Download tsr backup
Author: s | 2025-04-24
TSR Backup 1.1.0.5. Download. TSR Backup Awards. TSR Backup Editor s Review Rating. TSR Backup has been reviewed by Jerome Johnston on .
TSR Backup software Download - TSR Backup software, file backup
Matter of any one or more of Examples 12-15 optionally include wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the method further comprising: detecting a trigger to recover the file from the TSR; formatting the storage device using the OS; installing a new operating system on the formatted storage device; and writing the backup of the file from the TSR to the SSR. OS operating system Example 17 the subject matter of Example 16 optionally includes detecting a second trigger to back up the file in the SSR to the TSR; determining any changes to the file since it was last backed-up to the TSR; and sending a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key. Example 18 the subject matter of Example 17 optionally includes wherein writing the backup of the file from the TSR to the SSR further comprises: logically combining the backup of the file and the file delta in the TSR; and writing the combination from the TSR to the SSR as the backup of the file. Example 19 the subject matter of Example 18 optionally includes deleting the file in the SSR; generating a link in the SSR in place of the deleted file; and recovering the file from the TSR to the SSR based on an activation of the link. Example 20 the subject matter of any one or more of Examples 18-19 optionally include wherein the trigger to recover the file comprises: the size of the associated file delta being within a threshold value of the size of the file in the SSR; the file comprising a text file and a spell check of the backup or the file delta including a number of misspelled words greater than a threshold value; or the file comprising a media file and a value representative of the randomness of data values of the backup or the file delta being greater than a specified threshold value. Example 21 the subject matter of Example 20 optionally includes wherein: the associated file delta comprises multiple associated file deltas; the trigger to recover the file is detected based on the most recent of the multiple associated file deltas backed-up to the TSR; and recovering the file from the TSR to the SSR further comprises: deleting the most recent associated file delta; logically combining the backup of the file and the multiple associated file deltas in the TSR, except for the most recent file delta; and writing the combination to the SSR as the backup of the
TSR Backup software Download - TSR Backup software, file
To recover the file comprises:the size of the associated file delta being within a threshold value of the size of the file in the SSR;the file comprising a text file and a spell check of the backup or the file delta including a number of misspelled words greater than a threshold value; orthe file comprising a media file and a value representative of the randomness of data values of the backup or the file delta being greater than a specified threshold value. 9. The system of claim 8, wherein:the associated file delta comprises multiple associated file deltas;the trigger to recover the file is detected based on the most recent of the multiple associated file deltas backed-up to the TSR; andto recover the file from the TSR to the SSR, the memory further comprises instructions which, when executed by the processor, cause the processor to:delete the most recent associated file delta;logically combine the backup of the file and the multiple associated file deltas in the TSR, except for the most recent file delta; andwrite the combination to the SSR as the backup of the file. 10. The system of claim 9, the memory further comprising instructions which, when executed by the processor, cause the processor to:generate a log of the multiple associated file deltas; andsend a write instruction to the storage device to store the log to the TSR, the write instruction signed using the private key. 11. A method of using a trusted storage region to back up files, the method comprising:executing a backup recovery process in a secure enclave provided by the processor, backup recovery process causing the processor togenerating a public/private key pair;providing the public key to a storage device comprising a standard storage region (SSR) a trusted storage region (TSR), the TSR not being writable by an instruction that is not signed using the private key;detecting a trigger to back up a file in the SSR to the TSR;sending a write instruction to the storage device to perform the backup, the write instruction signed using the private key;causing the storage device to verily the private key signature, of the write instruction, using the public key; andwriting a backup of the file to the TSR based on the private key signature being verified, wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the method further comprising:detecting a trigger to recover the file from the TSR;formatting the storage device using the OS;installing a new operating system on the formatted storage device; andwriting the backup of the file from the TSR to the SSR. 12. The method of claim 11, wherein the TSR comprises a region of the storage device which is protected, fromTSR Backup software Main Window - TSR Soft - TSR Backup
OS; install a new operating system on the formatted storage device; and write the backup of the file from the TSR to the SSR. In Example 6, the subject matter of Example 5 optionally includes the memory further comprising instructions which, when executed by the processor, cause the processor to: detect a second trigger to back up the file in the SSR to the TSR; determine any changes to the file since it was last backed-up to the TSR; and send a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key. In Example 7, the subject matter of Example 6 optionally includes wherein to write the backup of the file from the TSR to the SSR, the memory further comprises instructions which, when executed by the processor, cause the processor to: logically combine the backup of the file and the file delta in the TSR; and write the combination from the TSR to the SSR as the backup of the file. In Example 8, the subject matter of Example 7 optionally includes the memory further comprising instructions which, when executed by the processor, cause the processor to: delete the file in the SSR; generate a link in the SSR in place of the deleted file; and recover the file from the TSR to the SSR based on an activation of the link. In Example 9, the subject matter of any one or more of Examples 7-8 optionally include wherein the trigger to recover the file comprises: the size of the associated file delta being within a threshold value of the size of the file in the SSR; the file comprising a text file and a spell check of the backup or the file delta including a number of misspelled words greater than a threshold value; or the file comprising a media file and a value representative of the randomness of data values of the backup or the file delta being greater than a specified threshold value. In Example 10, the subject matter of Example 9 optionally includes wherein: the associated file delta comprises multiple associated file deltas; the trigger to recover the file is detected based on the most recent of the multiple associated file deltas backed-up to the TSR; and to recover the file from the TSR to the SSR, the memory further comprises instructions which, when executed by the processor, cause the processor to: delete the most recent associated file delta; logically combine the backup of the file and the multiple associated file deltas in the TSR, except for the most recent. TSR Backup 1.1.0.5. Download. TSR Backup Awards. TSR Backup Editor s Review Rating. TSR Backup has been reviewed by Jerome Johnston on .TSR Backup software PRO Vista download - TSR Backup software
File deltas; andsending a write instruction to the storage device to store the log to the TSR, the write instruction signed using the private key. 21. At least one non-transitory machine-readable storage medium comprising instructions, which when executed by a processor of a machine, cause the machine to:execute a backup recovery process in a secure enclave provided by the processor, backup recovery process causing the processor togenerate a public/private key pair;provide the public key to a storage device comprising a standard storage region (SSR) a trusted storage region (TSR), the TSR not being writable by an instruction that is not signed using the private key;detect a trigger to back up a file in the SSR to the TSR;send a write instruction to the storage device to perform the backup, the write instruction signed using the private key;cause the storage device to verify the private key signature, of the write instruction, using the public key; andwrite a backup of the file to the TSR based on the private key signature being verified, wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the medium further comprising instructions which, when executed by the processor, cause the machine to:detect a trigger to recover the file from the TSR;format the storage device using the OS;install a new operating system on the formatted storage device; andwrite the backup of the file from the TSR to the SSR. 22. The machine-readable storage medium of claim 21, further comprising instructions which, when executed by the processor, cause the machine to:detect a second trigger to back up the file in the SSR to the TSR;determine any changes to the file since it was last backed-up to the TSR;send a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key;write the backup of the file from the TSR to the SSR by:logically combining the backup and the file delta in the TSR; andwriting the combination to the SSR as the backup of the file. US15/349,410 2016-11-11 2016-11-11 File backups using a trusted storage region Expired - Fee Related US10116451B2 (en) Priority Applications (1) Application Number Priority Date Filing Date Title US15/349,410 US10116451B2 (en) 2016-11-11 2016-11-11 File backups using a trusted storage region Applications Claiming Priority (1) Application Number Priority Date Filing Date Title US15/349,410 US10116451B2 (en) 2016-11-11 2016-11-11 File backups using a trusted storage region Publications (2) Publication Number Publication Date US20180139053A1 US20180139053A1 (en) 2018-05-17 US10116451B2 true US10116451B2 (en) 2018-10-30 Family ID=62108175 Family Applications (1) Application Number Title Priority Date Filing Date US15/349,410 Expired - Fee Related US10116451B2 (en)PlanetSofts - TSR Backup software PRO - TSR Backup.
Was last backed-up to the TSR; and sending a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key. In Example 18, the subject matter of Example 17 optionally includes wherein writing the backup of the file from the TSR to the SSR further comprises: logically combining the backup of the file and the file delta in the TSR; and writing the combination from the TSR to the SSR as the backup of the file. In Example 19, the subject matter of Example 18 optionally includes deleting the file in the SSR; generating a link in the SSR in place of the deleted file; and recovering the file from the TSR to the SSR based on an activation of the link. In Example 20, the subject matter of any one or more of Examples 18-19 optionally include wherein the trigger to recover the file comprises: the size of the associated file delta being within a threshold value of the size of the file in the SSR; the file comprising a text file and a spell check of the backup or the file delta including a number of misspelled words greater than a threshold value; or the file comprising a media file and a value representative of the randomness of data values of the backup or the file delta being greater than a specified threshold value. In Example 21, the subject matter of Example 20 optionally includes wherein: the associated file delta comprises multiple associated file deltas; the trigger to recover the file is detected based on the most recent of the multiple associated file deltas backed-up to the TSR; and recovering the file from the TSR to the SSR further comprises: deleting the most recent associated file delta; logically combining the backup of the file and the multiple associated file deltas in the TSR, except for the most recent file delta; and writing the combination to the SSR as the backup of the file. In Example 22, the subject matter of Example 21 optionally includes generating a log of the multiple associated file deltas; and sending a write instruction to the storage device to store the log to the TSR, the write instruction signed using the private key. Example 23 is at least one machine-readable storage medium comprising instructions, which when executed by a processor of a machine, cause the machine to: generate a public/private key pair; provide the public key to a storage device comprising a standard storage region (SSR) a trusted storage region (TSR), the TSR not being writable by an instruction thatTSR-Backup/README.md at main betoidk/TSR-Backup - GitHub
The file in the SSR to the TSR; means for determining any changes to the file since it was last backed-up to the TSR; and means for sending a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key. Example 42 the subject matter of Example 41 optionally includes wherein the means for writing the backup of the file from the TSR to the SSR further comprise: means for logically combining the backup of the file and the file delta in the TSR; and means for writing the combination from the TSR to the SSR as the backup of the file. Example 43 the subject matter of Example 42 optionally includes means for deleting the file in the SSR; means for generating a link in the SSR in place of the deleted file; and means for recovering the file from the TSR to the SSR based on an activation of the link. Example 44 the subject matter of any one or more of Examples 42-43 optionally include wherein the trigger to recover the file comprises: the size of the associated file delta being within a threshold value of the size of the file in the SSR; the file comprising a text file and a spell check of the backup or the file delta including a number of misspelled words greater than a threshold value; or the file comprising a media file and a value representative of the randomness of data values of the backup or the file delta being greater than a specified threshold value. Example 45 the subject matter of Example 44 optionally includes wherein: the associated file delta comprises multiple associated file deltas; the trigger to recover the file is detected based on the most recent of the multiple associated file deltas backed-up to the TSR; and the means for recovering the file from the TSR to the SSR further comprise: means for deleting the most recent associated file delta; means for logically combining the backup of the file and the multiple associated file deltas in the TSR, except for the most recent file delta; and means for writing the combination to the SSR as the backup of the file. Example 46 the subject matter of Example 45 optionally includes means for generating a log of the multiple associated file deltas; and means for sending a write instruction to the storage device to store the log to the TSR, the write instruction signed using the private key. Example 47 is a system for using a trusted storage region to back up files, theTSR Backup software 1.1.0.5 Free Download. TSR Soft
Perform the backup, the write instruction signed using the private key;cause the storage device to verily the private key signature, of the write instruction, using the public key; andwrite a backup of the file to the TSR based on the private key signature being verified, wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the memory further comprising instructions which, when executed by the processor, cause the processor to:detect a trigger to recover the file from the TSR;format the storage device using the OS;install a new operating system on the formatted storage device; andwrite the backup of the file from the TSR to the SSR. 2. The system of claim 1, wherein the TSR comprises a region of the storage device which is protected, from being written, by hardware or firmware of the storage device. 3. The system of claim 1, wherein the trigger to back up the file comprises a change to the file in the SSR or the passing of a specified time period since the file was last backed-up from the SSR to the TSR. 4. The system of claim 1, the memory further comprising instructions which, when executed by the processor, cause the processor to send the write instruction via a protected instruction channel based on the private key signature, the protected instruction channel providing confidentiality and integrity protection to the private key using hardware or firmware of the system. 5. The system of claim 1, the memory further comprising instructions which, when executed by the processor, cause the processor to:detect a second trigger to back up the file in the SSR to the TSR;determine any changes to the file since it was last backed-up to the TSR; andsend a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key. 6. The system of claim 5, wherein to write the backup of the file from the TSR to the SSR, the memory further comprises instructions which, when executed by the processor, cause the processor to:logically combine the backup of the file and the file delta in the TSR; andwrite the combination from the TSR to the SSR as the backup of the file. 7. The system of claim 6, the memory further comprising instructions which, when executed by the processor, cause the processor to:delete the file in the SSR;generate a link in the SSR in place of the deleted file; andrecover the file from the TSR to the SSR based on an activation of the link. 8. The system of claim 6, wherein the trigger. TSR Backup 1.1.0.5. Download. TSR Backup Awards. TSR Backup Editor s Review Rating. TSR Backup has been reviewed by Jerome Johnston on .
TSR-Backup-33/README.md at main betoidk/TSR-Backup-33
System comprising: a backup and replacement tool (BRT) configured to: generate a public/private key pair; provide the public key to a storage device comprising a standard storage region (SSR) a trusted storage region (TSR), the TSR not being writable by an instruction that is not signed using the private key; detect a trigger to back up a file in the SSR to the TSR; and send a write instruction to the storage device to perform the backup, the write instruction signed using the private key; and a memory controller configured to cause the storage device to: verify the private key signature, of the write instruction, using the public key; and write a backup of the file to the TSR based on the private key signature being verified. BRT backup and replacement tool Example 48 the subject matter of Example 47 optionally includes wherein the TSR comprises a region of the storage device which is protected, from being written, by hardware or firmware of the storage device. Example 49 the subject matter of any one or more of Examples 47-48 optionally include wherein the trigger to back up the file comprises a change to the file in the SSR or the passing of a specified time period since the file was last backed-up from the SSR to the TSR. Example 50 the subject matter of any one or more of Examples 47-49 optionally include the BRT further configured to send the write instruction via a protected instruction channel based on the private key signature, the protected instruction channel providing confidentiality and integrity protection to the private key using hardware or firmware of the system. Example 51 the subject matter of any one or more of Examples 47-50 optionally include wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the BRT further configured to: detect a trigger to recover the file from the TSR; format the storage device using the OS; install a new operating system on the formatted storage device; and write the backup of the file from the TSR to the SSR. OS operating system Example 52 the subject matter of Example 51 optionally includes the BRT further configured to: detect a second trigger to back up the file in the SSR to the TSR; determine any changes to the file since it was last backed-up to the TSR; and send a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key. Example 53 the subject matter of Example 52 optionally includes wherein to write the backup of theTSR Backup for Windows - CNET Download
Being written, by hardware or firmware of the storage device. 13. The method of claim 11, wherein the trigger to back up the file comprises a change to the file in the SSR or the passing of a specified time period since the file was last backed-up from the SSR to the TSR. 14. The method of claim 11, further comprising sending the write instruction via a protected instruction channel based on the private key signature, the protected instruction channel providing confidentiality and integrity protection to the private key using hardware or firmware of the system. 15. The method of claim 11, further comprising:detecting a second trigger to back up the file in the SSR to the TSR;determining any changes to the file since it was last backed-up to the TSR; andsending a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key. 16. The method of claim 15, wherein writing the backup of the file from the TSR to the SSR further comprises:logically combining the backup of the file and the file delta in the TSR; andwriting the combination from the TSR to the SSR as the backup of the file. 17. The method of claim 16, further comprising:deleting the file in the SSR;generating a link in the SSR in place of the deleted file; andrecovering the file from the TSR to the SSR based on an activation of the link. 18. The method of claim 16, wherein the trigger to recover the file comprises:the size of the associated file delta being within a threshold value of the size of the file in the SSR;the file comprising a text file and a spell check of the backup or the file delta including a number of misspelled words greater than a threshold value; orthe file comprising a media file and a value representative of the randomness of data values of the backup or the file delta being greater than a specified threshold value. 19. The method of claim 18, wherein:the associated file delta comprises multiple associated file deltas;the trigger to recover the file is detected based on the most recent of the multiple associated file deltas backed-up to the TSR; andrecovering the file from the TSR to the SSR further comprises:deleting the most recent associated file delta;logically combining the backup of the file and the multiple associated file deltas in the TSR, except for the most recent file delta; andwriting the combination to the SSR as the backup of the file. 20. The method of claim 19, further comprising:generating a log of the multiple associated. TSR Backup 1.1.0.5. Download. TSR Backup Awards. TSR Backup Editor s Review Rating. TSR Backup has been reviewed by Jerome Johnston on .Download TSR Backup software - topshareware.com
(SSR) a trusted storage region (TSR), the TSR not being writable by an instruction that is not signed using the private key; means for detecting a trigger to back up a file in the SSR to the TSR; means for sending a write instruction to the storage device to perform the backup, the write instruction signed using the private key; means for causing the storage device to verify the private key signature, of the write instruction, using the public key; and means for writing a backup of the file to the TSR based on the private key signature being verified. In Example 37, the subject matter of Example 36 optionally includes wherein the TSR comprises a region of the storage device which is protected, from being written, by hardware or firmware of the storage device. In Example 38, the subject matter of any one or more of Examples 36-37 optionally include wherein the trigger to back up the file comprises a change to the file in the SSR or the passing of a specified time period since the file was last backed-up from the SSR to the TSR. In Example 39, the subject matter of any one or more of Examples 36-38 optionally include sending the write instruction via a protected instruction channel based on the private key signature, the protected instruction channel providing confidentiality and integrity protection to the private key using hardware or firmware of the system. In Example 40, the subject matter of any one or more of Examples 36-39 optionally include wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the apparatus further comprising: means for detecting a trigger to recover the file from the TSR; means for formatting the storage device using the OS; means for installing a new operating system on the formatted storage device; and means for writing the backup of the file from the TSR to the SSR. In Example 41, the subject matter of Example 40 optionally includes means for detecting a second trigger to back up the file in the SSR to the TSR; means for determining any changes to the file since it was last backed-up to the TSR; and means for sending a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key. In Example 42, the subject matter of Example 41 optionally includes wherein the means for writing the backup of the file from the TSR to the SSR further comprise: means for logically combining the backup of the file and the file delta in theComments
Matter of any one or more of Examples 12-15 optionally include wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the method further comprising: detecting a trigger to recover the file from the TSR; formatting the storage device using the OS; installing a new operating system on the formatted storage device; and writing the backup of the file from the TSR to the SSR. OS operating system Example 17 the subject matter of Example 16 optionally includes detecting a second trigger to back up the file in the SSR to the TSR; determining any changes to the file since it was last backed-up to the TSR; and sending a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key. Example 18 the subject matter of Example 17 optionally includes wherein writing the backup of the file from the TSR to the SSR further comprises: logically combining the backup of the file and the file delta in the TSR; and writing the combination from the TSR to the SSR as the backup of the file. Example 19 the subject matter of Example 18 optionally includes deleting the file in the SSR; generating a link in the SSR in place of the deleted file; and recovering the file from the TSR to the SSR based on an activation of the link. Example 20 the subject matter of any one or more of Examples 18-19 optionally include wherein the trigger to recover the file comprises: the size of the associated file delta being within a threshold value of the size of the file in the SSR; the file comprising a text file and a spell check of the backup or the file delta including a number of misspelled words greater than a threshold value; or the file comprising a media file and a value representative of the randomness of data values of the backup or the file delta being greater than a specified threshold value. Example 21 the subject matter of Example 20 optionally includes wherein: the associated file delta comprises multiple associated file deltas; the trigger to recover the file is detected based on the most recent of the multiple associated file deltas backed-up to the TSR; and recovering the file from the TSR to the SSR further comprises: deleting the most recent associated file delta; logically combining the backup of the file and the multiple associated file deltas in the TSR, except for the most recent file delta; and writing the combination to the SSR as the backup of the
2025-04-13To recover the file comprises:the size of the associated file delta being within a threshold value of the size of the file in the SSR;the file comprising a text file and a spell check of the backup or the file delta including a number of misspelled words greater than a threshold value; orthe file comprising a media file and a value representative of the randomness of data values of the backup or the file delta being greater than a specified threshold value. 9. The system of claim 8, wherein:the associated file delta comprises multiple associated file deltas;the trigger to recover the file is detected based on the most recent of the multiple associated file deltas backed-up to the TSR; andto recover the file from the TSR to the SSR, the memory further comprises instructions which, when executed by the processor, cause the processor to:delete the most recent associated file delta;logically combine the backup of the file and the multiple associated file deltas in the TSR, except for the most recent file delta; andwrite the combination to the SSR as the backup of the file. 10. The system of claim 9, the memory further comprising instructions which, when executed by the processor, cause the processor to:generate a log of the multiple associated file deltas; andsend a write instruction to the storage device to store the log to the TSR, the write instruction signed using the private key. 11. A method of using a trusted storage region to back up files, the method comprising:executing a backup recovery process in a secure enclave provided by the processor, backup recovery process causing the processor togenerating a public/private key pair;providing the public key to a storage device comprising a standard storage region (SSR) a trusted storage region (TSR), the TSR not being writable by an instruction that is not signed using the private key;detecting a trigger to back up a file in the SSR to the TSR;sending a write instruction to the storage device to perform the backup, the write instruction signed using the private key;causing the storage device to verily the private key signature, of the write instruction, using the public key; andwriting a backup of the file to the TSR based on the private key signature being verified, wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the method further comprising:detecting a trigger to recover the file from the TSR;formatting the storage device using the OS;installing a new operating system on the formatted storage device; andwriting the backup of the file from the TSR to the SSR. 12. The method of claim 11, wherein the TSR comprises a region of the storage device which is protected, from
2025-03-31File deltas; andsending a write instruction to the storage device to store the log to the TSR, the write instruction signed using the private key. 21. At least one non-transitory machine-readable storage medium comprising instructions, which when executed by a processor of a machine, cause the machine to:execute a backup recovery process in a secure enclave provided by the processor, backup recovery process causing the processor togenerate a public/private key pair;provide the public key to a storage device comprising a standard storage region (SSR) a trusted storage region (TSR), the TSR not being writable by an instruction that is not signed using the private key;detect a trigger to back up a file in the SSR to the TSR;send a write instruction to the storage device to perform the backup, the write instruction signed using the private key;cause the storage device to verify the private key signature, of the write instruction, using the public key; andwrite a backup of the file to the TSR based on the private key signature being verified, wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the medium further comprising instructions which, when executed by the processor, cause the machine to:detect a trigger to recover the file from the TSR;format the storage device using the OS;install a new operating system on the formatted storage device; andwrite the backup of the file from the TSR to the SSR. 22. The machine-readable storage medium of claim 21, further comprising instructions which, when executed by the processor, cause the machine to:detect a second trigger to back up the file in the SSR to the TSR;determine any changes to the file since it was last backed-up to the TSR;send a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key;write the backup of the file from the TSR to the SSR by:logically combining the backup and the file delta in the TSR; andwriting the combination to the SSR as the backup of the file. US15/349,410 2016-11-11 2016-11-11 File backups using a trusted storage region Expired - Fee Related US10116451B2 (en) Priority Applications (1) Application Number Priority Date Filing Date Title US15/349,410 US10116451B2 (en) 2016-11-11 2016-11-11 File backups using a trusted storage region Applications Claiming Priority (1) Application Number Priority Date Filing Date Title US15/349,410 US10116451B2 (en) 2016-11-11 2016-11-11 File backups using a trusted storage region Publications (2) Publication Number Publication Date US20180139053A1 US20180139053A1 (en) 2018-05-17 US10116451B2 true US10116451B2 (en) 2018-10-30 Family ID=62108175 Family Applications (1) Application Number Title Priority Date Filing Date US15/349,410 Expired - Fee Related US10116451B2 (en)
2025-04-21