Methods, systems and products for data backup

ABSTRACT

Methods, systems and computer program products automatically back-up data. Communication is established among a first device, a second device, and a network-based storage device. Key words associated with uniform resource locators are identified and stored in the network-based storage device. When corruption is detected of the data stored in the first device, the key words are automatically retrieved from the network-based storage device and listed in a user interface displayed at the second device.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.13/434,892, filed Mar. 30, 2012, which is a continuation of U.S.application Ser. No. 11/930,362, filed Oct. 31, 2007 (now U.S. Pat. No.8,170,987), both of which are incorporated herein by reference in theirentirety.

BACKGROUND

The present application relates generally to data and, moreparticularly, to methods, systems, and computer program products fordata backup and recovery.

Data processing devices, such as personal computers (PCs), wirelessdevices, and other consumer electronic devices typically contain data ina file format. At least some of the data on these devices needs to bebacked up to protect against crashes and/or for archival purposes toallow for future recovery in case of data loss. Some operating systemsinclude backup and recovery tools that may allow users to personallybackup and recover their data. Unfortunately, conventional data backuptools may not be automatic, may not be user friendly, and may be complexand non-intuitive to the general user, particularly with respect toselection of files to be backed up. Conventional data backup toolstypically are “volume centric” in that they allow selection and backupof large groups of files, rather than selection and backup of individualfiles. In addition, the amount of data stored on user devices hasincreased dramatically in recent years. The sheer volume of data maymake it difficult for users to periodically backup their data. Withrespect to wireless devices, back up of data typically should beperformed at non-peak times, particularly when a user is being chargedfor connection time, which may be inconvenient for a user. As such, manyusers do not currently back up data on their devices and, thus, may notbe able to restore files in the aftermath of a device crash or otherevent that causes data loss.

SUMMARY

According to exemplary embodiments, systems, methods and computerprogram products are provided that facilitate intelligent, automaticselection of content on consumer electronic devices to be backed up.User-defined rules selectively and automatically backup data to anetwork, to another external device or even to an internal chip ormemory. Via a user-friendly interface, users can initially set up thecriteria (e.g., files to be backed up and location for storage of backedup data, etc.) for data backup, and thereafter, data backup can occurautomatically.

According to some embodiments, a data backup and retrieval systemincludes a network based storage service device that is configured toidentify for backup content stored on a customer premise equipment (CPE)device connected or connectable to a communications network, and tostore a copy of the identified content at one or more locations remotefrom the CPE device via the communications network. The network basedstorage service device includes a content identification module thatautomatically identifies content to be backed up based on rulesassociated with, for example, content file type, content creation date,content storage location on the CPE device, content priority, useridentification, and/or user activity. In addition, the network basedstorage service device may be configured to identify content to bebacked up and to store a copy of the identified content at one or morelocations remote from the CPE device in response to receiving a userrequest from the CPE device. The network based storage service deviceincludes a content replication module that is configured to retrievecontent stored at the one or more remote locations and replicate theretrieved content on the CPE device, for example, when the content hasbecome corrupted on the CPE device, when the content is lost, when theCPE device crashes, etc.

The network based storage service device requests user input toestablish rules that allow the network based storage service device tointelligently identify content to be backed up. In some embodiments, auser interface is displayed on the CPE device that allows a user toprovide various criteria for establishing the rules.

Once identified, content to be backed up can be stored at one or moreremote locations immediately, at one or more predetermined future times,and/or at other favorable times. For example, identified content can bestored at one or more remote locations at a time when communicationsnetwork traffic is at a reduced level, or at a time when user chargesfor use of a communications network are lower or nonexistent. In someembodiments, content may be stored at one or more remote locations in acompressed format.

Some CPE devices may access content at a remote location, for example,at a web server. The network based storage service device is configuredto identify content accessed by a CPE device and to store metadataassociated with the accessed content. For example, the network basedstorage service device may store keywords, content address, etc.

According to other embodiments, a data backup and retrieval systemincludes a network based storage service device that may be utilizedwith a plurality of interconnected or interconnectable CPE devices. Thenetwork based storage service device is configured to identify forbackup content stored on each of a plurality of CPE devices connected orconnectable to a communications network and located in proximity to eachother, and to store a copy of the identified content at one or more ofthe other CPE devices. The network based storage service device isconfigured to automatically identify content to be backed up based onrules associated with, for example, content file type, content creationdate, content storage location on the CPE device, content priority, useridentification, and/or user activity. The network based storage servicedevice is also configured to retrieve content stored at one or more ofthe proximity devices and replicate the retrieved content on a CPEdevice, for example, when the content has become corrupted on the CPEdevice, when the content is lost, when the CPE device crashes, etc. Thenetwork based storage service device displays a user interface on a CPEdevice that includes a listing of the content on each proximity device.As such, a user can see what content is stored on each of the devicesand what backup content is stored on each of the devices. In someembodiments, when more than one user utilizes a CPE device, the networkbased storage service device maintains a separate user log for thecontent of each user.

A data backup and retrieval method, according to some embodiments,includes automatically identifying content stored on a CPE device to bebacked up, determining one or more locations remote from the CPE devicefor storing the identified content, and storing a copy of the identifiedcontent at the one or more locations. The content to be backed up isautomatically identified based on rules associated with content filetype, content creation date, storage location on the CPE device, contentpriority, user identification, and/or user activity. Identified contentmay be stored at one or more devices in proximity to a CPE device. Whena CPE device loses content as a result of a crash or other cause of dataloss, the stored content is retrieved from the one or more remotelocations and replicated on the CPE device.

Other systems, methods and computer program products according toexemplary embodiments will be or become apparent to one with skill inthe art upon review of the following drawings and detailed description.It is intended that all such additional systems, methods and computerprogram products be included within this description, be within thescope of the present invention, and be protected by the accompanyingclaims.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which form a part of the specification,illustrate some exemplary embodiments. The drawings and descriptiontogether serve to fully explain the exemplary embodiments.

FIGS. 1 and 2 are block diagrams that illustrate software/hardwarearchitectures for intelligently identifying content and backing upidentified content, according to some embodiments.

FIG. 3 is a flowchart that illustrates exemplary operations forintelligently identifying content and backing up identified content,according to some embodiments.

FIG. 4 is a block diagram that illustrates details of a network basedstorage device for intelligently identifying content and backing upidentified content, according to some embodiments.

DETAILED DESCRIPTION

While the invention is susceptible to various modifications andalternative forms, specific embodiments thereof are shown by way ofexample in the drawings and will herein be described in detail. Itshould be understood, however, that there is no intent to limit theinvention to the particular forms disclosed, but on the contrary, theinvention is to cover all modifications, equivalents, and alternativesfalling within the spirit and scope of the invention as defined by theclaims. Like reference numbers signify like elements throughout thedescription of the figures.

As used herein, the singular forms “a,” “an,” and “the” are intended toinclude the plural forms as well, unless expressly stated otherwise. Itshould be further understood that the terms “comprises” and/or“comprising” when used in this specification is taken to specify thepresence of stated features, steps, operations, elements, and/orcomponents, but does not preclude the presence or addition of one ormore other features, steps, operations, elements, components, and/orgroups thereof. It will be understood that when an element is referredto as being “connected” or “coupled” to another element, it can bedirectly connected or coupled to the other element or interveningelements may be present. Furthermore, “connected” or “coupled” as usedherein may include wirelessly connected or coupled. As used herein, theterm “and/or” includes any and all combinations of one or more of theassociated listed items.

Unless otherwise defined, all terms (including technical and scientificterms) used herein have the same meaning as commonly understood by oneof ordinary skill in the art. It will be further understood that terms,such as those defined in commonly used dictionaries, should beinterpreted as having a meaning that is consistent with their meaning inthe context of the relevant art and will not be interpreted in anidealized or overly formal sense unless expressly so defined herein.

Exemplary embodiments may be implemented as systems, methods, and/orcomputer program products. Accordingly, the exemplary embodiments may beimplemented in hardware and/or in software, including firmware, residentsoftware, micro-code, etc. Furthermore, exemplary embodiments may takethe form of a computer program product on a computer-usable orcomputer-readable storage medium having computer-usable orcomputer-readable program code embodied in the medium for use by or inconnection with an instruction execution system. In the context of thisdocument, a computer-usable or computer-readable medium may be anymedium that can contain, store, communicate, propagate, or transport theprogram for use by or in connection with the instruction executionsystem, apparatus, or device.

The computer-usable or computer-readable medium may be, for example butnot limited to, an electronic, magnetic, optical, electromagnetic,infrared, or semiconductor system, apparatus, device, or propagationmedium. More specific examples (a non-exhaustive list) of thecomputer-readable medium would include the following: a portablecomputer diskette, a random access memory (RAM), a read-only memory(ROM), an erasable programmable read-only memory (EPROM or Flashmemory), and a portable compact disc read-only memory (CD-ROM).

As used herein, the terms “data” and “content” are interchangeable andmean any type of audio information, video information, audio/videoinformation, text, images, games, applications, sensor data, medicalrecords, etc., that is in a file format and that can be backed up andrecovered.

Computer program code for carrying out operations of data processingsystems discussed herein may be written in a high-level programminglanguage, such as Java, AJAX (Asynchronous JavaScript), C, and/or C++,for development convenience. In addition, computer program code forcarrying out operations of exemplary embodiments may also be written inother programming languages, such as, but not limited to, interpretedlanguages. Some modules or routines may be written in assembly languageor even micro-code to enhance performance and/or memory usage. Exemplaryembodiments are not limited to a particular programming language. Itwill be further appreciated that the functionality of any or all of theprogram modules may also be implemented using discrete hardwarecomponents, one or more application specific integrated circuits(ASICs), or a programmed digital signal processor or microcontroller.

Exemplary embodiments are described herein with reference to flowchartand/or block diagram illustrations of methods, systems, and computerprogram products in accordance with exemplary embodiments of theinvention. These flowchart and/or block diagrams further illustrateexemplary operations for facilitating intelligent backup of data, inaccordance with some embodiments. It will be understood that each blockof the flowchart and/or block diagram illustrations, and combinations ofblocks in the flowchart and/or block diagram illustrations, may beimplemented by computer program instructions and/or hardware operations.These computer program instructions may be provided to a processor of ageneral purpose computer, a special purpose computer, or otherprogrammable data processing apparatus to produce a machine, such thatthe instructions, which execute via the processor of the computer orother programmable data processing apparatus, create means and/orcircuits for implementing the functions specified in the flowchartand/or block diagram block or blocks.

These computer program instructions may also be stored in a computerusable or computer-readable memory that may direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer usable orcomputer-readable memory produce an article of manufacture includinginstructions that implement the function specified in the flowchartand/or block diagram block or blocks.

The computer program instructions may also be loaded onto a computer orother programmable data processing apparatus to cause a series ofoperational steps to be performed on the computer or other programmableapparatus to produce a computer implemented process such that theinstructions that execute on the computer or other programmableapparatus provide steps for implementing the functions specified in theflowchart and/or block diagram block or blocks. The computer programinstructions can be executed within one or more network devicesimplementing the network service described below and/or within any userdevice.

Referring to FIG. 1, a data backup and retrieval system, according tosome embodiments, is illustrated. The illustrated system includes an“intelligent” network based storage service device 100 (shown in detailin FIG. 4) that provides a network service to identify for backupcontent stored one or more a customer premise equipment (CPE) devices(110 a, 110 b, 110 c, 110 d) that are connectable to a communicationsnetwork 120, and to store a copy of the identified content at one ormore locations remote from the respective CPE device via thecommunications network 120. The network based storage service device 100is also configured to retrieve content stored at the one or more remotelocations and replicate the retrieved content on a CPE device, forexample, when the content becomes corrupted on the CPE device, when thecontent is lost, when the CPE device crashes, etc.

The illustrated CPE devices include a desktop computer 110 a, a laptopor other mobile computing device 110 b, a cell phone or PDA 110 c, and aset top box 110 d. However, the network based storage service device 100is configured to identify content and backup content from any type ofdevice that can be connected to a communications network. For example,CPE devices may include web-enabled cameras and any other devicesconfigured to create content and/or access content from another source,without limitation. The term “CPE device” is intended to include alluser devices connected to a communications network or capable of beingconnected to a communications network.

Communications network 120 may be the Internet or other publiclyaccessible network, a wide area network, a local area network, anIntranet, or other private network, etc. Communication network 120 mayalso include a combination of public and private networks or a virtualprivate network (VPN). Communications via the communication network 120may occur over-the-air and/or through a dedicated distribution network.The illustrated communications network 120 is intended to include allpossible types of communications networks, without limitation.

In some embodiments, the network based storage service device 100 isconfigured to identify content accessed by a CPE device (110 a, 110 b,110 c, 110 d), for example, content accessed from a web server via theinternet. The network based storage service device 100 stores metadataassociated with accessed content at one or more remote locations. Thestored metadata includes enough information to allow a user to return tothe source of the content. Exemplary metadata may include, but is notlimited to, an address of the content (i.e., a uniform resource locatoror URL, etc.), key words associated with the content, etc.

The network based storage service device 100 automatically identifiescontent to be backed up based on established rules. These rules providethe network service with the “intelligence” to identify content thatshould be backed up with little or no input required from a user. Therules for establishing this intelligence may be predefined by thenetwork based storage service device 100 and/or may be defined based oninput from a user of a CPE device (110 a, 110 b, 110 c, 110 d). Userinput may be provided initially, prior to use of the network service.User input may also be continuously solicited by the network basedstorage service 100 device in order to improve the quality of contentbackup.

Exemplary rules for identifying content to be backed up include, but arenot limited to, content file type, content creation date, contentstorage location on a CPE device, content priority, user identification,and/or user activity. For example, a rule may specify that all imagefiles with the file extension “jpg” are to be identified and backed up,and that all text files with the extension “doc” are to be identifiedand backed up. As another example, a rule may specify that certain filescreated in a particular period of time are to be backed up. For example,all “doc” text files created in the last three hours are to beidentified and backed up.

As another example, a rule may specify that all files in one or moreparticular storage folders on a CPE device are to be backed up. Forexample, all files in the folder “my documents” are to be identified andbacked up. Rules may also be directed to identifying content with acertain priority level. For example, image files may have a higherpriority than video files. Furthermore, the need to back up files from aparticular CPE device may be assigned a priority. For example, a highpriority may indicate to always back up files from a device. A mediumpriority may indicate to sometimes back up files. A low priority mayindicate that back up is optional, etc.

As another example, a rule may specify that all files, or some files,associated with a particular user are to be identified and backed up.For example, if multiple users utilize a particular CPE device, thecontent created by and/or accessed by a particular user may beidentified and backed up, i.e., all content associated with “Joe Smith”is to be identified and backed up. As another example, a rule mayspecify that content that a user is currentlycreating/modifying/accessing is to be backed up.

User input may be solicited to establish the various rules utilized bythe network based storage service device 100. Moreover, user input mayalso be solicited to identify content to be backed up. The user inputmay be provided via a user interface displayed on a CPE device. In someembodiments, a displayed user interface may include an easy tounderstand hierarchical tree structure of files (e.g., a structuresimilar to Windows® Explorer®) located on a CPE device and/or of contentlocated at other locations. However, embodiments are not limited to suchan interface. Various types of user interfaces may be utilized, withoutlimitation.

In some embodiments, content identification and backup may be requestedby a user and/or by a CPE device. Such requests may be in addition toand/or in lieu of automatic content identification and backup.

Once identified, content to be backed up is stored at one or more remotelocations via the network based storage service device 100. These one ormore remote locations may include other CPE devices, other deviceslocated on a local area network (LAN), other devices located on a widearea network (WAN), other locations that are connectable to thecommunications network 120, etc. In some embodiments, the network basedstorage service device 100 stores a copy of identified content at one ormore remote locations at one or more predetermined times during a day.In other embodiments, the network based storage service device stores acopy of identified content at one or more remote locations at a timewhen communications network traffic is at a reduced level.

The network based storage service device 100 may be configured to storeidentified content at one or more remote locations in a compressedformat. For example, compression algorithms may be applied to a copy ofidentified content prior to, or at the time of, storing the content copyat a remote location. Compression technology is well understood and neednot be described further herein. Any of various types of compressiontechnologies may be utilized, without limitation.

Referring to FIG. 2, the network based storage service device 100 ofFIG. 1 may be utilized with a plurality of interconnected orinterconnectable CPE devices, referred to as “proximity” devices. Insome embodiments, the network based storage service device 100 isconfigured to identify for backup content stored (e.g., within localdata storage 112) on each of a plurality of CPE devices 110 connected orconnectable to a communications network 120 and located in proximity toeach other, and to store a copy of the identified content at one or moreof the other CPE devices. For example, a user with a PDA containingcontent moves the PDA within a predetermined distance (e.g., twentyfeet, etc.) of a desktop PC. Upon recognizing the proximity of the twodevices, the network based storage service device 100 stores a copy ofidentified PDA content on the desktop PC. This content may have beenpreviously identified by the network based storage service device 100prior to the PDA coming within a predetermined distance of the desktopPC. In some embodiments, content identification may not occur until thePDA comes within a predetermined distance of the desktop PC.

The network based storage service device 100 is configured toautomatically identify content to be backed up based on rules, asdescribed above. In some embodiments, content identification and backupmay be requested by a user and/or by a CPE device when a CPE devicecomes within proximity of another CPE device. Such requests may be inaddition to and/or in lieu of automatic content identification andbackup. The network based storage service device 100 is also configuredto retrieve content stored at one or more of the proximity devices andreplicate the retrieved content on a CPE device, for example, when thecontent has become corrupted on the CPE device, when the content islost, when the CPE device crashes, etc.

The network based storage service device 100 is configured to display auser interface 130 that includes a listing of the content of eachproximity device 110. As such, a user can see what content is stored oneach of the devices 110 and what backup content is stored on each of thedevices. In some embodiments, when more than one user utilizes a CPEdevice 110, the network based storage service device 100 maintains aseparate user log for the content of each user. As such, if one of theCPE devices 110 is utilized by two users with different accessprivileges, for example, such that each user can only access his/herrespective content, the network based storage service device, via theuse of logs 140, knows what content to backup on a device when aparticular user is logged onto the device.

Exemplary operations of a data backup and retrieval system, according tosome embodiments, will now be described with reference to FIG. 3.Content is created by a CPE device 110 and stored on a CPE device (Block200). A descriptive file for the content is created (Block 210). Forexample, if a CPE device is a cell phone, and the created content is animage captured by the cell phone camera, the captured image may be givena descriptive name (e.g., image1.jpg, etc.). As described above, adescriptive file may also be metadata that describes remotely-locatedcontent that has been accessed by the CPE device, for example, via theinternet, etc.

The network based storage service device 100 is configured tointelligently identify content to be backed up by comparing varioustypes of information to pre-established rules (Block 220). For example,as described above, content to be backed up may be identified based onrules associated with content file type, content creation date, storagelocation on the CPE device, content priority, user identification,and/or user activity. The network based storage service device 100utilizes these rules to decide whether to back up content and alsodecides where to store the identified content (Block 230).

The network based storage service device 100 is also configured toretrieve content stored at one or more remote locations (or at one ormore proximity devices) and replicate the retrieved content on a CPEdevice (Block 240) when, for example, content has become corrupted onthe CPE device, when content is lost, when the CPE device crashes, etc.

A user interface maintained by the network based storage service device100 is updated (Block 250) whenever the network based storage servicedevice 100 “handles” content. For example, a user interface may beupdated when identified content from a CPE device is copied and storedon another device. The user interface may be updated when content isretrieved from a storage location and replicated on a CPE device, etc.

FIG. 3 illustrates the operations involved in identifying for backupcontent stored on a CPE device connected or connectable to acommunications network and storing a copy of the identified content atone or more locations remote from the CPE device via the communicationsnetwork. According to an exemplary embodiment, each block represents amodule, segment, or portion of code, which comprises one or moreexecutable instructions for implementing the specified logicalfunction(s). It should also be noted that in other implementations, thefunction(s) noted in the blocks may occur out of the order noted in FIG.3. For example, two blocks shown in succession may, in fact, be executedsubstantially concurrently or the blocks may sometimes be executed inthe reverse order, depending on the functionality involved.

FIG. 4 illustrates details of a network based storage device 100according to an exemplary embodiment. The device 100 includes aprocessor 300 and a memory 302 for identifying content for backup andstoring the identified content. The processor 300 communicates with thememory 302 via an address/data bus 304. The processor 300 may be, forexample, a commercially available or custom microprocessor. The memory302 is representative of the overall hierarchy of memory devicescontaining the software and data used to implement a network basedstorage service device as described herein, in accordance with someembodiments. The memory 302 may include, but is not limited to, thefollowing types of devices: cache, ROM, PROM, EPROM, EEPROM, flash,SRAM, and DRAM.

As shown in FIG. 4, the memory 302 may hold various categories ofsoftware and data: an operating system 306, a content identification andbackup module 308, and a content replication module 310. The operatingsystem 306 controls operations of the services provided by the device100 (or a portion of services). In particular, the operating system 306may manage a device's resources and may coordinate execution of variousprograms (e.g., the content identification and backup module 308,content replication module 310, etc.) by the processor 300.

The network based storage service device 100 can communicate in variousways with CPE devices. For example, the network based storage servicedevice 100 can communicate with CPE devices via a communications network120 over a wireless and/or wired connection. In some embodiments, thenetwork based storage service device 100 can communicate with CPEdevices over network protocols like HTTP or TCP/IP, etc. In addition,the network based storage service device 100 can communicate wirelesslywith one or more of the CPE devices, such as via an RF communicationlink using an antenna. Other means of wireless communication between thenetwork based storage service device 100 and CPE devices can beemployed, such as optical infrared (IR) and/or non-line-of-sightcommunications links.

The content identification and backup module 308 comprises logic forintelligently identifying content from a CPE device and storing a copyof the identified content at one or more remote locations (or one ormore proximity devices), as described above. The content identificationand backup module 308 also comprises logic for determining one or morelocations to store copies of identified content. The content replicationmodule 310 comprises logic for retrieving content stored at the one ormore remote locations and replicating the retrieved content on a CPEdevice, for example, when the content has become corrupted on the CPEdevice, when the content is lost, when the CPE device crashes, etc.

Many variations and modifications can be made to the preferredembodiments without substantially departing from the principles of thepresent invention. All such variations and modifications are intended tobe included herein within the scope of the present invention, as setforth in the following claims.

The invention claimed is:
 1. A method comprising: receiving, by aserver, a content associated with a backup service, the content sent viaa network from a mobile device registered for the backup service;determining, by the server, a plurality of devices in a networkproximity to the mobile device; facilitating, by the server,communications via the network with the plurality of devices in thenetwork proximity to the mobile device; transferring, from the server,portions of the content associated with the backup service to theplurality of devices in the network proximity to the mobile device, theportions of the content transferred via the network as restorationcopies according to the backup service; logging, by the server, uniformresource locators describing the portions of the content transferred tothe plurality of devices as the restoration copies according to thebackup service; sending, by the server, a listing of keywords associatedwith the uniform resource locators describing the portions of thecontent transferred to each device in the plurality of devices in thenetwork proximity to the mobile device; retrieving, by the server, therestoration copies via the network from the plurality of devices in thenetwork proximity to the mobile device; and sending, by the server, therestoration copies via the network to the mobile device as the backupservice.
 2. The method of claim 1, further comprising determining thenetwork proximity based on a location associated with the mobile device.3. The method of claim 1, further comprising determining the networkproximity based on a distance from the mobile device.
 4. The method ofclaim 1, further comprising sending a user interface to the mobiledevice, the user interface presenting the listing of the keywords. 5.The method of claim 1, further comprising storing metadata associatedwith the content associated with the backup service.
 6. The method ofclaim 1, further comprising executing a rule that specifies the contentassociated with the backup service.
 7. The method of claim 1, furthercomprising determining a corruption of the content associated with thebackup service.
 8. The method of claim 1, further comprising determininga corruption of the content stored by the mobile device.
 9. The methodof claim 1, further comprising sending a user interface from the serverto the mobile device, the user interface comprising the listing of thekeywords associated with the uniform resource locators describing theportions of the content transferred to each device.
 10. The method ofclaim 1, further comprising determining a traffic in the network. 11.The method of claim 1, further comprising logging the portions of thecontent transferred to the plurality of devices as the restorationcopies.
 12. A system, comprising: at least one processor; and a memorydevice, the memory device storing executable instructions, theexecutable instructions when executed by the at least one processorfacilitate performance of operations, the operations comprising:communicating via a wireless network with a mobile device; communicatingvia the wireless network with a plurality of other mobile devices in anetwork proximity to the mobile device; identifying a content accessedvia the wireless network by the mobile device; retrieving apredetermined rule associated with the mobile device, the predeterminedrule associated with a backup service; identifying portions of thecontent to be backed up, using the predetermined rule associated withthe backup service; transferring the portions of the content to bebacked up from the mobile device via the wireless network to anetwork-based storage device; transferring the portions of the contentto be backed up as restoration copies from the network-based storagedevice to different ones of the plurality of the other mobile devices inthe network proximity to the mobile device; logging keywords and uniformresource locators describing the portions of the content transferred asthe restoration copies to the different ones of the plurality of theother mobile devices; sending a user interface via the wireless networkto the mobile device, the user interface listing the keywords and theuniform resource locators describing the portions of the contenttransferred as the restoration copies to the different ones of theplurality of the other mobile devices; retrieving at least one of therestoration copies via the network-based storage device from thedifferent ones of the plurality of the other mobile devices in responseto an input to the user interface selecting a corresponding one of thekeywords and the uniform resource locators as a restoration copy of therestoration copies; and transferring the restoration copy from thenetwork-based storage device to the mobile device as the backup service.13. The system of claim 12, wherein the operations further comprisedetermining the network proximity to the mobile device based on alocation.
 14. The system of claim 12, wherein the operations furthercomprise determining the network proximity to the mobile device based ona predetermined distance.
 15. The system of claim 12, wherein theoperations further comprise specifying the keywords associated with theuniform resource locators that are stored as the restoration copy. 16.The system of claim 12, wherein the operations further comprise sendingthe user interface from the network-based storage device to the mobiledevice.
 17. The system of claim 12, wherein the operations furthercomprise logging the restoration copy.
 18. A method comprising:facilitating, by a system comprising a processor, a communication with acustomer device via a communications network; facilitating, by thesystem, the communication via the communication network with a pluralityof other devices in a network proximity to the customer device;identifying, by the system, a content accessed by the customer devicevia the communications network; retrieving, by the system, apredetermined rule associated with a backup service associated with thecustomer device; identifying, by the system, a portion of the contentassociated with the backup service using the predetermined rule;transferring, by the system, the portion of the content associated withthe backup service from the customer device to a network-based storagedevice; transferring, by the system, the portion of the contentassociated with the backup service from the network-based storage deviceas restoration copies to different ones of the plurality of otherdevices in the network proximity to the customer device; logging, by thesystem, keywords and uniform resource locators for retrieving theportion of the content stored as the restoration copies to the differentones of the plurality of other devices; sending, by the system, a userinterface via the communications network from the network-based storagedevice to the customer device, the user interface listing the keywordsand the uniform resource locators describing the restoration copiestransferred to the different ones of the plurality of other devices inthe network proximity to the customer device; retrieving, by the system,at least one of the restoration copies from any of the plurality of theother devices in response to an input associated with the userinterface; and transmitting, by the system, the at least one of therestoration copies to the customer device in response to the inputassociated with the user interface.
 19. The method of claim 18, furthercomprising specifying the uniform resource locators that are stored asthe restoration copies at the plurality of the other devices.
 20. Themethod of claim 18, further comprising identifying the keywords and theuniform resource locators retrievable from each one of the plurality ofother devices in the network proximity to the customer device.