`
`US 6,735,623 Bl
`Page 2
`
`OIBER PUBLICATIONS
`
`World Wide Web Distributed Authoring and Versioning:
`Web DAV, Whitehead, E.J., WebDAV Information, Feb.
`1999, pp. 1-2.
`Requirements for Distributed Authoring and Versioning on
`the World Wide Web, Slein, J.A.; Vitali, F.; Whitehead, Jr.,
`E.J.; Durand, D.G.; Standard View VI. 5, No. 1, Mar. 1997,
`ISSN: 1067-9936, pp. 17-24.
`How to implement Web-based groupware systems based on
`WebDAV, Dridi, F.; Neumann, G., Enabling Technologies:
`Infrastructure for Collaborative Enterprises, Jun. 1999, Pro(cid:173)
`ceedings IEEE 8'\ ISBN: 0-7695-0365-9, pp. 114-119.
`Open Door Networks Introduces New Products for Apple(cid:173)
`share Servers, pp. 1-2, Sep. 1997.
`ShareWay IP 2.0, pp. 1-2, Feb. 1997.
`Open Door Network Products Enhance MAC OS 8, p. 1,
`Aug. 1997.
`U.S. patent application entitled, "Method and System for
`Seamless Access to a Remote Storage Area," Ser. No.
`09/501,041, filed Feb. 9, 2000.
`U.S. patent application entitled, "Remote Storage Area
`Having Multiple Access Interfaces," Ser. No. 09/500,868,
`filed Feb. 9, 2000.
`International Search Report from Application No. PCT/US
`01/04352 mailed Oct. 9, 2003 (3 pages).
`
`http://www.webdav.org-WebDAV Resources, pp. 1-3,
`printed Jun. 15, 2000.
`http://www.backup.com-@ Backup®, p. 1, printed Jun.
`15, 2000.
`http://www.bitlocker.com-Bitlocker, p. 1, printed Jun. 15,
`2000.
`http://www.datahubonline.com-datahubonline.com, p. 1,
`printed Jun. 15, 2000.
`http://www.diskonnet.com-DiskOnNet.com, p. 1, printed
`Jun. 15, 2000.
`http://www.docspace.com-Critical Path Inc., p. 1, printed
`Jun. 15, 2000.
`http://www.driveway.com-Driveway Corporation, p. 1,
`printed Jun. 15, 2000.
`http://www.itools.mac.com-Apple-iTools, p. 1, printed
`Jun. 15, 2000.
`http://www.filemonkey.com-File Monkey Software Devel(cid:173)
`opment Services, p. 1, printed Jun. 15, 2000.
`http://www.freedrive.com-FreeDrive, Inc, p. 1, printed
`Jun. 15, 2000.
`http://www.xinet.com-Xinet, Inc., p. 1, printed Jun. 15,
`2000.
`
`* cited by examiner
`
`
`
`i,-
`~
`~
`N
`O'I
`~ (It
`
`O'I
`rJ'J.
`e
`
`00
`
`"'"" 0 ....,
`~ ....
`'JJ. =(cid:173)~
`
`,i;;..
`C
`C
`N
`!'"'
`"'""
`'-<
`~
`~
`
`~ = .....
`~ .....
`~
`r:JJ. .
`d .
`
`51
`I
`
`LOCAL AREA NETWORK
`
`-20
`
`\ B
`
`124
`
`Computer
`Remote
`
`49 -
`
`7
`
`'
`
`40
`I
`~~o
`
`=
`~ Modem I
`
`r' 129
`
`FIG. 1
`
`42
`
`[d-151 0 152
`
`"
`,
`
`Interface
`Network
`
`Ports
`
`Input I Output
`
`\
`53
`
`I
`
`l
`128
`
`l
`122
`
`l
`118
`
`.
`
`Optical Drive
`
`Floppy Disk Drive
`
`\
`121
`
`I
`
`Adapter
`Video
`
`I
`125
`
`Bus Controller
`
`I
`119
`
`I Processor l
`
`I
`112
`
`Disk
`
`Internal Hard
`
`l
`120
`
`I
`
`I
`
`\
`
`116
`
`1
`
`1)37
`
`J35
`
`l.)136
`
`115
`
`-
`
`Drivers
`Device
`
`System
`Operating
`
`Applications
`
`Software
`
`RAM
`
`113
`
`V
`
`~117
`
`BIOS
`
`ROM 114
`
`-
`
`I
`
`SYSTEM MEMORY
`
`1001.._
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`May11, 2004
`May 11, 2004
`
`Sheet 3 of 8
`Sheet 3 of 8
`
`US6,735,623 Bl
`US 6,735,623 Bl
`
`300
`
`
`
`
`
`FIG. 3
`FIG. 3
`
`Exhibit 1006
`Unified Patents v. Synkloud Technologies
`Page 005
`
`
`
`
`
`U.S. Patent
`
`May 11, 2004
`
`Sheet 5 of 8
`
`US 6,735,623 Bl
`
`500~
`
`AppleScript Example:
`
`On adding contents to folder this folder
`Set folder content to the contents of
`this folder
`Set the selected_SiLO_directory to the
`comments of this folder
`Tell application "SiLO access layer"
`Activate
`Upload folder_content to the
`selected_SiLO_directory
`End tell
`
`FIG. 5
`
`
`
`
`
`
`
`U.S. Patent
`
`May 11, 2004
`
`Sheet 8 of 8
`
`US 6,735,623 Bl
`
`800 \.._
`
`803 \_
`
`805
`
`I'-
`
`User accesses the remote storage servers via a global
`computer network, such as the Internet, and request a
`corresponding virtual storage area.
`
`i
`
`Prompt the user for information such as a username,
`password, and billing address.
`
`807
`
`809
`
`\_ Upon approval, automat,cally atocate a remote storage area to
`the user and stores the user information in metadata
`database. Inform user of approval as well as necessary
`access information.
`+
`Upon allocation, users can access the respective remote
`storage area via a variety of access interfaces.
`
`,..
`
`FIG. 8
`
`
`
`US 6,735,623 Bl
`
`1
`METHOD AND SYSTEM FOR ACCESSING A
`REMOTE STORAGE AREA
`
`TECHNICAL FIELD
`
`This invention relates to storage of digital data, and more
`particularly to a data storage system that provides access to
`a remote storage area.
`
`BACKGROUND
`
`2
`FIG. 4 illustrates a user interface displayed by another
`embodiment of an operating system for directly accessing a
`remote storage area;
`FIG. 5 illustrates an example operating system script
`written in AppleScript for the Macintosh& operating system
`that automatically copies a file from a local directory to a
`similarly named remote directory located within a storage
`area;
`FIG. 6 illustrates a window displayed by a conventional
`10 web browser when a user accesses a virtual storage area;
`FIG. 7 illustrates a window displayed by a conventional
`electronic mail software application when a user mails one
`or more data files to a corresponding storage area;
`FIG. 8 is a flow chart 800 providing a high-level overview
`15 of one mode of operation in which storage network 220
`allocates storage areas.
`
`The Internet is a worldwide collection of networks that
`spans over 100 countries and connects millions of comput(cid:173)
`ers. Reports indicate that the Internet is growing faster than
`all preceding information technologies including radio and
`television. Remote data storage over the Internet is one of
`the fastest growing facets of the Internet. Numerous com(cid:173)
`panies provide a wide range of an Internet data storage
`services for remotely storing and managing data files. Many
`of these services, however, have limited modes for accessing 20
`the data files. For example, many require that a user load
`proprietary software on his computer in order to communi(cid:173)
`cate data files to the remote storage. Other services only
`support access via a web browser or similar communication
`utility.
`
`SUMMARY
`
`DETAILED DESCRIPTION
`In the following detailed description, references are made
`to the accompanying drawings that illustrate specific
`embodiments in which the invention may be practiced.
`Electrical, mechanical, programmatic and structural changes
`may be made to the embodiments without departing from
`the spirit and scope of the present invention. The following
`25 detailed description is, therefore, not to be taken in a limiting
`sense and the scope of the present invention is defined by the
`claims.
`The detailed description is divided into three sections. The
`first section provides definitions for various terms used
`30 throughout the detailed description. The second section
`describes an exemplary hardware and operating environ(cid:173)
`ment in conjunction with which embodiments of the inven(cid:173)
`tion can be practiced. Finally, the third section describes
`various systems, methods, potential benefits and alternative
`35 embodiments of the invention.
`
`The present invention is directed to a data storage system
`and method capable of providing a variety of access meth(cid:173)
`ods. In one embodiment, a data storage system includes a
`plurality of storage servers coupled to a plurality of storage
`devices. The storage devices provide a plurality of virtual
`storage areas and each virtual storage area is assigned to a
`user. According to the invention, the assigned user can easily
`access the assigned virtual storage area using a client
`computer communicatively coupled to the storage servers
`via a global computer network such as the Internet. More
`specifically, in order to store data files within the remote
`virtual storage area, the user sends an electronic mail mes(cid:173)
`sage that includes the data file as well as user information 40
`and target data file information. The storage server parses the
`electronic mail message and stores the data file within the
`storage area according to the target data file information. In
`addition, the user can request one or more data files from the
`storage area and electronically mail the data files to the user. 45
`In this manner, authorized users can easily store date files to
`or retrieve data files from his or her remote storage area from
`anywhere in the world via a global computer network such
`as the Internet or a private wide-area network. The details of
`one or more embodiments of the invention are set forth in 50
`the accompanying drawings and the description below.
`Other features, objects, and advantages of the invention will
`be apparent from the description and drawings, and from the
`claims.
`
`Definitions
`
`File Transport Protocol (FTP)-A networking protocol spe(cid:173)
`cifically for transporting files from one computer on the
`network to another.
`HyperText Markup Language (HTML)-an authoring lan(cid:173)
`guage that defines the syntax and semantics used to create
`documents on the World Wide Web.
`Internet-a worldwide collection of networks that spans
`hundreds of countries and connects millions of comput(cid:173)
`ers. pO Internet Protocol (IP)-A low level communica(cid:173)
`tions protocol that specifies the format of individual
`communication packets and an addressing scheme.
`Redundant Array of Independent Disks (RAID)-A high(cid:173)
`volume storage device having multiple storage drives and
`fault recovery procedures.
`Server Message Block (SMB)-a message format used by to
`share files, directories and devices.
`Transmission Control Protocol (TCP)-a higher-level net(cid:173)
`work communication protocol that establishes a virtual
`connection between a destination and a source.
`Transmission Control Protocol/Internet Protocol(TCP/IP)(cid:173)
`the suite of network communications protocols including
`both TCP and IP.
`60 Web Distributed Authoring and Versioning (WebDAV) is a
`set of extensions to the Hypertext Transfer Protocol
`(HTTP) that seeks to make the World Wide Web a
`collaborative, writeable medium.
`World Wide Web (WWW)-A system of Internet servers
`that support documents specially formatted in the HTML
`language that supports links to other documents, as well
`as graphics, audio, and video files.
`
`55
`
`DESCRIPTION OF DRAWINGS
`
`FIG. 1 is a diagram showing an exemplary hardware and
`operating environment of a suitable computer for use with
`embodiments of the invention;
`FIG. 2 illustrates one embodiment of a computing system
`in which a storage server provides seamless access to remote
`storage areas;
`FIG. 3 illustrates a user interface displayed by one
`embodiment of an operating system for directly accessing a 65
`remote storage area using standard file management routines
`provided by the operating system;
`
`
`
`US 6,735,623 Bl
`
`20
`
`25
`
`3
`An Exemplary Operating Environment
`FIG. 1 illustrates a computer 100 suitable for supporting
`the operation of an embodiment of the present invention. As
`shown in FIG. 1, the computer 100 includes a processor 112
`that in one embodiment belongs to the PENTIUM® family
`of microprocessors manufactured by the Intel Corporation of
`Santa Clara, Calif. However, it should be understood that the
`invention can be implemented on computers based upon
`other microprocessors, such as the MIPS® family of micro(cid:173)
`processors from the Silicon Graphics Corporation, the 10
`POWERPC® family of microprocessors from both the
`Motorola Corporation and the IBM Corporation, the PRE(cid:173)
`CISION ARCHITECTURE® family of microprocessors
`from the Hewlett-Packard Company, the SPARC® family of
`microprocessors from the Sun Microsystems Corporation, or 15
`the ALPHA® family of microprocessors from the Compaq
`Computer Corporation. Computer 100 represents any server,
`personal computer, laptop or even a battery-powered,
`pocket-sized, mobile computer known as a hand-held PC or
`personal digital assistant (PDA).
`Computer 100 includes system memory 113 (including
`read only memory (ROM) 114 and random access memory
`(RAM) 115), which is connected to the processor 112 by a
`system data/address bus 116. ROM 114 represents any
`device that is primarily read-only including electrically
`erasable programmable read-only memory (EEPROM),
`flash memory, etc. RAM 115 represents any random access
`memory such as Synchronous Dynamic Random Access
`Memory.
`Within the computer 100, input/output bus 118 is con(cid:173)
`nected to the data/address bus 116 via bus controller 119. In
`one embodiment, input/output bus 118 is implemented as a
`standard Peripheral Component Interconnect (PCI) bus. The
`bus controller 119 examines all signals from the processor 35
`112 to route the signals to the appropriate bus. Signals
`between the processor 112 and the system memory 113 are
`merely passed through the bus controller 119. However,
`signals from the processor 112 intended for devices other
`than system memory 113 are routed onto the input/output 40
`bus 118.
`Various devices are connected to the input/output bus 118
`including hard disk drive 120, floppy drive 121 that is used
`to read floppy disk 151, and optical drive 122, such as a
`CD-ROM drive that is used to read an optical disk 152. The
`video display 124 or other kind of display device is con(cid:173)
`nected to the input/output bus 118 via a video adapter 125.
`A user enters commands and information into the com(cid:173)
`puter 100 by using a keyboard 40 and/or pointing device,
`such as a mouse 42, which are connected to bus 118 via
`input/output ports 128. Other types of pointing devices (not
`shown in FIG. 1) include track pads, track balls, joy sticks,
`data gloves, head trackers, and other devices suitable for
`positioning a cursor on the video display 124.
`As shown in FIG. 1, the computer 100 also includes a 55
`modem 129. Although illustrated in FIG. 1 as external to the
`computer 100, those of ordinary skill in the art will quickly
`recognize that the modem 129 may also be internal to the
`computer 100. The modem 129 is typically used to com(cid:173)
`municate over wide area networks (not shown), such as the 60
`global Internet. Modem 129 may be connected to a network
`using either a wired or wireless connection.
`Software applications 136 and data are typically stored
`via one of the memory storage devices, which may include
`the hard disk 120, floppy disk 151, CD-ROM 152 and are 65
`copied to RAM 115 for execution. In one embodiment,
`however, software applications 136 are stored in ROM 114
`
`4
`and are copied to RAM 115 for execution or are executed
`directly from ROM 114.
`In general, the operating system 135 executes software
`applications 136 and carries out instructions issued by the
`user. For example, when the user wants to load a software
`application 136, the operating system 135 interprets the
`instruction and causes the processor 112 to load software
`application 136 into RAM 115 from either the hard disk 120
`or the optical disk 152. Once software application 136 is
`loaded into the RAM 115, it can be used by the processor
`112. In case of large software applications 136, processor
`112 loads various portions of program modules into RAM
`115 as needed.
`The Basic Input/Output System (BIOS) 117 for the com(cid:173)
`puter 100 is stored in ROM 114 and is loaded into RAM 115
`upon booting. Those skilled in the art will recognize that the
`BIOS 117 is a set of basic executable routines that have
`conventionally helped to transfer information between the
`computing resources within the computer 100. Operating
`system 135 or other software applications 136 use these
`low-level service routines.
`In one embodiment computer 100 includes a registry (not
`shown) which is a system database that holds configuration
`information for computer 100. For example, Windows® 95
`and Windows® NT by Microsoft maintain the registry in
`two hidden files, called USER.DAT and SYSTEM.DAT,
`located on a permanent storage device such as an internal
`disk.
`
`30
`
`Methods and Systems of the Invention
`FIG. 2 is a block diagram illustrating one embodiment of
`a computing environment 200 that provides seamless access
`to remote storage areas. In the illustrated embodiment, client
`computers 205 are communicatively coupled to remote
`storage network 220 via storage servers 210 and global
`computer network 215 such as the Internet. Storage network
`220 represents one or more interconnected storage devices,
`such as a RAID, for storing data files. The storage network
`220 defines a pool of virtual storage areas 225 that can be
`individually assignable to different users. Initially, a user
`accesses storage servers 210 via global computer network
`and requests a virtual storage area 225. For each request,
`storage server 210 prompts the user for demographic infor-
`45 mation such as a username, password, billing address, etc.
`Upon approval, storage network 220 allocates a storage area
`225 to the user such that, as described in detail below, the
`user can remotely access the corresponding virtual storage
`area via client computers 205. Metadata database 222 stores
`50 metadata associated with the data files by the user. Storage
`server 210 and client computers 205 represent computing
`devices such as computer 100 described in FIG. 1.
`According to various embodiments of the invention, a set
`of communication software applications execute on storage
`servers 210 and provide a set of interfaces such that client
`computers 205 can access virtual storage areas 225 using
`any one of several different methods. Each method offers
`different advantages in control, performance and ease of use.
`For example, in one embodiment, access to the virtual
`storage areas 225 is fully integrated with operating system
`135 executing on each client computer 205. In this
`embodiment, the user can directly access a virtual storage
`area 225 via the operating system's user interface. Software
`applications 136 executing on client computer 205 can
`access the corresponding virtual storage area 225 through
`operating system 135 by calling standard file management
`routines provided by operating system 135. In this
`
`
`
`US 6,735,623 Bl
`
`6
`5
`embodiment, operating system 135 packetizes data files and
`access virtual storage area 225 without modification.
`Because operating system 135 provides seamless access to
`metadata received from the management routines and com(cid:173)
`municates the data to storage servers 210 via network 215.
`virtual storage area 225 via conventional file management
`In this embodiment, operating system 135 handles all com(cid:173)
`routines, software applications 136 treat virtual storage area
`munication with storage servers 210 such that virtual storage
`225 as if it were a local storage volume. Another advantage
`area 225 can be accessed as if it were local to client
`is that the user can write scripts for operating system 135,
`computer 205.
`such as an OSAX AppleScript for the Macintosh® operating
`In another embodiment, the user can access virtual storage
`system, in order to control access to virtual storage area 225.
`area 225 by invoking a communications application 136
`FIG. 5 illustrates an operating system script 500 written in
`such as a web browser or an FTP utility. In this embodiment, 10
`AppleScript that automatically copies a file from a local
`the communications application 136 handles communica(cid:173)
`directory to a similarly named remote directory located
`tion across network 215. The underlying communications
`within virtual storage area 225.
`between client computers 205 and storage servers 210 can
`According to one aspect of the invention, the user can
`follow a variety of protocols. Typically, the communications
`associate metadata with each data file as the data file is
`use TCP/IP as a base protocol and additionally use the HTTP
`uploaded to remote storage areas 225 in order to facilitate
`protocol, the FTP protocol or even a proprietary data-backup 15
`the quick cataloging and quick retrieval of the data file.
`protocol.
`Operating system 135 captures the metadata from the user
`The following sub-sections describe the various tech(cid:173)
`via an input form and communicates the metadata to storage
`niques by which, according to the invention, client comput-
`servers 210.
`ers 205 access virtual storage areas 225 via storage servers
`20 Direct Access From a Communication Software Application
`210 and global computer network 215.
`In some embodiments, the user can invoke conventional
`Access via the Operating System
`communication applications and utilities such as a web
`According to the invention, in one embodiment, the user
`browser, an FTP utility, a data storage backup utility, or even
`can access virtual storage area 225 via operating system 135
`a conventional email software application, to access virtual
`in the same manner by which the user accesses local storage
`devices 120, 121 and 122. In this embodiment, the user 25
`storage area. During this method of access, the communi(cid:173)
`cation software application 136 handles all communications
`interacts with the user interface presented by operating
`system 135 and manages virtual storage area 225 as if it
`with storage servers 210. The file management routines of
`operating system 135 are not invoked. In addition, the
`were a local storage volume. For example, by interacting
`with operating system 135 the user can perform all common
`communication software 136 is responsible for capturing the
`metadata from the user and communicating the metadata to
`file management tasks including coping files between hard 30
`disk 120 and remote storage area 225, as well as renaming
`storage servers 210 for storage within metadata database
`222.
`and deleting data files. The user is able to browse directory
`structures within virtual storage area 225 as if it were a local
`FIG. 6 illustrates the user accessing one of the virtual
`storage areas 225 via a conventional web browser executing
`storage volume. Indeed, in some embodiments, virtual stor(cid:173)
`age area 225 may be represented as an icon on the desktop 35
`on client computer 205. The web browser displays window
`600 that lists each directory within virtual storage area 225.
`of the user's computer.
`FIG. 3 illustrates window 300 as displayed by operating
`Storage servers 210 maintain a set of image icons for
`system 135 for accessing a virtual storage area 225. In the
`representing the stored data file according to file and creator
`illustrated embodiment, operating system 135 is the Macin(cid:173)
`type information. Storage servers 210 select and display an
`appropriate icon as a finction of the file and creator infor(cid:173)
`tosh® operating system from Apple Computer, Inc. Window 40
`300 presented by operating system 135 lists the directories
`mation stored within virtual storage area 225. Window 600,
`and files of virtual storage area 225 as if the directories and
`therefore, closely resembles windows 300 and 400 as dis(cid:173)
`played by operating system 135. Using the browser, the user
`files were local. The user is able to browse the directories
`within virtual storage area 225 and perform the file man(cid:173)
`can browse the directories within virtual storage area 225
`agement operations supported by operating system 135 such 45 and can perform many common file management operations
`including uploading, downloading and deleting files, as well
`as copying, renaming, moving and deleting files and direc(cid:173)
`tories. Similarly, applications 136 executing on client com(cid:173)
`as creating and removing directories.
`puter 205 access virtual storage area 225 through standard
`FIG. 7 illustrates the user accessing virtual storage area
`225 using a conventional electronic mail software applica-
`file management routines provided by an application pro(cid:173)
`gramming interface (API) of operating system 135. In one
`50 tion 136. Electronic mail software application 136 displays
`embodiment, operating system 135 of client computers 205
`window 700 by which the user creates an email message
`having user information 702 and target data file information
`is the Macintosh operating system, such that the API
`710. The user addresses the email to his or her email address
`includes the Apple File Services (AFS), and storage servers
`at storage servers 210. For uploading files, as displayed in
`225 are support accessing remote data files within storage
`area virtual 225 via the Apple Filing Protocol (AFP) services 55
`window 700, the user attaches one or more data files 705.
`Upon receiving the email, storage server 210 parses the user
`over TCP /IP.
`FIG. 4 illustrates another embodiment in which operating
`information 702 and the target data file information 710 in
`system 135 is the Windows® operating system from
`order to extract one or more target directories. Thus, user
`Microsoft. Here, operating system 135 displays window 400
`information 702 may take the form of a destination elec-
`60 tronic mail address, while target data file information 710
`that presents an integrated list of those files and directories
`that are available locally as well as those available from
`may take the form of text in the subject field of an electronic
`virtual storage area 225. In this embodiment, operating
`mail message. Storage server 210 stores attached files 705 to
`system 135 incorporates the SMB protocol or the WebDAV
`the target directory within the appropriate virtual storage
`area 225 assigned to the user. In this manner, the user is able
`protocol in order to provide seamless access to virtual
`storage area 225.
`65 to email one or more files directly into a specified directory
`within virtual storage area 225 from any remote location via
`One particular advantage of this embodiment is that
`software applications 136 executing on computer 100 can
`network 215. In an alternative embodiment, the user does
`
`
`
`US 6,735,623 Bl
`
`10
`
`30
`
`7
`not attach a data file but includes within the electronic mail
`message a universal resource locator (URL) that indicates
`where storage server 210 can retrieve the data file to be
`stored. In order to retrieve one or more data files from
`storage server 210, the user sends a similar email requesting
`one or more target data files. In response, storage server 210
`sends the user a response electronic mail message with the
`requested data files attached. In one embodiment storage
`server 210 temporarily places received data files in a holding
`area until the user access storage server and selectively
`authorizes the storage of each data file to his or her virtual
`storage area. Files that were not authenticated within a
`predetermine period of time, such as ten days, can be deleted
`from the holding area.
`Remote Processing via Centrally Hosted Applications
`The above sections described how, according to the 15
`invention, client computers 205 access virtual storage area
`225 for remote data storage. The invention, however, is not
`limited to data storage. According to one aspect of the
`invention, client computers 205 communicate data files to
`storage servers 210 for remote processing by one or more 20
`applications executing on storage servers 210. For example,
`the communicated data files may be electronic images such
`that applications executing on storage servers 210 perform
`color correction, color proofing and other prepress opera(cid:173)
`tions. Other examples include data conversion, compression, 25
`decompression, encryption and decryption. As such, a user
`is able to submit data files for remote processing by simply
`instructing operating system 135 to copy the data files to a
`designated directory within virtual storage area 225. As
`such, this operation can be performed by simply dragging
`and dropping the file onto the appropriate window presented
`by operating system 135.
`Allocation of a Remote Storage Area
`FIG. 8 is a flow chart 800 that provides a high-level
`overview of one mode of operation in which storage net(cid:173)
`work 220 allocates remote storage areas 225. In block 803, 35
`users access storage servers 210 via global computer net(cid:173)
`work 215 and request a corresponding virtual storage area
`225. For each request, storage server 210 prompts the user
`for information such as a username, password, billing
`address (block 805). Upon approval, storage network 220 40
`automatically allocates a corresponding storage area 225 for
`each user and stores the respective user information in
`metadata database 222 (block 807). After a virtual storage
`area 25 has been allocated, storage network 220 informs
`each user of any necessary access information, such as a 45
`password, so that the user can access the respective storage
`area 225 via the many access interfaces described above
`(block 809).
`Various embodiments have been described of a method
`and system for a data storage system that provides seamless
`access to remote virtual data storage areas via a global
`computer network. Access to the virtual storage area is fully
`integrated with the operating system executing on the client
`computer such that the user, or software applications execut(cid:173)
`ing on the computer, can seamlessly access the correspond- 55
`ing virtual storage area using standard file management
`routines provided by the operating system. In addition, the
`invention provides a wide range of other remote access
`methods to the virtual data storage areas including access via
`electronic mail. This application is intended to cover any 60
`adaptation or variation of the present invention. It is
`intended that this invention be limited only by the claims and
`equivalents thereof.
`What is claimed is:
`1. A method for accessing a network-based data storage 65
`system that provides seamless access to a plurality of
`user-assigned storage areas, the method comprising:
`
`8
`presenting a plurality of access interfaces to the user(cid:173)
`assigned storage areas via a plurality of software appli(cid:173)
`cations executing on a storage server of the data storage
`system;
`servicing access requests from an operating system of a
`client computer with a first one of the access interfaces
`to provide access to a target one of the plurality of
`user-assigned storage areas, wherein the operating sys-
`tem of the client computer includes application pro(cid:173)
`gramming interface (API) routines that present the
`target one of the plurality of user-assignable storage
`areas to software applications executing on the client
`computer as local to the client computer;
`servicing access requests from at least one communica(cid:173)
`tion software application executing on the client com(cid:173)
`puter with a second one of the access interfaces to
`provide access to the target one of the plurality of
`user-assigned storage areas; and
`processing an electronic mail message with a third one of
`the access interfaces to provide access to the target one
`of the plurality of user-assigned storage areas.
`2. The method of claim 1, wherein the electronic mail
`message contains text and one or more attached data files,
`and processing the electronic mail message comprises:
`parsing the text to determine the target one of the user(cid:173)
`assigned storage areas; and
`storing the data files within the target one of the user(cid:173)
`assigned storage areas.
`3. The method of claim 2, further comprising analyzing
`content of a subject field associated with the electronic mail
`message to determine the target one of the user-assigned
`remote storage areas.
`4. The method of claim 2, further comprising analyzing
`both content of a subject field associated the electronic mail
`message and content of a destination address associated with
`the electronic mail message to determine the target one of
`the user-assigned remote storage areas.
`5. The method of claim 2, further comprising analyzing
`the electronic mail message to identify a user associated
`with the electronic mail message and the target one of the
`user-assigned remote storage areas.
`6. The method of claim 5, and further including retrieving
`security information from the electronic mail message in
`order to authenticate the user.
`7. The method of claim 6, wherein the security informa(cid:173)
`tion is a digital signature.
`8. The method of claim 5, wherein storing the data file
`within the target one of the user-assigned remote storage
`50 areas includes storing the data file into a temporary holding
`area until the user associated with the remote storage area
`approves the copying of the data file to the remote storage
`area.
`9. The method of claim 1, wherein communicating the
`electronic mail message includes encrypting the data file.
`10. A data storage system comprising:
`a storage server that maintains a plurality of remote
`storage areas; and
`a plu