Sign In to Follow Application
View All Documents & Correspondence

System And Method For Data Backup And Recovery From A User Device

Abstract: The present disclosure relates to a system and method for data backup, and recovery in an event of damage to a user device. The system comprises a memory unit [202] which is integrated on the user device. The memory unit [202] comprises a storage device [102] which is adapted to store data. The data stored in the storage device [102] is encrypted according to a predefined protocol. The memory unit [202] further comprises a housing [204] made up of a plurality of layers [104]. The memory unit [202] encapsulates the storage device [102] therein. The housing [204] is thereby adapted to at least partially restrict an external force from acting on the storage device [102] and damaging the storage device [102]. [FIG. 4]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
21 September 2023
Publication Number
14/2025
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

Jio Platforms Limited
Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.

Inventors

1. Aayush Bhatnagar
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
2. Pradeep Kumar Bhatnagar
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
3. Munir Sayyad
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.
4. Anup Patil
Reliance Corporate Park, Thane-Belapur Road, Ghansoli, Navi Mumbai, Maharashtra 400701, India.

Specification

1
FORM 2
THE PATENTS ACT, 1970
(39 OF 1970)
&
5 THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
10 “SYSTEM AND METHOD FOR DATA BACKUP AND
RECOVERY FROM A USER DEVICE”
15 We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr. Centre
Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
20
The following specification particularly describes the invention and the manner in
which it is to be performed.
25
2
SYSTEM AND METHOD FOR DATA BACKUP AND RECOVERY FROM
A USER DEVICE
5 FIELD OF THE DISCLOSURE
[0001] Embodiments of the present disclosure generally relate to storage devices.
More particularly, embodiments of the present disclosure relate to a system and a
method for data backup and recovery from a user device in an event of damage to
10 the user device.
BACKGROUND
[0002] The following description of the related art is intended to provide
15 background information pertaining to the field of the disclosure. This section may
include certain aspects of the art that may be related to various features of the
present disclosure. However, it should be appreciated that this section is used only
to enhance the understanding of the reader with respect to the present disclosure,
and not as admissions of the prior art.
20
[0003] When a mobile phone handset is damaged intentionally or un-intentionally,
the data related to the handset, i.e., the device, such as the last live location etc. may
not be available. The data related to the handset may be of extreme importance in
several instances. For example, the data may be needed for some legal
25 investigations, or in case of some high-profile users etc.
[0004] When a handset is damaged, especially when the damage is caused to, say,
the motherboard of the handset, the data cannot be retrieved. Since in many cases,
the data related to the handset or contained in the handset may be of high relevance,
30 it is needed to take backup of relevant data so that the data can be recovered in case
of the handset gets damaged. The existing solutions for data backup and recovery
3
do not provide for situations where the mobile handset is damaged or subject to
conditions like immersion in water or other such liquids, chemicals, etc., set on fire,
subject to extreme stress such as under stone or rock, etc.
[0005] Thus, there exists an imperative 5 need in the art to provide a method and a
system for data backup and recovery in case of device damage, which the present
disclosure aims to address.
SUMMARY
10
[0006] This section is provided to introduce certain aspects of the present disclosure
in a simplified form that are further described below in the detailed description.
This summary is not intended to identify the key features or the scope of the claimed
subject matter.
15
[0007] An aspect of the present disclosure may relate to a system for data backup,
and recovery in an event of damage to a user device. The system comprises a
memory unit. The memory unit is adapted to be integrated on the user device. The
memory unit comprises a storage device adapted to store data. The data stored in
20 the storage device is encrypted according to a predefined protocol. The memory
unit further comprises a housing comprising a plurality of layers and encapsulating
the storage device therein. The housing is adapted to at least partially restrict an
external force from acting on the storage device.
25 [0008] In an exemplary aspect of the present disclosure, each layer from the
plurality of layers is made from a material selected from a group consisting of
polycarbonate, acrylonitrile butadiene styrene (ABS), fiberglass, reinforced plastic
(FRP), polyethylene, carbon fiber, carbon fiber composites, rubber, elastomer,
metal alloy, kevlar, rubberized fabric, honeycomb structure, polyurethane (PU),
30 ceramic, armour, polyimide, refractory material, ablative material, lead, concrete,
and combinations thereof.
4
[0009] In an exemplary aspect of the present disclosure, the predefined protocol
comprises techniques based on a public key and private key pair for encrypting the
data for storage in the storage device.
5
[0010] In an exemplary aspect of the present disclosure, a decryption of the
encrypted data is performed based on the public key and private key pair, by an
authorised entity in the event of damage to the user device, the authorised entity
comprising an original equipment manufacturer approved by a regulatory agency.
10
[0011] Another aspect of the present disclosure may relate to a method for data
backup, and recovery in an event of damage to a user device. The method comprises
selecting, by a processing unit of the user device, a data to be stored in a storage
device. The method further comprises encrypting, by the processing unit, the data
15 based on a predefined protocol. The method further comprises storing, by the
processing unit, in the memory unit, the encrypted data. The storage device is
integrated with a memory unit in the user device, the memory unit comprising a
housing comprising a plurality of layers, and encapsulating the storage device
therein, wherein the housing is adapted to at least partially restrict an external force
20 from acting on the storage device.
[0012] Yet another aspect of the present disclosure may relate to a user device for
data backup, and recovery in an event of damage to a user device. The user device
comprises a memory unit for data backup and recovery in an event of damage to
25 the user device. The memory unit is adapted to be integrated on the user device.
The memory unit comprises a storage device adapted to store data. The data stored
in the storage device is encrypted according to a predefined protocol. The memory
unit further comprises a housing comprising a plurality of layers and encapsulating
the storage device therein. The housing is adapted to at least partially restrict an
30 external force from acting on the storage device.
5
[0013] Yet another aspect of the present disclosure may relate to a non-transitory
computer readable storage medium storing instruction for data backup, and
recovery in an event of damage to a user device, the instructions include executable
code which, when executed by the processing unit of the user device cause to select
a data to be stored in a storage device. The instructions 5 when executed by the system
further cause the processing unit to encrypt the data based on a predefined protocol.
The instructions when executed further cause the processing unit to store the
encrypted data in the storage device. The storage device is integrated with a memory
unit in the user device, the memory unit comprising a housing comprising a plurality
10 of layers, and encapsulating the storage device therein, wherein the housing is
adapted to at least partially restrict an external force from acting on the storage
device.
OBJECTS OF THE DISCLOSURE
15
[0014] Some of the objects of the present disclosure, which at least one
embodiment disclosed herein satisfies are listed herein below.
[0015] It is an object of the present disclosure to provide a system and a method for
20 data backup and recovery in case of device damage.
[0016] It is another object of the present disclosure to provide a solution that avoids
loss of critical data from a user device.
25 [0017] It is yet another object of the present disclosure to provide a solution that
maintains integrity of data in case main phone storage is compromised.
[0018] It is yet another object of the present disclosure is to protect data from being
lost in case of accidental damage to aid in forensics.
30
DESCRIPTION OF THE DRAWINGS
6
[0019] The accompanying drawings, which are incorporated herein, and constitute
a part of this disclosure, illustrate exemplary embodiments of the disclosed methods
and systems in which like reference numerals refer to the same parts throughout the
different drawings. Components in the drawings 5 are not necessarily to scale,
emphasis instead being placed upon clearly illustrating the principles of the present
disclosure. Also, the embodiments shown in the figures are not to be construed as
limiting the disclosure, but the possible variants of the method and system
according to the disclosure are illustrated herein to highlight the advantages of the
10 disclosure. It will be appreciated by those skilled in the art that disclosure of such
drawings includes disclosure of electrical components or circuitry commonly used
to implement such components.
[0020] FIG. 1 illustrates an exemplary block diagram representation of the storage
15 device encapsulated in a plurality of layers, for data backup and recovery in an event
of damage to a user device, in accordance with exemplary implementations of the
present disclosure.
[0021] FIG. 2 illustrates an exemplary block diagram of a system for data backup,
20 and recovery in an event of damage to a user device, in accordance with exemplary
implementations of the present disclosure.
[0022] FIG. 3 illustrates a method flow diagram for data backup, and recovery in
an event of damage to a user device, in accordance with exemplary implementations
25 of the present disclosure.
[0023] FIG. 4 illustrates an exemplary method for data backup, in accordance with
exemplary implementations of the present disclosure.
30 [0024] The foregoing shall be more apparent from the following more detailed
description of the disclosure.
7
DETAILED DESCRIPTION
[0025] In the following description, for the purposes of explanation, various
specific details are set forth in order 5 to provide a thorough understanding of
embodiments of the present disclosure. It will be apparent, however, that
embodiments of the present disclosure may be practiced without these specific
details. Several features described hereafter may each be used independently of one
another or with any combination of other features. An individual feature may not
10 address any of the problems discussed above or might address only some of the
problems discussed above.
[0026] The ensuing description provides exemplary embodiments only, and is not
intended to limit the scope, applicability, or configuration of the disclosure. Rather,
15 the ensuing description of the exemplary embodiments will provide those skilled in
the art with an enabling description for implementing an exemplary embodiment.
It should be understood that various changes may be made in the function and
arrangement of elements without departing from the spirit and scope of the
disclosure as set forth.
20
[0027] Specific details are given in the following description to provide a thorough
understanding of the embodiments. However, it will be understood by one of
ordinary skill in the art that the embodiments may be practiced without these
specific details. For example, circuits, systems, processes, and other components
25 may be shown as components in block diagram form in order not to obscure the
embodiments in unnecessary detail.
[0028] Also, it is noted that individual embodiments may be described as a process
which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure
30 diagram, or a block diagram. Although a flowchart may describe the operations as
a sequential process, many of the operations may be performed in parallel or
8
concurrently. In addition, the order of the operations may be re-arranged. A process
is terminated when its operations are completed but could have additional steps not
included in a figure.
[0029] The word “exemplary” and/or 5 “demonstrative” is used herein to mean
serving as an example, instance, or illustration. For the avoidance of doubt, the
subject matter disclosed herein is not limited by such examples. In addition, any
aspect or design described herein as “exemplary” and/or “demonstrative” is not
necessarily to be construed as preferred or advantageous over other aspects or
10 designs, nor is it meant to preclude equivalent exemplary structures and techniques
known to those of ordinary skill in the art. Furthermore, to the extent that the terms
“includes,” “has,” “contains,” and other similar words are used in either the detailed
description or the claims, such terms are intended to be inclusive in a manner similar
to the term “comprising” as an open transition word without precluding any
15 additional or other elements.
[0030] As used herein, a “processing unit” or “processor” or “operating processor”
includes one or more processors, wherein processor refers to any logic circuitry for
processing instructions. A processor may be a general-purpose processor, a special
20 purpose processor, a conventional processor, a digital signal processor, a plurality
of microprocessors, one or more microprocessors in association with a (Digital
Signal Processing) DSP core, a controller, a microcontroller, Application Specific
Integrated Circuits, Field Programmable Gate Array circuits, any other type of
integrated circuits, etc. The processor may perform signal coding data processing,
25 input/output processing, and/or any other functionality that enables the working of
the system according to the present disclosure. More specifically, the processor or
processing unit is a hardware processor.
[0031] As used herein, “a user equipment”, “a user device”, “a smart-user-device”,
30 “a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”,
“a wireless communication device”, “a mobile communication device”, “a
9
communication device” may be any electrical, electronic and/or computing device
or equipment, capable of implementing the features of the present disclosure. The
user equipment/device may include, but is not limited to, a mobile phone, smart
phone, laptop, a general-purpose computer, desktop, personal digital assistant,
tablet computer, wearable device or any other 5 computing device which is capable
of implementing the features of the present disclosure. Also, the user device may
contain at least one input means configured to receive an input from at least one of
a transceiver unit, a processing unit, a storage unit, a detection unit and any other
such unit(s) which are required to implement the features of the present disclosure.
10
[0032] As used herein, “storage unit” refers to a machine or computer-readable
medium including any mechanism for storing information in a form readable by a
computer or similar machine. For example, a computer-readable medium includes
read-only memory (“ROM”), random access memory (“RAM”), magnetic disk
15 storage media, optical storage media, flash memory devices or other types of
machine-accessible storage media. The storage unit stores at least the data that may
be required by one or more units of the system to perform their respective functions.
[0033] All modules, units, components used herein, unless explicitly excluded
20 herein, may be software modules or hardware processors, the processors being a
general-purpose processor, a special purpose processor, a conventional processor,
a digital signal processor (DSP), a plurality of microprocessors, one or more
microprocessors in association with a DSP core, a controller, a microcontroller,
Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array
25 circuits (FPGA), any other type of integrated circuits, etc.
[0034] The present disclosure aims to overcome the above-mentioned and other
existing problems in this field of technology by providing system and method of
data backup, and recovery in an event of damage to a user device by providing a
30 storage device to store critical data.
10
[0035] FIG. 1 illustrates an exemplary block diagram representation of the system
for data backup and recovery in an event of damage to a user device, in accordance
with exemplary implementations of the present disclosure.
[0036] As shown in FIG. 1, 5 the system [100] comprises at least one storage device
[102] and plurality of protection layers [104]. The storage device [102] is covered
by the plurality of protection layers [104].
[0037] The storage device [102] is adapted to store a data backup in an event of
10 damage to the user device. The event of damage may refer to any intentional or
unintentional events such as shock, fire, electromagnetic blasts or radiation, etc.
The storage device [102] may be one of an industrial and automotive secured digital
(SD) card, an ultra-high speed (UHS) card, an application performance class, a
Secure Digital Standard Capacity (SDSC), a secure digital extended capacity
15 (SDXC), a Secure Digital Ultra Capacity (SDUC), a mini SD card, a micro SD card
and a nano SD card.
[0038] The storage device [102] is configured to store the data or a backup copy of
the data including, but not limited to, call logs, instant messaging (IM) application
20 logs, browsing history, notes, downloaded files, audio files, photos, images, videos,
software files, or any other files/data that may be stored in a memory device. The
IM logs may be a record of messages that take place over an instant messaging (IM)
platform. The IM logs keep a track of important discussions or maintains a record
for compliance. The storage device [102] is configured to have a read-write data
25 connectivity with other components of the user device. The read-write data
connectivity as shown in FIG. 1, refers to the ability of the system [100] to read
data from the user device and write data to the user device. The read-write data
connectivity ensures the update, modification, or management of data dynamically
in the storage device [102].
30
11
[0039] The plurality of layers [104], such as layer 104 (a), layer 104 (b), layer 104
(c) and layer 104 (d), may be made from a damage proof material. The damage
proof material protects the storage device [102] from shock, impact, fire, water,
electromagnetic blasts, radiation, and the like. Each of the plurality of layers [104]
is made from a material selected 5 from a group consisting of polycarbonate,
acrylonitrile butadiene styrene (ABS), fiberglass, reinforced plastic (FRP),
polyethylene, carbon fiber, carbon fiber composites, rubber, elastomer, metal alloy,
kevlar, a rubberized fabric, a honeycomb structure, polyurethane (PU), ceramic,
armour, polyimide, refractory material, ablative material, lead, concrete, and
10 combinations thereof. Further, the plurality of layers [104] may be part of a housing.
These pluralities of layers form a strong protective cover for the storage device
[102] and thereby restricting external forces such as shock, impact, fire, water, etc
from damaging the storage device [102]. The layers made from material such as,
polycarbonate is temperature resistant, and flame retardant/self15
extinguishing. Similarly, ABS has high tensile strength and is very resistant to
physical impacts and chemical corrosion, which allow the finished plastic to
withstand heavy use and adverse environmental conditions.
[0040] Referring to FIG. 2, an exemplary block diagram of a system [200] for data
20 backup, and recovery in an event of damage to a user device is shown, in accordance
with the exemplary implementations of the present disclosure. The system [200]
comprises at least one memory unit [202]. The memory unit [202] comprises at
least one housing [204] (or as used herein, housing unit [204]), wherein the housing
[204] comprises a plurality of layers [104], and a storage device [102] (or as used
25 herein, storage unit [102]). Also, the housing [204] encapsulates the storage device
[102]. Also, all of the components/ units of the system [200] are assumed to be
connected to each other unless otherwise indicated below. As shown in the FIG. 2
all units shown within the system should also be assumed to be connected to each
other. Also, in FIG. 2 only a few units are shown, however, the system [200] may
30 comprise multiple such units or the system [200] may comprise any such numbers
of said units, as required to implement the features of the present disclosure.
12
Further, in an implementation, the system [200] may be present in a user device to
implement the features of the present disclosure. The system [200] may be a part of
the user device / or may be independent of but in communication with the user
device (may also referred herein as a UE).
5
[0041] The system [200] is configured for data backup and recovery in an event of
damage to a user device, with the help of the interconnection between the
components/units of the system [200]. The damage may be intentional or
unintentional. The damage includes, but is not limited to, the user device may be
10 immersed in water or other liquids, chemicals, etc., being exposed to conditions like
fire, subject to extreme stress such as under stone or rock.
[0042] The memory unit [202] is adapted to be integrated on the user device. In an
implementation of the present disclosure, the memory unit [202] may be operably
15 connected with the user device. In another implementation of the present disclosure,
the memory unit [202] may be part of the memory of the user device. The memory
unit [202] may perform data backup in the event of damage. In another
implementation, the memory unit [202] may be integrated in a printed circuit board
(PCB) of the user device. The memory unit [202] is a micro/nano secure digital
20 (SD) card which can be easily installed on the user device. The micro/nano SD card
may be installed on the PCB of the user device and the PCB is connected with other
components of the user device.
[0043] The data backup includes, but may not be limited to, call logs, instant
25 messaging (IM) logs, browsing history, notes, downloaded files, ambient audio of
a predetermined period of time, photos and videos of a predefined number. The IM
logs may be a record of messages that take place over an instant messaging (IM)
platform. The IM logs keep tracks of important discussions or maintains a record
for compliance. The ambient audio refers to noise that may be picked from the
30 background of the user device. In one example, the predetermined period of time
may be determined by a system operator. In an example, the system operator may
13
be one of: a user of the system [200], an administrator of the system [200], and/or
a manufacturer of the system [200], and the like. For example, the predetermined
period of time to record the ambient audio may be 24 hours. In one example, the
predefined number of photos and videos may be determined by the system operator.
For instance, the system operator defines 5 the predetermined number of photos to be
the last 100 photos.
[0044] The memory unit [202] comprises the storage device [102]. The storage
device [102] is adapted to store the data backup. The data backup stored in the
10 storage device [102] is encrypted according to a predefined protocol. The
predefined protocol comprises techniques based on a public key and private key
pair for encrypting the data for storage in the storage device [102]. The public key
is used for encrypting data to protect data by using codes to prevent unauthorised
access. The process of encryption includes converting a readable data into
15 unreadable data. The public key cannot be used to decode the data. The data may
be decrypted by the private key only. The predefined protocol may be a postquantum
cryptography method. The post-quantum cryptography refers to
cryptographic algorithms that may be secure from decryption by quantum
computers. The post-quantum cryptography includes but may not be limited to
20 forming algorithms based on hash functions, error-correcting codes, lattice-based
cryptography codes, multivariate polynomial cryptography, and the like. The
encryption based on hash functions refers to taking input data and transform the
data into fixed-length strings of characters. The input to the hash function may be
of any length but the output is always of fixed length. The cryptography based on
25 error correcting codes involves encoding data in a way that even if some parts of
the data may get corrupted, the original data can be recovered. The multivariate
polynomial cryptography is a type of public-key cryptography that uses
multivariate polynomials. The multivariate polynomials are resistant to quantum
attacks. In one example, once the data backup is encrypted, the user may not be able
30 to access the data backup.
14
[0045] The memory unit [202] further comprises the housing [204]. The housing
[204] encapsulates the storage device [102]. In an implementation of the present
disclosure, the storage device [102] may be coupled to the memory unit [202]. In
another implementation the storage device [102] may be a part of the memory unit
[202]. The storage device [102] may be one of 5 an industrial and automotive secured
digital (SD) card, an ultra-high speed (UHS) card, an application performance class,
a Secure Digital Standard Capacity (SDSC), a secure digital extended capacity
(SDXC), a Secure Digital Ultra Capacity (SDUC), a mini SD card, a micro SD card
and a nano SD card.
10
[0046] In an implementation of the present disclosure, a processing unit of the user
device may clean the backup data at predefined intervals of time. The predefined
intervals of time may be defined by the system operator. The cleaning includes
removing old data and adding new data to the backup. For example, if the
15 predetermined number of photos to be stored in the storage device [102] is defined
as the latest 100 photos. Once a new set of 100 photos is added to the memory of
the user device, the storage device [102] may clean and remove the 100 photos to
add the new set of photos.
20 [0047] The housing [204] is adapted to at least partially restrict an external force
from acting on the storage device [102]. The housing [204] comprises a plurality of
layers [104]. The plurality of layers [104] are configured to cover the storage device
[102]. The plurality of layers [104] is made up of damage proof material. The
damage proof material may protect the storage device [102] from shock, impact,
25 fire, water, electromagnetic blasts, radiation and the like. These pluralities of layers
form a strong protective cover for the storage device [102] and thereby restricting
external forces such as shock, impact, fire, water, etc from damaging the storage
device [102]. The layers made from material such as, polycarbonate is temperature
resistant, and somewhat flame retardant/self-extinguishing. Similarly, ABS has
30 high tensile strength and is very resistant to physical impacts and chemical
corrosion, which allow the finished plastic to withstand heavy use and adverse
15
environmental conditions. However, it is to be noted, there is no such material
which can fully protect a device from all kinds of damages. Therefore, the present
disclosure by using the layers as described above is able to at least partially restrict
the damages to the user device.
5
[0048] In one example, each layer from the plurality of layers [104] is made from
a material selected from a group consisting of polycarbonate, acrylonitrile
butadiene styrene (ABS), fiberglass, reinforced plastic (FRP), polyethylene, carbon
fiber, carbon fiber composites, rubber, elastomer, metal alloy, kevlar, rubberized
10 fabric, honeycomb structure, polyurethane (PU), ceramic, armour, polyimide,
refractory material, ablative material, lead, concrete, and combinations thereof.
These pluralities of layers form a strong protective cover for the storage device
[102] and thereby restricting external forces such as shock, impact, fire, water, etc
from damaging the storage device [102]. The layers made from material such as,
15 polycarbonate is temperature resistant, and somewhat flame retardant/selfextinguishing.
Similarly, ABS has high tensile strength and is very resistant to
physical impacts and chemical corrosion, which allow the finished plastic to
withstand heavy use and adverse environmental conditions.
20 [0049] Further, after the data backup is stored in the storage device [102], the
memory unit [202] is adapted to decrypt the encrypted data based on the public key
and private key pair for the data backup to be accessible to the user. The private key
is to decrypt data that was encrypted with the corresponding public key. The
decryption may be performed by an authorised entity. The authorised entity may
25 perform decryption using some commands or execute certain code or scripts to run
decryption algorithms. The authorised entity includes but may not be limited to an
original equipment manufacturer (OEM) approved by a regulatory agency, such as
Telecom Regulatory Authority of India (TRAI).
30 [0050] Referring to FIG. 3, an exemplary method flow diagram [300] for data
backup, and recovery in an event of damage to a user device, in accordance with
16
exemplary implementations of the present disclosure is shown. In an
implementation the method [300] is performed by the system [200]. Further, in an
implementation, the system [200] may be present in a server device to implement
the features of the present disclosure. Also, as shown in FIG. 3, the method [300]
5 starts at step [302].
[0051] At step [304], the method comprises selecting a data to be stored in the
storage device [102], by a processing unit of the user device. The processing unit is
a part of the user device and may store information for data backup and recovery
10 by the storage device [102]. The damage includes but is not limited to the user
device may be immersed in water or other liquids, chemicals, etc., being exposed
to conditions like fire, subject to extreme stress such as under stone or rock. The
data refers to information including the call logs, the IM logs, the browsing history,
the notes, the downloaded files, the ambient audio of the predetermined period of
15 time, the photos and the videos of the predefined number. This data may be selected
by the user by using the interface of the user device and browsing the user device
to locate and select the data.
[0052] At step [306], the method comprises encrypting, by the processing unit, the
20 data based on a predefined protocol. The processing unit may run certain commands
or application on the user device to encrypt the selected data using the predefined
protocol, which comprises techniques based on a public key and private key pair
for encrypting the data for storage in the storage device [102]. The predefined
protocol may be a post-quantum cryptography method. Cryptography is a process
25 of hiding transmitted information by the sender such that it may be read only by the
intended recipient. The post-quantum cryptography also known as Quantum-
Resistant Cryptography (QRC), focuses on developing cryptographic algorithms
and protocols able to stand up to quantum computing power. The public key
cryptography algorithms which are used currently, are sufficient protection today,
30 however, using a quantum computer, a hacker would be able to break the algorithms
or reduce the strength of the symmetric crypto keys and crypto hashes in minutes.
17
Post-Quantum Cryptography uses a new set of Quantum Resistant Algorithms,
created by researchers and tested by industry standard bodies. The present
disclosure uses post-quantum cryptography algorithms for encrypting the data for
greater safety and protection as described above. The PQC algorithms use a larger
key size, for example, Advanced Encryption Standard 5 (AES) with keys greater than
today's 128-bit keys. This way, post-quantum cryptography is a defense against
potential cyberattacks from quantum computers. Further, the public key is used in
PQC algorithms for encrypting data to protect data by using codes to prevent
unauthorised access. The process of encryption includes converting a readable data
10 into unreadable data by using a combination of numerical computations that appear
incomprehensible to the untrained eye. Techniques like mathematical concepts
and algorithms are used to make the transferred data difficult for others
to decode. The public key cannot be used to decode the data. The data may be
decrypted by the private key only. Further, the post-quantum cryptography includes
15 but may not be limited to forming algorithms based on hash functions, errorcorrecting
codes, lattice-based cryptography codes, multivariate polynomial
cryptography, and the like. The encryption based on hash functions refers to taking
input data and transforming the data into fixed-length strings of characters. The
input to the hash function may be of any length but the output is always of fixed
20 length. The fixed length of the output is because a hash is a deterministic
hexadecimal number. This means that no matter how many characters the input has,
the hash will always be the same number of characters. The cryptography based on
error correcting codes involves encoding data in a way that even if some parts of
the data may get corrupted, the original data can be recovered. The multivariate
25 polynomial cryptography is a type of public-key cryptography PKC) that uses
multivariate polynomials. This type of public key cryptography is considered as one
of the major types of PKCs that could resist potentially even the powerful quantum
computers of the future. It is based on the computational problem of finding the
roots of a system of multivariate polynomials over a finite field.
30
18
[0053] Next at step [308], the method comprises storing, by the processing unit, in
the storage device [102], the encrypted data. The processing unit may select the
storage device [102] on the user interface of the user device and transfer the
encrypted data to the storage device [102] using user interface-based actions, like
dragging. The storage device 5 [102] is integrated with the memory unit [202] of the
user device. The storage device [102] in the memory unit [202] may be covered by
the plurality of layers [104]. The plurality of layers [104] refers to a damage proof
material. The damage proof material may protect the storage device [102] from
shock, impact, fire, water, electromagnetic blasts and radiation. In one example,
10 each layer from the plurality of layers [104] is made from a material selected from
a group consisting of polycarbonate, acrylonitrile butadiene styrene (ABS),
fiberglass, reinforced plastic (FRP), polyethylene, carbon fiber, carbon fiber
composites, rubber, elastomer, metal alloy, kevlar, rubberized fabric, honeycomb
structure, polyurethane (PU), ceramic, armour, polyimide, refractory material,
15 ablative material, lead, concrete, and combinations thereof.
[0054] In an implementation of the present disclosure, the backup data may be
cleaned at predefined intervals of time. The predefined intervals of time may be
defined by the system operator. In an example, the system operator may be one of:
20 a user of the system [200], an administrator of the system [200], and the like. The
cleaning includes removing old data and adding new data to the backup. For
example, if the predetermined number of photos to be stored in the storage device
[102] is defined as the latest 100 photos. Once a new set of 100 photos is added to
the memory of the user device, the storage device [102] may clean and remove the
25 100 photos to add the new set of photos.
[0055] Further, after the data backup is stored in the storage device [102], the data
backup may be decrypted based on the public key and private key pair, for the data
backup to be accessible to the user. The private key is to decrypt data that was
30 encrypted with the corresponding public key. The decryption may be performed by
19
an authorised entity. The authorised entity includes but may not be limited to an
original equipment manufacturer (OEM) approved by a regulatory agency.
[0056] The method terminates at step [310].
5
[0057] Referring to FIG. 4, an exemplary method for data backup, in accordance
with exemplary implementations of the present disclosure, is shown.
[0058] At step [402], a data is generated in the memory of the user device. The data
10 includes, but not limited to, the call logs, the IM logs, the browsing history, the
notes, the downloaded files, the ambient audio of the predetermined period of time,
the photos and the videos of the predefined number.
[0059] Next, at step [404], a data backup is selected from the generated data. The
15 data backup may include a set of critical call log data, critical IM logs, critical notes,
critical download files, and the like. The data backup may be defined by a user of
the user device. In another example, the processing unit of the user device may be
configured to identify the data backup from the generated data at the user device.
The data backup may be selected by the processing unit of the user device. In an
20 implementation of the present disclosure, the storage device [102] may be
configured to store the data backup at predefined time intervals from the generated
data at the user device. The predefined time period may be defined by the user of
the user device, the system operator, the system [200], and the like.
25 [0060] Next at step [406], the selected data backup is encrypted. In an
implementation, the encryption method is the post-quantum cryptography. Once the
selected data backup is encrypted, the user may not be able to access the data
backup. The data backup may be decrypted by the original equipment manufacturer
(OEM). The OEM may decrypt the data backup based on an approval of a
30 regulatory authority. In another example, the approval may be of a lawful agency.
The process of decryption by the OEM includes the OEM to access the encrypted
20
data backup stored in the storage device [102]. Before decrypting, the OEM may
verify the integrity of the data backup. The verification may include checking the
digital signature of the lawful agency. Further, the OEM may retrieve a decryption
key. Based on the decryption key, the OEM initiates the decryption process.
5
[0061] Once the data backup is encrypted, further at step [408], the encrypted data
is stored in the storage device [102]. The storage device [102] is covered with the
plurality of layers [104]. The plurality of layers [104] are made of a material
selected from the group consisting of polycarbonate, acrylonitrile butadiene styrene
10 (ABS), fiberglass, reinforced plastic (FRP), polyethylene, carbon fiber, carbon fiber
composites, rubber, elastomer, metal alloy, kevlar, rubberized fabric, honeycomb
structure, polyurethane (PU), ceramic, armour, polyimide, refractory material,
ablative material, lead, concrete, and combinations thereof. The plurality of layers
[104] protects the storage device [102] from damages including but not limited to
15 shock, impact, fire, water, electromagnetic blasts and radiation to avoid the backup
data from getting destroyed.
[0062] At step [410], the backup data is cleaned at predefined intervals of time. The
predefined intervals of time may be defined by the system operator. In an example,
20 the system operator may be one of: a user of the system [200], an administrator of
the system [200], a manufacturer of the system [200], and the like. The cleaning
includes removing old data and adding new data to the backup. For example, a set
of official call data may be stored in the storage device [102]. A new set of official
call data is added to the user device every day, the official call log data may be
25 cleaned every day to update the call data in the storage device [102] from the user
device and the old set of official call data may be removed.
[0063] The data may be recovered from the storage device [102] based in an event
of damage to the user device without any damage to the data stored in the storage
30 device [102].
21
[0064] The present disclosure further discloses a user device for data backup, and
recovery in an event of damage to a user device. The user device comprises a
memory unit for data backup and recovery in an event of damage to the user device.
The memory unit is adapted to be integrated on the user device. The memory unit
comprises a storage device adapted 5 to store data. The data stored in the storage
device is encrypted according to a predefined protocol. The memory unit further
comprises a housing comprising a plurality of layers and encapsulating the storage
device therein. The housing is adapted to at least partially restrict an external force
from acting on the storage device.
10
[0065] The present disclosure further discloses a non-transitory computer readable
storage medium storing instruction for data backup, and recovery in an event of
damage to a user device, the instructions include executable code which, when
executed by a processing unit of the system, cause the processing unit of the user
15 device to select a data to be stored in a storage device [102]. The instructions when
executed further cause the processing unit to encrypt the data based on a predefined
protocol. The instructions when executed further cause the processing unit to store
the encrypted data in the storage device. The storage device [102] is integrated with
a memory unit [202] in the user device, the memory unit [202] comprising a housing
20 [204] comprising a plurality of layers [104], and encapsulating the storage device
[102] therein, wherein the housing [204] is adapted to at least partially restrict an
external force from acting on the storage device [102].
[0066] As is evident from the above, the present disclosure provides a technically
25 advanced solution for data backup, and recovery in an event of damage to a user
device. The present solution provides a system and a method for data backup and
recovery in case of device damage. The present disclosure further provides a
solution that avoids loss of critical data from a user device. Furthermore, the present
disclosure provides a solution that maintains integrity of data in case main phone
30 storage is compromised. The present disclosure further protects data from being lost
in case of accidental damage to aid in forensics.
22
[0067] While considerable emphasis has been placed herein on the disclosed
implementations, it will be appreciated that many implementations can be made and
that many changes can be made to the implementations without departing from the
principles of the present disclosure. 5 These and other changes in the implementations
of the present disclosure will be apparent to those skilled in the art, whereby it is to
be understood that the foregoing descriptive matter to be implemented is illustrative
and non-limiting.
10 [0068] Further, in accordance with the present disclosure, it is to be acknowledged
that the functionality described for the various components/units can be
implemented interchangeably. While specific embodiments may disclose a
particular functionality of these units for clarity, it is recognized that various
configurations and combinations thereof are within the scope of the disclosure. The
15 functionality of specific units as disclosed in the disclosure should not be construed
as limiting the scope of the present disclosure. Consequently, alternative
arrangements and substitutions of units, provided they achieve the intended
functionality described herein, are considered to be encompassed within the scope
of the present disclosure.
23
We Claim:
1. A system for data backup, and recovery in an event of damage to a user
device, the system comprising:
- a memory unit [202] adapted to be integrated on the user device,
wherein the memory unit [202] comprises:
- a storage device [102] adapted to store data, wherein the data stored
in the storage device [102] is encrypted according to a predefined
protocol; and
- a housing [204] comprising a plurality of layers [104], and
encapsulating the storage device [102] therein, wherein the housing
[204] is adapted to at least partially restrict an external force from
acting on the storage device [102].
2. The system as claimed in claim 1, wherein each layer from the plurality of
layers [104] is made from a material selected from a group consisting of
polycarbonate, acrylonitrile butadiene styrene (ABS), fiberglass, reinforced
plastic (FRP), polyethylene, carbon fiber, carbon fiber composites, rubber,
elastomer, metal alloy, kevlar, rubberized fabric, honeycomb structure,
polyurethane (PU), ceramic, armour, polyimide, refractory material,
ablative material, lead, concrete, and combinations thereof.
3. The system as claimed in claim 1, wherein the predefined protocol
comprises techniques based on a public key and private key pair for
encrypting the data for storage in the storage device [102].
4. The system as claimed in claim 3, wherein a decryption of the encrypted
data is performed based on the public key and private key pair, by an
authorised entity in the event of damage to the user device, the authorised
entity comprising an original equipment manufacturer approved by a
regulatory agency.
24
5. A method for data backup, and recovery in an event of damage to a user
device, the method comprising:
- selecting, by a processing unit of the user device, a data to be stored in
a storage device [102];
- encrypting, by the processing unit, the data based on a predefined
protocol; and
- storing, by the processing unit, in the storage device [202], the
encrypted data,
wherein
the storage device [102] is integrated with a memory unit [202] in the
user device, the memory unit [202] comprising a housing [204]
comprising a plurality of layers [104], and encapsulating the storage
device [102] therein, wherein the housing [204] is adapted to at least
partially restrict an external force from acting on the storage device
[102].
6. The method as claimed in claim 5, wherein the predefined protocol
comprises techniques based on a public key and a private key pair for
encrypting the data for storage in the storage device [102].
7. The method as claimed in claim 6, the method further comprising:
- performing, a decryption of the encrypted data based on the public key
and private key pair, in the event of damage to the user device.
8. A user device comprising:
- a memory unit [202] for data backup, and recovery in an event of
damage to the user device, wherein the memory unit [202] is adapted to
be integrated on the user device, and wherein the memory unit [202]
comprises:
25
- a storage device [102] adapted to store data, wherein the data stored
in the storage device [102] is encrypted according to a predefined
protocol; and
- a housing [204] comprising a plurality of layers [104], and
encapsulating the storage device [102] therein, wherein the housing
[204] is adapted to at least partially restrict an external force from
acting on the storage device [102].
9. The user device as claimed in claim 8, wherein each layer from the plurality
of layers [104] is made from a material selected from a group consisting of
polycarbonate, acrylonitrile butadiene styrene (ABS), fiberglass, reinforced
plastic (FRP), polyethylene, carbon fiber, carbon fiber composites, rubber,
elastomer, metal alloy, kevlar, rubberized fabric, honeycomb structure,
polyurethane (PU), ceramic, armour, polyimide, refractory material,
ablative material, lead, concrete, and combinations thereof.
10. The user device as claimed in claim 8, wherein the predefined
protocol comprises techniques based on a public key and a private key pair
for encrypting the data for storage in the storage device [102].
11. The user device as claimed in claim 10, wherein a decryption of the
encrypted data is performed based on the public key and private key pair, in
the event of damage to the user device.

Documents

Application Documents

# Name Date
1 202321063575-STATEMENT OF UNDERTAKING (FORM 3) [21-09-2023(online)].pdf 2023-09-21
2 202321063575-PROVISIONAL SPECIFICATION [21-09-2023(online)].pdf 2023-09-21
3 202321063575-POWER OF AUTHORITY [21-09-2023(online)].pdf 2023-09-21
4 202321063575-FORM 1 [21-09-2023(online)].pdf 2023-09-21
5 202321063575-FIGURE OF ABSTRACT [21-09-2023(online)].pdf 2023-09-21
6 202321063575-DRAWINGS [21-09-2023(online)].pdf 2023-09-21
7 202321063575-Proof of Right [12-01-2024(online)].pdf 2024-01-12
8 202321063575-FORM-5 [19-09-2024(online)].pdf 2024-09-19
9 202321063575-DRAWING [19-09-2024(online)].pdf 2024-09-19
10 202321063575-CORRESPONDENCE-OTHERS [19-09-2024(online)].pdf 2024-09-19
11 202321063575-COMPLETE SPECIFICATION [19-09-2024(online)].pdf 2024-09-19
12 202321063575-Request Letter-Correspondence [07-10-2024(online)].pdf 2024-10-07
13 202321063575-Power of Attorney [07-10-2024(online)].pdf 2024-10-07
14 202321063575-FORM 3 [07-10-2024(online)].pdf 2024-10-07
15 202321063575-Form 1 (Submitted on date of filing) [07-10-2024(online)].pdf 2024-10-07
16 202321063575-Covering Letter [07-10-2024(online)].pdf 2024-10-07
17 202321063575-CERTIFIED COPIES TRANSMISSION TO IB [07-10-2024(online)].pdf 2024-10-07
18 Abstract.jpg 2024-10-18
19 202321063575-ORIGINAL UR 6(1A) FORM 1 & 26-070125.pdf 2025-01-14