view and allowing a user to initiatea restoration based on the captured earlier version. As used herein, aview refers to an item, element or other content, capable of beingpresented in a user interface that can be subjected to a backupoperation by a backup component 117 included in system 100. For example,a user interface view can contain any number of icons, files, folders,application state information and/or machine state information, etc.

The system 100 includes a personal computer 102, communicatively coupledto a remote server 107 using a network interface 116, and a network 108(e.g., local area network, wireless network, Internet, intranet, etc.).The computer 102 generally includes a processor 103, memory 105, one ormore input devices 114 (e.g., keyboard, mouse, etc.), and one or moreoutput devices 115 (e.g., a display device). A user interacts with thesystem 100 using the input and output devices 114, 115. The system 100also includes various hardware elements. The system 100 can includehardware, software, and combinations of the two.

The computer 102 also includes a local storage device 106 and a graphicsmodule 113 (e.g., a graphics card) for storing information andgenerating graphical objects, respectively. The local storage device 106can be a computer-readable medium. The computer-readable medium can be amachine-readable storage device, a machine-readable storage substrate, amemory device, a composition of matter effecting a machine-readablepropagated signal, or a combination of one or more of them.

While modifications of a user interface view are described herein withrespect to the personal computer 102, it should be apparent that thedisclosed implementations can be incorporated in, or integrated with,any electronic device that has a user interface, including withoutlimitation, portable and desktop computers, servers, electronics, mediaplayers, game devices, mobile phones, email devices, personal digitalassistants (PDAs), embedded devices, televisions, other consumerelectronic devices, etc.

Systems and methods are provided for modifying an interface view (e.g.,a user interface view). The systems and methods can be stand alone, orotherwise integrated into a more comprehensive application.

In the materials presented below, an integrated system and method formodifying a user interface view with respect to an application isdisclosed. However, one of ordinary skill in the art will recognize thatthe engines, methods, processes and the like that are described canthemselves be an individual process or application, part of an operatingsystem, a plug-in, an application or the like.

In one implementation, the system and methods can be implemented as oneor more plug-ins that are installed and run on the personal computer102. The plug-ins are configured to interact with an operating system(e.g., MAC OS® X, WINDOWS XP, LINUX, etc.) and to perform the variousfunctions, e.g., as described below. A system and method for modifying auser interface view can also be implemented as one or more softwareapplications running on the computer 102. Such a system and method canbe characterized as a framework or model that can be implemented onvarious platforms and/or networks (e.g., client/server networks,wireless networks, stand-alone computers, portable electronic devices,mobile phones, etc.), and/or embedded or bundled with one or moresoftware applications (e.g., email, media player, browser, etc.).

The computer 102 includes the backup component 117 that allows for thestorage of backup data providing one or more versions of the computer'sfiles or other items, for example within the local storage 106 or in anexternal storage repository. In one implementation, the backup component117 also allows a user to select any of the stored versions and use theselected version to initiate a restoration of that version in thecomputer 102.

FIG. 2 is a block diagram of an example architecture 200 for providingbackup operations. For example, the architecture 200 can provide for thebackup and restoration of application files, such as those associatedwith a set of application programs 228.

Each application program 228 can use a helper function 229 to interfacewith a backup component 117. The helper function 229 can be, forexample, a particular helper application, interface, or other code. Forexample, the helper function 229 can be used by the backup component 117when generating a backup version of a current state of the applicationprogram 228. As another example, the helper function 229 can be usedwhen the application is restored, using the backup component 117, to astate that corresponds to a backup version.

In particular, the helper function 229 can provide a graphical userinterface for restoration of backup data associated with theapplication. For example, the helper function 229 can determine apresentation format for backup data with respect to a particularapplication. The presentation format can include a particulararrangement of data in a view of the application. The graphical userinterface provided by the helper function 229 can present the user witha view of the application interface derived from the backup data. Forexample, the view of the application interface can be a visualrepresentation having a similar or identical layout of information as isdisplayed by the user interface of the corresponding application program228.

In some implementations, the helper function 229 can introduce featuresinto the application programs 228, such as an icon or menu option foraccessing the restoration functions of the backup component 117. Thiscould be done, for example, through an application programming interface(“API”) or service provider interface (“SPI”) associated with eachapplication program 228.

In one implementation, the backup component 117 provides backup andrestoration capability for the system 100. Many different items orelements can be the subject of a backup operation. For example, folders,files, items, information portions, directories, images, systemparameters, playlists, address books, e-mails, e-mail folders, a stateof an application or state of the system, preferences (e.g., user orsystem preferences), and the like all can be candidates for inclusion inan archive as backup data. Other types of data can also be included asbackup data.

In some implementations, the backup component 117 can include a localstorage device 204 and an external storage device 232. The backup datafrom a backup operation can be stored on either or both. Any number oflocal and/or external storage devices can be used by the backupcomponent 117 for storing backup data. In one implementation, no localstorage is provided. In one implementation, the backup component 117stores the backup data in a format corresponding to a file systemstructure. In one implementation, the backup component 117 runs as abackground task on an operating system 230 that is not visible to theuser. The backup component 117 can be capable of running across multipleuser accounts.

The backup component 117 can interact with one or more of theapplications 228 using one or more helper functions 229. In oneimplementation, the interaction between the backup component 117 and thehelper functions 229 can provide backup operations of application files,state or other items. Additionally, the interaction can provide for userrestoration of particular backup data, for example, restoration of aparticular application state from an earlier point in time.

The backup component 117 includes an activity monitoring engine 212. Inone implementation, the activity monitoring engine 212 monitors forchanges within applications (e.g., application files or state) that aretargeted for inclusion in backup operations. A change can also includethe addition of new files or other data structures, or deletion ofexisting ones.

In one implementation, the activity monitoring engine 212 is capable ofdiscerning between a substantive change (e.g. the text within a documenthas been modified) and a non-substantive change (e.g. the play countwithin an iTunes playlist has been updated, or several changes canceleach other out). The activity monitoring engine 212 can, for example,create a list of modified elements (e.g., application files) to be usedwhen a backup operation is eventually triggered. In one implementation,the activity monitoring engine 212 can monitor the system for periods ofinactivity. The activity monitoring engine 212 can then trigger a backupoperation during a period of time in which the backup operation will notcause a system slowdown for an active user.

A preference management engine 214 specifies some operating parametersof the backup component 117. In one implementation, the preferencemanagement engine 214 contains user-specified and/or system defaultapplication parameters for the backup component 117. These can includesettings for the details of capturing and storing the views. Forexample, the preference management engine 214 can determine thefrequency of performing backup operations, the storage location for thebackup data (e.g., file data, change data associated with a particularversion of a file), the types of elements (e.g., files or other items)that are eligible for inclusion in the backup operation, and the eventswhich trigger a backup operation (periodic or event-driven, etc.).

The preference management engine 214 can also, in some implementations,contain user specifications and/or default application parametersassociated with the restoration of items.

In one implementation, the preference management engine 214 can detectthat a new storage device is being added to the system and prompt theuser whether the new storage device should be included as a backuprepository. Files and other items can be scheduled for a backupoperation due to location (e.g. everything on the C: drive and withinD:/photos), a correlation with specific applications (e.g. all pictures,music, e-mail in an inbox, an address book, and system settings), or acombination of strategies. Different types of items can be scheduled tobe stored on different devices or on different segments of a storagedevice during a backup operation. In one implementation, the backupcomponent 117 stores the versions in a format corresponding to a filesystem structure.

A backup management engine 216 coordinates the collection, storage, andretrieval of views performed by the backup component 117. For example,the backup management engine 216 can trigger the activity monitoringengine 212 to monitor for activities that satisfy requirements specifiedin the preference management engine 214.

A change identifying engine 218 locates specific element (e.g., files orother items) to determine if data associated with the elements haschanged. The change identifying engine 218 can be capable of discerninga substantive change from a non-substantive change, similar to theexample described above for the activity monitoring engine 212. In oneimplementation, the change identifying engine 218 traverses a target setof elements (e.g., files or other items), comparing a previous versionto the current version to determine whether or not a modification hasoccurred.

A backup capture engine 220 locates views (e.g., elements, files orother items) that are to be included in backup operations. The backupcapture engine 220 can invoke the activity monitoring engine 212 and/orthe change identifying engine 218, for example, to generate a capturelist identifying data to be included in a next backup operation. Thebackup capture engine 220 can then store copies of listed data in one ormore targeted storage repositories. The backup capture engine 220 cantrack multiple versions of elements or items included in the backuprepository.

In some implementations, the captured view includes data and formatinformation. However, in other implementations, the data included in theview (e.g., for one or more applications) does not include apresentation format for the data. For example, capturing a view of amail application can include capturing data associated with messagecontent, mailboxes, and the like. The presentation format information,however, can include the layout of the mail interface (e.g., anarrangement of mail messages, an order for mailboxes, a placement oficons in the interface, etc.). Consequently, the backup component canuse the helper function 229 to determine a correct presentation formatfor the backup data of the application.

In some implementation, the backup data associated with an applicationdoes not completely match the application data. For example, particularapplications (e.g., an e-mail application) can include a number ofapplication data files (e.g., representing mailboxes and messages) aswell as an index file associated with the application data files. Theindex file is used to quickly access information from the applicationdata files, for example, to generate the user interface for theapplication.

The index can also identify various metadata associated with theapplications files. For example, each message in an e-mail applicationcan include metadata. The metadata can identify, for example, whether ornot the e-mail message has been read or whether the message is flagged.The index file uses this information when generating the user interfacefor the e-mail application (e.g., so that a message is correctlydisplayed as unread). In some implementations, the backup capture engine220 stores the application data files along with a backup index. Thebackup index can contain a subset of the information contained in theindex. For example, the backup index can omit the metadata associatedwith the application files. During subsequent backup operations, thebackup index can be updated along with the storage of changedapplication data.

The backup component 117 includes a backup restoration engine 222 torestore previous versions of views (e.g., files or other items) of anapplication. In some implementations, the backup restoration engine 222restores particular data associated with the previous version of theview to the original location of the data in the file system. Forexample, a restored file can be restored to the particular path in thefile system that the file was located when originally included in thebackup data during an earlier backup operation.

In some alternative implementations, the restored data is stored in analternative location. For example, a restored file can be stored in a“restored” folder in the file system or associated with a particularapplication in order to simplify a user's later retrieval of therestored file.

In one implementation, the backup restoration engine 222 provides abackup interface (e.g., a graphical user interface) where a user canselect the item(s) to be restored. The user interface can provide visualrepresentations of one or more previous views (e.g., of the applicationinterface at a particular point in time) that the user can navigate andselect from. In some implementations, the helper function 229 canprovide components of the user interface used for restoration purposes.For example, the helper function 229 can generate the visualrepresentations of previous views of an application user interface usingthe backup data of the backup component 117. For example, for someapplications 228, the helper function 229 can use the information in thebackup index to generate the visual representations. The visualrepresentations can then be displayed in the backup interface.

FIG. 3 is a flow diagram of an example method 300 illustrating a use ofa backup component with a particular application. For convenience themethod 300 will be described with respect to a system (e.g., system 100)that performs the method 300. The system receives (302) input from auser to initiate backup interface for a particular application (e.g., ane-mail application). Within the application, in some implementations, anicon, menu option, or other selection tool can exist to initiate thebackup interface. In other implementations, the backup interface can beactivated from outside the user application, for instance through thecomputer's operating system.

The system initiates (304) a helper application (e.g., the helperapplication 229). The helper application can be initiated, for example,by the application once the input to initiate the backup interface hasbeen received. Alternatively, the helper application can be triggered bythe backup component (e.g., backup component 117) after determining thatthe helper application can be used to provide the backup interface forthe application. In some implementations, the helper applicationcommunications between the application and the backup component toprovide a backup interface. For example, the helper application can beconfigured to more efficiently access backup data identified in thebackup index than the backup component.

For example, the helper application can determine a presentation formatfor backup data associated with the application, which may not have beencaptured by the backup capture engine (as described above). In someimplementations, the helper application is specific to a particularapplication and includes information associated with the presentationformat for that application. Alternatively, the helper application canbe used for several applications. As a result, the helper applicationcan determine the presentation format in a number of ways. Thepresentation format can be provided by the application. In someimplementations, the application can provide a simplified presentationformat. Alternatively, the presentation format can be determine usingthe backup data including one or more cues in the data, time stampinformation associated with the data, according to input received by theuser (e.g., user selection of an application), inferred by the type ofdata (e.g., document extensions associated with particular applications,version information), metadata associated with the backup data.

In some implementations, the helper application can process thepresentation format information to derive a similar, but simplifiedpresentation format to use when presenting backup data. In otherimplementations, the presentation format allow the helper application togenerate a visual representation that resembles the visualrepresentation provided by the application interface, which can bepopulated with backup data to present a particular history view of theapplication.

The system generates (306) the backup interface for the applicationusing the helper application. In some implementations, the helperapplication generates the backup interface using information from thebackup component according to a particular presentation format. In otherimplementations, the helper application can provide input to the backupcomponent which then generates an appropriate backup interface for theapplication. The helper application can use backup data, e.g., a backupindex, for a particular application in order to generate visualrepresentations of the application for the backup interface. Forexample, the helper application can use the backup data and thepresentation format in combination to generate one or more visualrepresentations providing a history view of the application.

The backup interface provides a visual means for accessing and restoringitems (e.g., files, folders, etc.) associated with the application. Insome implementations, the backup interface provides a visualrepresentation of a view of the application user interface similar inlayout to the user interface of the application. For example, the backupinterface generated for an e-mail application can provide access toprevious versions of folders, messages, address book contacts, and otheritems associated with the email application.

The system receives (308) navigation input through the backup interface.The navigation input allows a user to identify particular items in agiven view as well as navigate between different views of theapplication from previous backups. In some implementations, the visualrepresentations presented in the backup interface from a particularbackup operation are referred to as snapshots.

As used herein, a snapshot refers to a backup element stored in ahistorical archive that includes a backup of selected items or contentas specified by the backup component. For example, a user can navigateto a particular snapshot in time through entering a date within thebackup interface or by using a tool such as a scroll bar or directionalarrows to navigate between snapshots. In some implementations, thebackup interface provides a stack of snapshots of the application userinterface, each snapshot proceeding backwards in time within the stack.Once a particular snapshot has been selected, in some implementations, alisting or graphical representation of the items available within thatsnapshot is displayed within the backup interface.

For example, a snapshot of an e-mail application display can provide avisual representation of the e-mail folders (e.g., an inbox) at aspecified point in time. The visual representation of the e-mail userinterface can have a similar structure of graphical elements as in acurrent view of the e-mail user interface. The user can identify data(e.g., a folder or individual message) from the snapshot to restore. Insome implementations, the visual representation of the application userinterface can be a simplified version of the actual e-mail userinterface. For example, the simplified version can omit particularelements found in the user interface of the application. For example,the simplified version can omit metadata (e.g., message metadata).

The system receives (310) a selection of one or more items to restorefrom a selected snapshot. Exemplary methods of item selection may be toclick and drag graphical items, individually type in the name of eachitem, highlight items using a selection tool, or other input methods ofselecting members from a group of items. For example, the user canrestore any or all contents or data associated with the e-mailapplication, such as data associated with an inbox folder, a sent itemsfolder, a deleted items folder, an address book, calendar, preferences,or any other data of the e-mail application.

For example, the user can restore inbox messages that were permanentlydeleted from the e-mail application. The user can select a snapshot thatincludes the deleted inbox messages. In one implementation, the user canrestore the entire inbox from that snapshot. Alternatively, the user canselect only particular inbox messages to restore using the backupinterface. Similarly, the user can restore deleted message from otherfolders as well as contact information that was deleted. Once items havebeen selected, an additional input such as a restore button or commandcan activate the restoration.

The system restores (312) the selected items and exits the backupinterface. The helper application can facilitate communication with thebackup component to transfer the data associated with each selected itemfrom the backup component to the application. In some implementations,the item is restored to its original location within the application.For example, the item can be restored to the same path location in thefile system hierarchy as at the time of the backup operation thatcaptured the selected item.

Alternatively, in some implementation, the item can instead be restoredto a special location. For example, a folder labeled “restored” can begenerated for housing restored application data. In one example, arestore folder can provide the user with a convenient method of locatingthe items which have been restored. For example, a restored items folderin an e-mail application can allow a user to easily find the restoreditems. The items can later be moved to another location (e.g., toanother mail folder). In some implementations, the restored folder forthe application can be generated in response to a restore operation. Forexample, the helper application can instruct the application to generatethe restored folder within the application file structure.

In some implementations, the storage location for restored items may bedesignated within user preferences. The preference management engine214, for example, could be used to identify a restoration storage means.

Once restoration has been completed, the backup interface closes. Insome implementations, the backup interface automatically exits uponcompleting a restoration task. In other implementations, the user cantrigger the backup interface to close. For example, the user may selectan exit button within the backup interface to close the backupinterface. In some implementations, closing the backup interface returnsthe user to the user interface for the application (e.g., as provided ina desktop user interface).

FIG. 4 is a flow diagram of an example method 400 illustrating an backuprestoration scenario. For convenience the method 400 will be describedwith respect to a system that performs the method 400. The systemreceives (402) identification of one or more items to restore throughthe backup interface. The items can be selected, for example, by a usernavigating snapshots of backup data. In some implementations, the backupitems can be identified using snapshots providing visual representationsof an application user interface. The application user interfaceprovided by the snapshots can be similar to the user interface of theactual application. In one example, the snapshots presented can providea visual representation of a user interface for an e-mail application.The user can select email folders, messages, or other data from withinthe snapshot representation of the e-mail application.

Once the items have been selected for restoration, the system retrieves(404) the items from the stored backup data. For example, the backuprestoration engine 222 can locate and retrieve the items forrestoration. In some implementations, the stored items are created frommore than one file component. For example, an email message can becomprised of textual, graphical, audio, and metadata information. Eachtype of data may be separately stored as different file element which,combined, provide the contents of an email message. In this case, all ofthe elements associated with the selected item may be located andrestored together.

The system copies (406) the retrieved item to a “restore” location(e.g., a folder) in the application. In some implementations, if afolder labeled “restore” does not already exist, the “restore” foldercan be created by the application in response to a request from thebackup component, or alternatively, from the helper application. Theuser can then navigate to the “restore” folder (e.g., within the userinterface of the application), and access or move the item to a desiredlocation.

The backup component, in some implementations, can restore the selecteditems to their original locations. Restoring an item to its originallocation can, in some circumstances, require the recreation of thehierarchical structure it existed beneath. For example, if an addresscontact within an e-mail application were stored within “services”, andthe “services” directory no longer existed, the backup component wouldfirst create the “services” directory.

Once the restoration process is completed, the backup interface exits(408), returning the user to the application interface. In someimplementations, the user can execute multiple restoration activitiesduring the same backup interface session. For example, a user may wishto restore an e-mail message from a July 1 snapshot and an address bookcontact from a July 10 snapshot. In some implementations, the user isprovided with an exit mechanism such as a “done” button to signal thatthe backup interface session can end.

FIG. 5 is a screen shot depicting an example e-mail application userinterface 500. As shown in FIG. 5, the e-mail application user interface500 displays contents of the user's inbox including a listing of one ormore received messages. The e-mail application capabilities can includebut are not limited to sending and/or receiving digital content (e.g.,mail messages), generating digital content, storing contact informationwithin an address book, providing calendar data, task lists, and thelike. The e-mail application user interface 500 includes a list offolders 506, a folder contents display 508 displaying content from aselected folder from the list of folders 506, and a message content pane510. The e-mail application user interface 500 can display additionalinformation about folder contents in the folder contents display 508.For example, if the selected folder is an inbox and the folder contentdisplayed is a list of messages included in the inbox, metadataassociated with individual messages can be displayed. The metadatainformation can include a state of the message (e.g., read, unread) aswell as whether or not the message is flagged.

The backup component can be activated to back up content within theemail application or another application, as described previously. Inone implementation, the user can activate a backup interface sessionfrom the e-mail application menu bar 502 using a user-selectable icon504. In one example, the backup interface can be activated from theapplication menu bar 502 e.g., as a drop-down menu option.

An options menu in the application can include backup options allowing auser to specify application data to include in particular backupoperations. For example, in an e-mail application, the user can identifywhich content to include in the backup operations (e.g., all messages,individual message folders, address book, etc.). In someimplementations, the user can generate a restore folder where restoreddata can be copied during restore operations using the backup interface.

The user can enter the backup interface to recover items from the e-mailapplication including messages, folders, and address book contacts thatpreviously existed, but are now missing from the email application. Forexample, the user can have made at least one backup of the missingmessages at an earlier date, and can enter the backup interface tosearch for the missing messages in a backup snapshot of the e-mailapplication allowing for the restoration of the missing messages asdescribed above.

In some implementations, the user can choose to enter the backupinterface directly from an operating system menu. In someimplementations, the backup component can include several icons or menusavailable in other locations within the user interface 500 or runningapplications, thereby providing several options for activating orlaunching the backup interface.

FIG. 6 is a screen shot depicting an example of an initial state for abackup interface 600 after the backup component has been activated. Thebackup interface 600 includes a presentation window 602 and one or morefunction buttons. As shown, the presentation window 602 is displayingthe email application contents from FIG. 5 as they had existed inparticular backup snapshots 606. A current snapshot 606 a shows the userinterface of the e-mail application corresponding to a snapshot taken onAug. 17, 2005. The current snapshot 606 can, in some examples, be adefault selection such as the most recent snapshot captured. Thesnapshots 606 can be presented using a helper application that usesinformation from the application and the backup component to generate asnapshot that represents the user interface of the application. Forexample, the helper application can use information in a backup indexstored by the backup component in order to identify the data forbuilding the user interface of the application in the backup interface.When the backup index includes less information than the applicationinterface (e.g., by omitting metadata), the generated user interface canbe simplified accordingly.

As shown in FIG. 6, the current snapshot 606 a contains a simplifiedversion of the contents of an email application's user interface. Forexample, there is no display segment to view the contents of anindividual message, such as the content frame 510 (FIG. 5).Additionally, a list of folders 607 does not include a “Trash” folderthat exists in the e-mail application user interface of FIG. 5. In someimplementations, the trash contents are not included in the backupoperations, and therefore are not presented in the snapshots. In someimplementations, exclusion of the “Trash” folder from the emailapplication backups can be a default setting or user specified. In someimplementations, the backup interface can present the email applicationcontents exactly as it is portrayed within the email application.

In this particular example, the snapshots are presented in a cascadingstack, where the snapshots extend backwards in time. A snapshot 606 brepresents a snapshot captured prior to the Aug. 17, 2005 snapshot 606a. If the user selects snapshot 606 b, snapshot 606 b moves to the frontof the stack so that the contents of snapshot 606 b can be viewed.

In some implementations, the user can select items or content within thesnapshots 606. For example, the user can select the snapshot 606 a, andnext select one or more messages and/or folders to back up using thebackup interface 600. In addition, the same selection functionality canbe used in previous snapshots, such as snapshot 606 b, to restoremissing data to the state associated with the e-mail application userinterface shown in FIG. 5.

The cascade stack can contain any number of snapshots 606 representingearlier views of the e-mail application that have been stored accordingto previous backup operations. Each snapshot provides a screenshotrepresentation of an earlier version of the e-mail application at aparticular point in time. In some implementations, only a specifiednumber of snapshots are shown in the stack at any given time, however,the user can navigate to snapshots beyond those shown.

The backup user interface 600 can also include function controls. Forexample, the backup user interface 600 can include arrow buttons 604 aand 604 b to navigate the snapshots forward or backward in time. Arrowbuttons 604 a and 604 b can allow the user to navigate to additionalsnapshots not shown in the presentation window 602, thus there can be alarge number of snapshots from which to select.

In one implementation, a “show changed items only” button 608 filtersthe snapshots to show only those that differ from each other and/or fromthe current state. In one implementation, the button 608 does not referto the incremental changes between snapshots, but rather when invokedacts to omit those snapshots whose states are identical to the currentstate of the email application from presentation in the presentationwindow 602. For example, if the selected snapshot 606 a is identical tothe snapshot 606 b that occurs earlier in time, selecting the changeditems only button 608, in one implementation, causes the backupinterface to cease displaying one of these versions, e.g., by removingthe snapshot 606 b from the timeline. This can help the user to viewonly snapshots that contain changes to the current version.

The backup interface 600 can also include a “restore all” button 610that, when selected, restores the view to the selected state representedby the selected snapshot. In some implementations, this terminates thesession of the backup interface 600. A user can alternatively select oneor more individual elements in a snapshot and then select the restorebutton 610 to modify the current version of the element selected (e.g.,restore the state of the view). For example, in an e-mail application,the user can select a few messages to restore, and this can trigger therestore button 610 to display a more precise message, such as “restoreselection only.”

A “done” button 612 can be selected to exit the backup interface 600 andreturn the user to the current view of the application user interface,for example the e-mail application described in FIG. 5. In someimplementations, the backup interface 600 can automatically close uponrestoration of a particular snapshot or portion thereof. In someimplementations, the user can minimize the backup interface for purposesof navigating to other applications, such as an e-mail application or aweb browser.

FIG. 7 is a screen shot depicting the backup interface of FIG. 6 wherean item of a snapshot has been selected for restoration. For example,the user may enter the backup interface 600 to find a missing item(e.g., a missing e-mail message). As shown in FIG. 7, a message 702 hasbeen selected within the snapshot 606 a. Upon selecting the missingmessage 702, in some implementations, the restore button can change, asshown, from “Restore All” button 610 (FIG. 6) to a “Restore Item” button704. If the user selects the “Restore Item” button 704, the selectedmessage will be restored to the current e-mail application.

In some implementations, after selecting the restore button 704 thebackup interface can exit and return the user to the current view of thee-mail application user interface. In some implementations, the user canchoose to remain in the backup interface application to perform furtherrestorations (e.g., from different snapshots). When the user hascompleted this restoration session, the done button 612 can be selectedto return the user to the e-mail application user interface.

FIG. 8 is a screen shot showing a current view of the e-mail applicationuser interface 800 after some contents from an earlier version have beenrestored using the backup interface. As shown, a “Restored” folder 802is now included within the application folders 506. The restored itemscan be found within the “Restored” folder 802. In some implementations,the application can generate the “Restored” folder 802 the first time anitem is restored using the backup interface. The user can move therestored e-mail message from the “Restored” folder to another folder ina similar manner as any other e-mail message.

In another implementation, the backup interface can be used to presentbackup information associated with a messaging application. For example,the user can enter the backup interface to restore one or more deletedfriends from a “buddy list”, deleted conversations, preferences, and thelike. Similarly, other applications can be presented in the backupinterface in a similar manner using helper applications.

In the above description, for purposes of explanation, numerous specificdetails are set forth in order to provide a thorough understanding. Itwill be apparent, however, to one skilled in the art thatimplementations can be practiced without these specific details. Inother instances, structures and devices are shown in block diagram formin order to avoid obscuring the disclosure.

In particular, one skilled in the art will recognize that otherarchitectures and graphics environments can be used, and that theexamples can be implemented using graphics tools and products other thanthose described above. In particular, the client/server approach ismerely one example of an architecture for providing the functionalitydescribed herein; one skilled in the art will recognize that other,non-client/server approaches can also be used. Some portions of thedetailed description are presented in terms of algorithms and symbolicrepresentations of operations on data bits within a computer memory.These algorithmic descriptions and representations are the means used bythose skilled in the data processing arts to most effectively convey thesubstance of their work to others skilled in the art. An algorithm ishere, and generally, conceived to be a self-consistent sequence of stepsleading to a desired result. The steps are those requiring physicalmanipulations of physical quantities. Usually, though not necessarily,these quantities take the form of electrical or magnetic signals capableof being stored, transferred, combined, compared, and otherwisemanipulated. It has proven convenient at times, principally for reasonsof common usage, to refer to these signals as bits, values, elements,symbols, characters, terms, numbers, or the like.

It should be borne in mind, however, that all of these and similar termsare to be associated with the appropriate physical quantities and aremerely convenient labels applied to these quantities. Unlessspecifically stated otherwise as apparent from the discussion, it isappreciated that throughout the description, discussions utilizing termssuch as “processing” or “computing” or “calculating” or “determining” or“displaying” or the like, refer to the action and processes of acomputer system, or similar electronic computing device, thatmanipulates and transforms data represented as physical (electronic)quantities within the computer system's registers and memories intoother data similarly represented as physical quantities within thecomputer system memories or registers or other such information storage,transmission or display devices.

An apparatus for performing the operations herein can be speciallyconstructed for the required purposes, or it can comprise ageneral-purpose computer selectively activated or reconfigured by acomputer program stored in the computer. Such a computer program can bestored in a computer readable storage medium, such as, but is notlimited to, any type of disk including floppy disks, optical disks,CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), randomaccess memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, orany type of media suitable for storing data including electronicinstructions, and each coupled to a computer system bus.

The algorithms and modules presented herein are not inherently relatedto any particular computer or other apparatus. Various general-purposesystems can be used with programs in accordance with the teachingsherein, or it can prove convenient to construct more specializedapparatuses to perform the method steps. The required structure for avariety of these systems will appear from the description. In addition,the present examples are not described with reference to any particularprogramming language. It will be appreciated that a variety ofprogramming languages can be used to implement the teachings asdescribed herein. Furthermore, as will be apparent to one of ordinaryskill in the relevant art, the modules, features, attributes,methodologies, and other aspects can be implemented as software,hardware, firmware or any combination of the three. Of course, wherevera component is implemented as software, the component can be implementedas a standalone program, as part of a larger program, as a plurality ofseparate programs, as a statically or dynamically linked library, as akernel loadable module, as a device driver, and/or in every and anyother way known now or in the future to those of skill in the art ofcomputer programming. Additionally, the present description is in no waylimited to implementation in any specific operating system orenvironment.

The subject matter described in this specification can be implemented asone or more computer program products, i.e., one or more modules ofcomputer program instructions encoded on a computer readable medium forexecution by, or to control the operation of, data processing apparatus.The instructions can be organized into modules (or engines) in differentnumbers and combinations from the exemplary modules described. Thecomputer readable medium can be a machine-readable storage device, amachine-readable storage substrate, a memory device, a composition ofmatter effecting a machine-readable propagated signal, or a combinationof one or more them. The term “data processing apparatus” encompassesall apparatus, devices, and machines for processing data, including byway of example a programmable processor, a computer, or multipleprocessors or computers. The apparatus can include, in addition tohardware, code that creates an execution environment for the computerprogram in question, e.g., code that constitutes processor firmware, aprotocol stack, a database management system, an operating system, or acombination of one or more of them. A propagated signal is anartificially generated signal, e.g., a machine-generated electrical,optical, or electromagnetic signal, that is generated to encodeinformation for transmission to suitable receiver apparatus.

While this specification contains many specifics, these should not beconstrued as limitations on the scope of what may be claimed, but ratheras descriptions of features specific to particular implementations ofthe subject matter. Certain features that are described in thisspecification in the context of separate embodiments can also beimplemented in combination in a single embodiment. Conversely, variousfeatures that are described in the context of a single embodiment canalso be implemented in multiple embodiments separately or in anysuitable subcombination. Moreover, although features may be describedabove as acting in certain combinations and even initially claimed assuch, one or more features from a claimed combination can in some casesbe excised from the combination, and the claimed combination may bedirected to a subcombination or variation of a subcombination.

Similarly, while operations are depicted in the drawings in a particularorder, this should not be understood as requiring that such operationsbe performed in the particular order shown or in sequential order, orthat all illustrated operations be performed, to achieve desirableresults. In certain circumstances, multitasking and parallel processingmay be advantageous.

Moreover, the separation of various system components in the embodimentsdescribed above should not be understood as requiring such separation inall embodiments, and it should be understood that the described programcomponents and systems can generally be integrated together in a singlesoftware product or packaged into multiple software products.

The subject matter of this specification has been described in terms ofparticular embodiments, but other embodiments can be implemented and arewithin the scope of the following claims. For example, the actionsrecited in the claims can be performed in a different order and stillachieve desirable results. As one example, the processes depicted in theaccompanying Figures do not necessarily require the particular ordershown, or sequential order, to achieve desirable results. In certainimplementations, multitasking and parallel processing may beadvantageous. Other variations are within the scope of the followingclaims.

1. A method, comprising: at a backup module of a computing device:identifying at least one restore point associated with an application;receiving a first selection of a restore point; displaying theapplication based on the selected restore point; receiving a secondselection for viewing a file associated with the selected restore point;receiving a third selection to restore the file, wherein the thirdselection identifies a destination folder to which the file is to berestored; and restoring the file to the destination folder.
 2. Themethod of claim 1, further comprising: displaying the at least onerestore point in a first user interface; and displaying the applicationbased on the selected restore point in a second user interface.
 3. Themethod of claim 1, wherein displaying the application includesdisplaying a folder, and receiving the second selection includes openingthe folder.
 4. The method of claim 1, wherein the at least one restorepoint is associated with a stored backup of the application.
 5. Themethod of claim 1, further comprising: displaying the at least onerestore point and a date associated with the at least one restore pointin a first user interface.
 6. The method of claim 1, wherein receivingthe third selection includes a dragging operation where a first iconrepresenting the file is dragged to a second icon representing thedestination folder.
 7. The method of claim 1, wherein the destinationfolder is accessible to an active version of the application.
 8. Anon-transitory machine-readable medium storing instructions that whenexecuted by a processor in a computing device cause the computing deviceto perform the steps of: identifying at least one restore pointassociated with an application; receiving a first selection of a restorepoint; displaying the application based on the selected restore point;receiving a second selection for viewing a file associated with theselected restore point; receiving a third selection to restore the file,wherein the third selection identifies a destination folder to which thefile is to be restored and the application is accessible; and restoringthe file to the destination folder.
 9. The non-transitorymachine-readable medium of claim 8, wherein the steps include:displaying the at least one restore point in a first user interface; anddisplaying the application based on the selected restore point in asecond user interface.
 10. The non-transitory machine-readable medium ofclaim 8, wherein displaying the application includes displaying afolder, and receiving the second selection includes opening the folder.11. The non-transitory machine-readable medium of claim 8, wherein theat least one restore point is associated with a stored backup of theapplication.
 12. The non-transitory machine-readable medium of claim 8,wherein receiving the third selection includes a dragging operationwhere a first icon representing the file is dragged to a second iconrepresenting the destination folder.
 13. The non-transitorymachine-readable medium of claim 8, wherein the steps include:displaying the at least one restore point and a date associated with theat least one restore point in a first user interface.
 14. A computingdevice, comprising: a processor; and a memory storing instructions thatwhen executed by the processor, cause the computing device to performthe steps of: identifying at least one restore point associated with anapplication; receiving a first selection of a restore point; displayingthe application based on the first selection; receiving a secondselection for viewing a file associated with the selected restore point;receiving a third selection to restore the file, wherein the thirdselection identifies a destination folder to which the file is to berestored; and restoring the file to the destination folder.
 15. Thecomputing device of claim 14, wherein the steps include: displaying theat least one restore point in a first user interface; and displaying theapplication based on the selected restore point in a second userinterface.
 16. The computing device of claim 14, wherein the stepsinclude: wherein displaying the application includes displaying afolder, and receiving the second selection includes opening the folder.17. The computing device of claim 14, wherein the at least one restorepoint is associated with a stored backup of the application.
 18. Thecomputing device of claim 14, wherein the steps include: displaying theat least one restore point and a date associated with the at least onerestore point in a first user interface.
 19. The computing device ofclaim 14, wherein receiving the third selection includes a draggingoperation where a first icon representing the file is dragging to asecond icon representing the destination folder.
 20. The computingdevice of claim 14, wherein the destination folder is accessible by alatest version of the application on the computing device.