throbber

`

`US 6,735,623 Bl
`Page 2
`
`OIBER PUBLICATIONS
`
`World Wide Web Distributed Authoring and Versioning:
`Web DAV, Whitehead, E.J., WebDAV Information, Feb.
`1999, pp. 1-2.
`Requirements for Distributed Authoring and Versioning on
`the World Wide Web, Slein, J.A.; Vitali, F.; Whitehead, Jr.,
`E.J.; Durand, D.G.; Standard View VI. 5, No. 1, Mar. 1997,
`ISSN: 1067-9936, pp. 17-24.
`How to implement Web-based groupware systems based on
`WebDAV, Dridi, F.; Neumann, G., Enabling Technologies:
`Infrastructure for Collaborative Enterprises, Jun. 1999, Pro(cid:173)
`ceedings IEEE 8'\ ISBN: 0-7695-0365-9, pp. 114-119.
`Open Door Networks Introduces New Products for Apple(cid:173)
`share Servers, pp. 1-2, Sep. 1997.
`ShareWay IP 2.0, pp. 1-2, Feb. 1997.
`Open Door Network Products Enhance MAC OS 8, p. 1,
`Aug. 1997.
`U.S. patent application entitled, "Method and System for
`Seamless Access to a Remote Storage Area," Ser. No.
`09/501,041, filed Feb. 9, 2000.
`U.S. patent application entitled, "Remote Storage Area
`Having Multiple Access Interfaces," Ser. No. 09/500,868,
`filed Feb. 9, 2000.
`International Search Report from Application No. PCT/US
`01/04352 mailed Oct. 9, 2003 (3 pages).
`
`http://www.webdav.org-WebDAV Resources, pp. 1-3,
`printed Jun. 15, 2000.
`http://www.backup.com-@ Backup®, p. 1, printed Jun.
`15, 2000.
`http://www.bitlocker.com-Bitlocker, p. 1, printed Jun. 15,
`2000.
`http://www.datahubonline.com-datahubonline.com, p. 1,
`printed Jun. 15, 2000.
`http://www.diskonnet.com-DiskOnNet.com, p. 1, printed
`Jun. 15, 2000.
`http://www.docspace.com-Critical Path Inc., p. 1, printed
`Jun. 15, 2000.
`http://www.driveway.com-Driveway Corporation, p. 1,
`printed Jun. 15, 2000.
`http://www.itools.mac.com-Apple-iTools, p. 1, printed
`Jun. 15, 2000.
`http://www.filemonkey.com-File Monkey Software Devel(cid:173)
`opment Services, p. 1, printed Jun. 15, 2000.
`http://www.freedrive.com-FreeDrive, Inc, p. 1, printed
`Jun. 15, 2000.
`http://www.xinet.com-Xinet, Inc., p. 1, printed Jun. 15,
`2000.
`
`* cited by examiner
`
`

`

`i,-
`~
`~
`N
`O'I
`~ (It
`
`O'I
`rJ'J.
`e
`
`00
`
`"'"" 0 ....,
`~ ....
`'JJ. =(cid:173)~
`
`,i;;..
`C
`C
`N
`!'"'
`"'""
`'-<
`~
`~
`
`~ = .....
`~ .....
`~
`r:JJ. .
`d .
`
`51
`I
`
`LOCAL AREA NETWORK
`
`-20
`
`\ B
`
`124
`
`Computer
`Remote
`
`49 -
`
`7
`
`'
`
`40
`I
`~~o
`
`=
`~ Modem I
`
`r' 129
`
`FIG. 1
`
`42
`
`[d-151 0 152
`
`"
`,
`
`Interface
`Network
`
`Ports
`
`Input I Output
`
`\
`53
`
`I
`
`l
`128
`
`l
`122
`
`l
`118
`
`.
`
`Optical Drive
`
`Floppy Disk Drive
`
`\
`121
`
`I
`
`Adapter
`Video
`
`I
`125
`
`Bus Controller
`
`I
`119
`
`I Processor l
`
`I
`112
`
`Disk
`
`Internal Hard
`
`l
`120
`
`I
`
`I
`
`\
`
`116
`
`1
`
`1)37
`
`J35
`
`l.)136
`
`115
`
`-
`
`Drivers
`Device
`
`System
`Operating
`
`Applications
`
`Software
`
`RAM
`
`113
`
`V
`
`~117
`
`BIOS
`
`ROM 114
`
`-
`
`I
`
`SYSTEM MEMORY
`
`1001.._
`
`

`

`

`

`U.S. Patent
`U.S. Patent
`
`May11, 2004
`May 11, 2004
`
`Sheet 3 of 8
`Sheet 3 of 8
`
`US6,735,623 Bl
`US 6,735,623 Bl
`
`300
`
`
`
`
`
`FIG. 3
`FIG. 3
`
`Exhibit 1006
`Unified Patents v. Synkloud Technologies
`Page 005
`
`

`

`

`

`U.S. Patent
`
`May 11, 2004
`
`Sheet 5 of 8
`
`US 6,735,623 Bl
`
`500~
`
`AppleScript Example:
`
`On adding contents to folder this folder
`Set folder content to the contents of
`this folder
`Set the selected_SiLO_directory to the
`comments of this folder
`Tell application "SiLO access layer"
`Activate
`Upload folder_content to the
`selected_SiLO_directory
`End tell
`
`FIG. 5
`
`

`

`

`

`

`

`U.S. Patent
`
`May 11, 2004
`
`Sheet 8 of 8
`
`US 6,735,623 Bl
`
`800 \.._
`
`803 \_
`
`805
`
`I'-
`
`User accesses the remote storage servers via a global
`computer network, such as the Internet, and request a
`corresponding virtual storage area.
`
`i
`
`Prompt the user for information such as a username,
`password, and billing address.
`
`807
`
`809
`
`\_ Upon approval, automat,cally atocate a remote storage area to
`the user and stores the user information in metadata
`database. Inform user of approval as well as necessary
`access information.
`+
`Upon allocation, users can access the respective remote
`storage area via a variety of access interfaces.
`
`,..
`
`FIG. 8
`
`

`

`US 6,735,623 Bl
`
`1
`METHOD AND SYSTEM FOR ACCESSING A
`REMOTE STORAGE AREA
`
`TECHNICAL FIELD
`
`This invention relates to storage of digital data, and more
`particularly to a data storage system that provides access to
`a remote storage area.
`
`BACKGROUND
`
`2
`FIG. 4 illustrates a user interface displayed by another
`embodiment of an operating system for directly accessing a
`remote storage area;
`FIG. 5 illustrates an example operating system script
`written in AppleScript for the Macintosh& operating system
`that automatically copies a file from a local directory to a
`similarly named remote directory located within a storage
`area;
`FIG. 6 illustrates a window displayed by a conventional
`10 web browser when a user accesses a virtual storage area;
`FIG. 7 illustrates a window displayed by a conventional
`electronic mail software application when a user mails one
`or more data files to a corresponding storage area;
`FIG. 8 is a flow chart 800 providing a high-level overview
`15 of one mode of operation in which storage network 220
`allocates storage areas.
`
`The Internet is a worldwide collection of networks that
`spans over 100 countries and connects millions of comput(cid:173)
`ers. Reports indicate that the Internet is growing faster than
`all preceding information technologies including radio and
`television. Remote data storage over the Internet is one of
`the fastest growing facets of the Internet. Numerous com(cid:173)
`panies provide a wide range of an Internet data storage
`services for remotely storing and managing data files. Many
`of these services, however, have limited modes for accessing 20
`the data files. For example, many require that a user load
`proprietary software on his computer in order to communi(cid:173)
`cate data files to the remote storage. Other services only
`support access via a web browser or similar communication
`utility.
`
`SUMMARY
`
`DETAILED DESCRIPTION
`In the following detailed description, references are made
`to the accompanying drawings that illustrate specific
`embodiments in which the invention may be practiced.
`Electrical, mechanical, programmatic and structural changes
`may be made to the embodiments without departing from
`the spirit and scope of the present invention. The following
`25 detailed description is, therefore, not to be taken in a limiting
`sense and the scope of the present invention is defined by the
`claims.
`The detailed description is divided into three sections. The
`first section provides definitions for various terms used
`30 throughout the detailed description. The second section
`describes an exemplary hardware and operating environ(cid:173)
`ment in conjunction with which embodiments of the inven(cid:173)
`tion can be practiced. Finally, the third section describes
`various systems, methods, potential benefits and alternative
`35 embodiments of the invention.
`
`The present invention is directed to a data storage system
`and method capable of providing a variety of access meth(cid:173)
`ods. In one embodiment, a data storage system includes a
`plurality of storage servers coupled to a plurality of storage
`devices. The storage devices provide a plurality of virtual
`storage areas and each virtual storage area is assigned to a
`user. According to the invention, the assigned user can easily
`access the assigned virtual storage area using a client
`computer communicatively coupled to the storage servers
`via a global computer network such as the Internet. More
`specifically, in order to store data files within the remote
`virtual storage area, the user sends an electronic mail mes(cid:173)
`sage that includes the data file as well as user information 40
`and target data file information. The storage server parses the
`electronic mail message and stores the data file within the
`storage area according to the target data file information. In
`addition, the user can request one or more data files from the
`storage area and electronically mail the data files to the user. 45
`In this manner, authorized users can easily store date files to
`or retrieve data files from his or her remote storage area from
`anywhere in the world via a global computer network such
`as the Internet or a private wide-area network. The details of
`one or more embodiments of the invention are set forth in 50
`the accompanying drawings and the description below.
`Other features, objects, and advantages of the invention will
`be apparent from the description and drawings, and from the
`claims.
`
`Definitions
`
`File Transport Protocol (FTP)-A networking protocol spe(cid:173)
`cifically for transporting files from one computer on the
`network to another.
`HyperText Markup Language (HTML)-an authoring lan(cid:173)
`guage that defines the syntax and semantics used to create
`documents on the World Wide Web.
`Internet-a worldwide collection of networks that spans
`hundreds of countries and connects millions of comput(cid:173)
`ers. pO Internet Protocol (IP)-A low level communica(cid:173)
`tions protocol that specifies the format of individual
`communication packets and an addressing scheme.
`Redundant Array of Independent Disks (RAID)-A high(cid:173)
`volume storage device having multiple storage drives and
`fault recovery procedures.
`Server Message Block (SMB)-a message format used by to
`share files, directories and devices.
`Transmission Control Protocol (TCP)-a higher-level net(cid:173)
`work communication protocol that establishes a virtual
`connection between a destination and a source.
`Transmission Control Protocol/Internet Protocol(TCP/IP)(cid:173)
`the suite of network communications protocols including
`both TCP and IP.
`60 Web Distributed Authoring and Versioning (WebDAV) is a
`set of extensions to the Hypertext Transfer Protocol
`(HTTP) that seeks to make the World Wide Web a
`collaborative, writeable medium.
`World Wide Web (WWW)-A system of Internet servers
`that support documents specially formatted in the HTML
`language that supports links to other documents, as well
`as graphics, audio, and video files.
`
`55
`
`DESCRIPTION OF DRAWINGS
`
`FIG. 1 is a diagram showing an exemplary hardware and
`operating environment of a suitable computer for use with
`embodiments of the invention;
`FIG. 2 illustrates one embodiment of a computing system
`in which a storage server provides seamless access to remote
`storage areas;
`FIG. 3 illustrates a user interface displayed by one
`embodiment of an operating system for directly accessing a 65
`remote storage area using standard file management routines
`provided by the operating system;
`
`

`

`US 6,735,623 Bl
`
`20
`
`25
`
`3
`An Exemplary Operating Environment
`FIG. 1 illustrates a computer 100 suitable for supporting
`the operation of an embodiment of the present invention. As
`shown in FIG. 1, the computer 100 includes a processor 112
`that in one embodiment belongs to the PENTIUM® family
`of microprocessors manufactured by the Intel Corporation of
`Santa Clara, Calif. However, it should be understood that the
`invention can be implemented on computers based upon
`other microprocessors, such as the MIPS® family of micro(cid:173)
`processors from the Silicon Graphics Corporation, the 10
`POWERPC® family of microprocessors from both the
`Motorola Corporation and the IBM Corporation, the PRE(cid:173)
`CISION ARCHITECTURE® family of microprocessors
`from the Hewlett-Packard Company, the SPARC® family of
`microprocessors from the Sun Microsystems Corporation, or 15
`the ALPHA® family of microprocessors from the Compaq
`Computer Corporation. Computer 100 represents any server,
`personal computer, laptop or even a battery-powered,
`pocket-sized, mobile computer known as a hand-held PC or
`personal digital assistant (PDA).
`Computer 100 includes system memory 113 (including
`read only memory (ROM) 114 and random access memory
`(RAM) 115), which is connected to the processor 112 by a
`system data/address bus 116. ROM 114 represents any
`device that is primarily read-only including electrically
`erasable programmable read-only memory (EEPROM),
`flash memory, etc. RAM 115 represents any random access
`memory such as Synchronous Dynamic Random Access
`Memory.
`Within the computer 100, input/output bus 118 is con(cid:173)
`nected to the data/address bus 116 via bus controller 119. In
`one embodiment, input/output bus 118 is implemented as a
`standard Peripheral Component Interconnect (PCI) bus. The
`bus controller 119 examines all signals from the processor 35
`112 to route the signals to the appropriate bus. Signals
`between the processor 112 and the system memory 113 are
`merely passed through the bus controller 119. However,
`signals from the processor 112 intended for devices other
`than system memory 113 are routed onto the input/output 40
`bus 118.
`Various devices are connected to the input/output bus 118
`including hard disk drive 120, floppy drive 121 that is used
`to read floppy disk 151, and optical drive 122, such as a
`CD-ROM drive that is used to read an optical disk 152. The
`video display 124 or other kind of display device is con(cid:173)
`nected to the input/output bus 118 via a video adapter 125.
`A user enters commands and information into the com(cid:173)
`puter 100 by using a keyboard 40 and/or pointing device,
`such as a mouse 42, which are connected to bus 118 via
`input/output ports 128. Other types of pointing devices (not
`shown in FIG. 1) include track pads, track balls, joy sticks,
`data gloves, head trackers, and other devices suitable for
`positioning a cursor on the video display 124.
`As shown in FIG. 1, the computer 100 also includes a 55
`modem 129. Although illustrated in FIG. 1 as external to the
`computer 100, those of ordinary skill in the art will quickly
`recognize that the modem 129 may also be internal to the
`computer 100. The modem 129 is typically used to com(cid:173)
`municate over wide area networks (not shown), such as the 60
`global Internet. Modem 129 may be connected to a network
`using either a wired or wireless connection.
`Software applications 136 and data are typically stored
`via one of the memory storage devices, which may include
`the hard disk 120, floppy disk 151, CD-ROM 152 and are 65
`copied to RAM 115 for execution. In one embodiment,
`however, software applications 136 are stored in ROM 114
`
`4
`and are copied to RAM 115 for execution or are executed
`directly from ROM 114.
`In general, the operating system 135 executes software
`applications 136 and carries out instructions issued by the
`user. For example, when the user wants to load a software
`application 136, the operating system 135 interprets the
`instruction and causes the processor 112 to load software
`application 136 into RAM 115 from either the hard disk 120
`or the optical disk 152. Once software application 136 is
`loaded into the RAM 115, it can be used by the processor
`112. In case of large software applications 136, processor
`112 loads various portions of program modules into RAM
`115 as needed.
`The Basic Input/Output System (BIOS) 117 for the com(cid:173)
`puter 100 is stored in ROM 114 and is loaded into RAM 115
`upon booting. Those skilled in the art will recognize that the
`BIOS 117 is a set of basic executable routines that have
`conventionally helped to transfer information between the
`computing resources within the computer 100. Operating
`system 135 or other software applications 136 use these
`low-level service routines.
`In one embodiment computer 100 includes a registry (not
`shown) which is a system database that holds configuration
`information for computer 100. For example, Windows® 95
`and Windows® NT by Microsoft maintain the registry in
`two hidden files, called USER.DAT and SYSTEM.DAT,
`located on a permanent storage device such as an internal
`disk.
`
`30
`
`Methods and Systems of the Invention
`FIG. 2 is a block diagram illustrating one embodiment of
`a computing environment 200 that provides seamless access
`to remote storage areas. In the illustrated embodiment, client
`computers 205 are communicatively coupled to remote
`storage network 220 via storage servers 210 and global
`computer network 215 such as the Internet. Storage network
`220 represents one or more interconnected storage devices,
`such as a RAID, for storing data files. The storage network
`220 defines a pool of virtual storage areas 225 that can be
`individually assignable to different users. Initially, a user
`accesses storage servers 210 via global computer network
`and requests a virtual storage area 225. For each request,
`storage server 210 prompts the user for demographic infor-
`45 mation such as a username, password, billing address, etc.
`Upon approval, storage network 220 allocates a storage area
`225 to the user such that, as described in detail below, the
`user can remotely access the corresponding virtual storage
`area via client computers 205. Metadata database 222 stores
`50 metadata associated with the data files by the user. Storage
`server 210 and client computers 205 represent computing
`devices such as computer 100 described in FIG. 1.
`According to various embodiments of the invention, a set
`of communication software applications execute on storage
`servers 210 and provide a set of interfaces such that client
`computers 205 can access virtual storage areas 225 using
`any one of several different methods. Each method offers
`different advantages in control, performance and ease of use.
`For example, in one embodiment, access to the virtual
`storage areas 225 is fully integrated with operating system
`135 executing on each client computer 205. In this
`embodiment, the user can directly access a virtual storage
`area 225 via the operating system's user interface. Software
`applications 136 executing on client computer 205 can
`access the corresponding virtual storage area 225 through
`operating system 135 by calling standard file management
`routines provided by operating system 135. In this
`
`

`

`US 6,735,623 Bl
`
`6
`5
`embodiment, operating system 135 packetizes data files and
`access virtual storage area 225 without modification.
`Because operating system 135 provides seamless access to
`metadata received from the management routines and com(cid:173)
`municates the data to storage servers 210 via network 215.
`virtual storage area 225 via conventional file management
`In this embodiment, operating system 135 handles all com(cid:173)
`routines, software applications 136 treat virtual storage area
`munication with storage servers 210 such that virtual storage
`225 as if it were a local storage volume. Another advantage
`area 225 can be accessed as if it were local to client
`is that the user can write scripts for operating system 135,
`computer 205.
`such as an OSAX AppleScript for the Macintosh® operating
`In another embodiment, the user can access virtual storage
`system, in order to control access to virtual storage area 225.
`area 225 by invoking a communications application 136
`FIG. 5 illustrates an operating system script 500 written in
`such as a web browser or an FTP utility. In this embodiment, 10
`AppleScript that automatically copies a file from a local
`the communications application 136 handles communica(cid:173)
`directory to a similarly named remote directory located
`tion across network 215. The underlying communications
`within virtual storage area 225.
`between client computers 205 and storage servers 210 can
`According to one aspect of the invention, the user can
`follow a variety of protocols. Typically, the communications
`associate metadata with each data file as the data file is
`use TCP/IP as a base protocol and additionally use the HTTP
`uploaded to remote storage areas 225 in order to facilitate
`protocol, the FTP protocol or even a proprietary data-backup 15
`the quick cataloging and quick retrieval of the data file.
`protocol.
`Operating system 135 captures the metadata from the user
`The following sub-sections describe the various tech(cid:173)
`via an input form and communicates the metadata to storage
`niques by which, according to the invention, client comput-
`servers 210.
`ers 205 access virtual storage areas 225 via storage servers
`20 Direct Access From a Communication Software Application
`210 and global computer network 215.
`In some embodiments, the user can invoke conventional
`Access via the Operating System
`communication applications and utilities such as a web
`According to the invention, in one embodiment, the user
`browser, an FTP utility, a data storage backup utility, or even
`can access virtual storage area 225 via operating system 135
`a conventional email software application, to access virtual
`in the same manner by which the user accesses local storage
`devices 120, 121 and 122. In this embodiment, the user 25
`storage area. During this method of access, the communi(cid:173)
`cation software application 136 handles all communications
`interacts with the user interface presented by operating
`system 135 and manages virtual storage area 225 as if it
`with storage servers 210. The file management routines of
`operating system 135 are not invoked. In addition, the
`were a local storage volume. For example, by interacting
`with operating system 135 the user can perform all common
`communication software 136 is responsible for capturing the
`metadata from the user and communicating the metadata to
`file management tasks including coping files between hard 30
`disk 120 and remote storage area 225, as well as renaming
`storage servers 210 for storage within metadata database
`222.
`and deleting data files. The user is able to browse directory
`structures within virtual storage area 225 as if it were a local
`FIG. 6 illustrates the user accessing one of the virtual
`storage areas 225 via a conventional web browser executing
`storage volume. Indeed, in some embodiments, virtual stor(cid:173)
`age area 225 may be represented as an icon on the desktop 35
`on client computer 205. The web browser displays window
`600 that lists each directory within virtual storage area 225.
`of the user's computer.
`FIG. 3 illustrates window 300 as displayed by operating
`Storage servers 210 maintain a set of image icons for
`system 135 for accessing a virtual storage area 225. In the
`representing the stored data file according to file and creator
`illustrated embodiment, operating system 135 is the Macin(cid:173)
`type information. Storage servers 210 select and display an
`appropriate icon as a finction of the file and creator infor(cid:173)
`tosh® operating system from Apple Computer, Inc. Window 40
`300 presented by operating system 135 lists the directories
`mation stored within virtual storage area 225. Window 600,
`and files of virtual storage area 225 as if the directories and
`therefore, closely resembles windows 300 and 400 as dis(cid:173)
`played by operating system 135. Using the browser, the user
`files were local. The user is able to browse the directories
`within virtual storage area 225 and perform the file man(cid:173)
`can browse the directories within virtual storage area 225
`agement operations supported by operating system 135 such 45 and can perform many common file management operations
`including uploading, downloading and deleting files, as well
`as copying, renaming, moving and deleting files and direc(cid:173)
`tories. Similarly, applications 136 executing on client com(cid:173)
`as creating and removing directories.
`puter 205 access virtual storage area 225 through standard
`FIG. 7 illustrates the user accessing virtual storage area
`225 using a conventional electronic mail software applica-
`file management routines provided by an application pro(cid:173)
`gramming interface (API) of operating system 135. In one
`50 tion 136. Electronic mail software application 136 displays
`embodiment, operating system 135 of client computers 205
`window 700 by which the user creates an email message
`having user information 702 and target data file information
`is the Macintosh operating system, such that the API
`710. The user addresses the email to his or her email address
`includes the Apple File Services (AFS), and storage servers
`at storage servers 210. For uploading files, as displayed in
`225 are support accessing remote data files within storage
`area virtual 225 via the Apple Filing Protocol (AFP) services 55
`window 700, the user attaches one or more data files 705.
`Upon receiving the email, storage server 210 parses the user
`over TCP /IP.
`FIG. 4 illustrates another embodiment in which operating
`information 702 and the target data file information 710 in
`system 135 is the Windows® operating system from
`order to extract one or more target directories. Thus, user
`Microsoft. Here, operating system 135 displays window 400
`information 702 may take the form of a destination elec-
`60 tronic mail address, while target data file information 710
`that presents an integrated list of those files and directories
`that are available locally as well as those available from
`may take the form of text in the subject field of an electronic
`virtual storage area 225. In this embodiment, operating
`mail message. Storage server 210 stores attached files 705 to
`system 135 incorporates the SMB protocol or the WebDAV
`the target directory within the appropriate virtual storage
`area 225 assigned to the user. In this manner, the user is able
`protocol in order to provide seamless access to virtual
`storage area 225.
`65 to email one or more files directly into a specified directory
`within virtual storage area 225 from any remote location via
`One particular advantage of this embodiment is that
`software applications 136 executing on computer 100 can
`network 215. In an alternative embodiment, the user does
`
`

`

`US 6,735,623 Bl
`
`10
`
`30
`
`7
`not attach a data file but includes within the electronic mail
`message a universal resource locator (URL) that indicates
`where storage server 210 can retrieve the data file to be
`stored. In order to retrieve one or more data files from
`storage server 210, the user sends a similar email requesting
`one or more target data files. In response, storage server 210
`sends the user a response electronic mail message with the
`requested data files attached. In one embodiment storage
`server 210 temporarily places received data files in a holding
`area until the user access storage server and selectively
`authorizes the storage of each data file to his or her virtual
`storage area. Files that were not authenticated within a
`predetermine period of time, such as ten days, can be deleted
`from the holding area.
`Remote Processing via Centrally Hosted Applications
`The above sections described how, according to the 15
`invention, client computers 205 access virtual storage area
`225 for remote data storage. The invention, however, is not
`limited to data storage. According to one aspect of the
`invention, client computers 205 communicate data files to
`storage servers 210 for remote processing by one or more 20
`applications executing on storage servers 210. For example,
`the communicated data files may be electronic images such
`that applications executing on storage servers 210 perform
`color correction, color proofing and other prepress opera(cid:173)
`tions. Other examples include data conversion, compression, 25
`decompression, encryption and decryption. As such, a user
`is able to submit data files for remote processing by simply
`instructing operating system 135 to copy the data files to a
`designated directory within virtual storage area 225. As
`such, this operation can be performed by simply dragging
`and dropping the file onto the appropriate window presented
`by operating system 135.
`Allocation of a Remote Storage Area
`FIG. 8 is a flow chart 800 that provides a high-level
`overview of one mode of operation in which storage net(cid:173)
`work 220 allocates remote storage areas 225. In block 803, 35
`users access storage servers 210 via global computer net(cid:173)
`work 215 and request a corresponding virtual storage area
`225. For each request, storage server 210 prompts the user
`for information such as a username, password, billing
`address (block 805). Upon approval, storage network 220 40
`automatically allocates a corresponding storage area 225 for
`each user and stores the respective user information in
`metadata database 222 (block 807). After a virtual storage
`area 25 has been allocated, storage network 220 informs
`each user of any necessary access information, such as a 45
`password, so that the user can access the respective storage
`area 225 via the many access interfaces described above
`(block 809).
`Various embodiments have been described of a method
`and system for a data storage system that provides seamless
`access to remote virtual data storage areas via a global
`computer network. Access to the virtual storage area is fully
`integrated with the operating system executing on the client
`computer such that the user, or software applications execut(cid:173)
`ing on the computer, can seamlessly access the correspond- 55
`ing virtual storage area using standard file management
`routines provided by the operating system. In addition, the
`invention provides a wide range of other remote access
`methods to the virtual data storage areas including access via
`electronic mail. This application is intended to cover any 60
`adaptation or variation of the present invention. It is
`intended that this invention be limited only by the claims and
`equivalents thereof.
`What is claimed is:
`1. A method for accessing a network-based data storage 65
`system that provides seamless access to a plurality of
`user-assigned storage areas, the method comprising:
`
`8
`presenting a plurality of access interfaces to the user(cid:173)
`assigned storage areas via a plurality of software appli(cid:173)
`cations executing on a storage server of the data storage
`system;
`servicing access requests from an operating system of a
`client computer with a first one of the access interfaces
`to provide access to a target one of the plurality of
`user-assigned storage areas, wherein the operating sys-
`tem of the client computer includes application pro(cid:173)
`gramming interface (API) routines that present the
`target one of the plurality of user-assignable storage
`areas to software applications executing on the client
`computer as local to the client computer;
`servicing access requests from at least one communica(cid:173)
`tion software application executing on the client com(cid:173)
`puter with a second one of the access interfaces to
`provide access to the target one of the plurality of
`user-assigned storage areas; and
`processing an electronic mail message with a third one of
`the access interfaces to provide access to the target one
`of the plurality of user-assigned storage areas.
`2. The method of claim 1, wherein the electronic mail
`message contains text and one or more attached data files,
`and processing the electronic mail message comprises:
`parsing the text to determine the target one of the user(cid:173)
`assigned storage areas; and
`storing the data files within the target one of the user(cid:173)
`assigned storage areas.
`3. The method of claim 2, further comprising analyzing
`content of a subject field associated with the electronic mail
`message to determine the target one of the user-assigned
`remote storage areas.
`4. The method of claim 2, further comprising analyzing
`both content of a subject field associated the electronic mail
`message and content of a destination address associated with
`the electronic mail message to determine the target one of
`the user-assigned remote storage areas.
`5. The method of claim 2, further comprising analyzing
`the electronic mail message to identify a user associated
`with the electronic mail message and the target one of the
`user-assigned remote storage areas.
`6. The method of claim 5, and further including retrieving
`security information from the electronic mail message in
`order to authenticate the user.
`7. The method of claim 6, wherein the security informa(cid:173)
`tion is a digital signature.
`8. The method of claim 5, wherein storing the data file
`within the target one of the user-assigned remote storage
`50 areas includes storing the data file into a temporary holding
`area until the user associated with the remote storage area
`approves the copying of the data file to the remote storage
`area.
`9. The method of claim 1, wherein communicating the
`electronic mail message includes encrypting the data file.
`10. A data storage system comprising:
`a storage server that maintains a plurality of remote
`storage areas; and
`a plu

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket