Sign In to Follow Application
View All Documents & Correspondence

Enterprise Distributed Free Space File System

Abstract: A method and system for effective utilization of free space in electronic devices with a non-volatile memory  across an enterprise is disclosed. The enterprise distributed free space file system disclosed herein comprises a central server and multiple nodes with an agent in each node. The agent creates hidden blocks of configurable sizes in the free spaces of each electronic device and reports the availability of blocks to the central server. The central server encrypts the content to be stored in the blocks and generates an encryption key for each block. The encryption keys are randomly generated and stored in the database of the central server. The encrypted content is invisible to the owner of the electronic device. The encryption key is not shared with nodes or any other system. Further  the stored content in the free spaces can be accessed only through the central server. FIG. 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
05 November 2012
Publication Number
52/2012
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

HCL Technologies Limited
HCL Technologies Ltd.  50-53 Greams Road Chennai – 600006  Tamil Nadu  India

Inventors

1. Simy Chacko
HCL Technologies Ltd.  H08 Building  HITEC City – 2  Phoenix Infocity Pvt. Ltd. SEZ  Survey No. 30  34  35 & 38  Madhapur  Hyderabad - 500081

Specification

FORM 2
The Patent Act 1970
(39 of 1970)
&
The Patent Rules  2005

COMPLETE SPECIFICATION
(SEE SECTION 10 AND RULE 13)

TITLE OF THE INVENTION

“Enterprise distributed free space file system”

APPLICANTS:
Name : HCL Technologies Limited
Nationality : Indian
Address : HCL Technologies Ltd.  50-53 Greams
Road Chennai – 600006  Tamil Nadu  India

The following Specification particularly describes and ascertains the nature of this invention and the manner in which it is to be performed:
FIELD OF INVENTION
[001] The embodiments herein relate to the field of data storage in computers and more particularly to a plurality of networked computers storing data on internal non-volatile memory devices.

BACKGROUND OF INVENTION
[002] Recently  in electronic devices with a non-volatile memory space and so on  the data capacity has increased to levels at which many users have large volumes of spare non-volatile memory available  which exceeds their data storage requirements. For example  in a system of networked personal computers running on any operating system  communicating with the file server upon which data is stored  individual PCs may have unused non-volatile data storage capacities in the range of 50-950 gigabytes (Gbs). Further  the unused space in case of a tablet computer ranges form 3-64 (Gbs)  whereas for a smart phone the unused volatile data storage capacity in the range of 2-32 (Gbs). This effectively represents a resource which has been paid for  but which remains unused. Whatever the size of computer network  having unused non-volatile disk space in a network adds to the cost of ownership of a network  but provides no benefit to the network owner.
[003] Size of the non-volatile secondary storage space in a typical PC has increased from 3.75 megabytes to 4 terabytes or more in the recent years. Price has also decreased from about US$15 000 per megabyte to less than $0.0001 per megabyte. Further  according to a survey conducted recently on new PCs and Laptops in an enterprise  average hard drive capacity is 500Gb to 2Tb and only 20-30% are utilized at any point of time. For example  an enterprise that has 50000 PC  may have 35000Tb free space  which is not being utilized. Further  the devices such as cell phone  tablet and so on also has non-volatile storage space from 1Gb to 64Gb and major portion of the storage space is not being utilized effectively.
[004] For storing and managing data in the free space of electronic devices  a file system can be used. File systems are primarily concerned with the overall management of files in a computer system or in a network. Among other things  file systems generally contain methods for providing files to be stored  referenced  shared and secured. Further a file system provides methods for accessing data stored in files and maintains file integrity to ensure that the information in a file remains uncorrupted.
[005] In the light of above discussion  there is a need for a method and system that converts the unused space of an electronic device to a general purpose secured and distributed file system that can be used for backup and archiving.


SUMMARY OF INVENTION
[006] Accordingly the invention provides a method for maximum utilization of free space in electronic devices with non-volatile memory connected in a network  wherein the method comprises creating blocks in the free space of at least one electronic device  wherein the at least one electronic device is connected to a server  storing at least one encrypted content in the blocks in the free space by the server  wherein the encrypted content stored in the free space of the electronic device is invisible to owner of the electronic device  accessing the encrypted content stored in the blocks using the server and copying the encrypted content to a new electronic device connected in the network  if the block is unavailable.
[007] Accordingly the invention provides a system for maximum utilization of free space in electronic devices with non-volatile memory  connected in a network  wherein the system comprises a central server  an electronic device  an agent  wherein the agent is associated with the electronic device  further the system is configured to create blocks in the free space of at least one electronic device  wherein the at least one electronic device is connected to a server  store at least one encrypted content in the blocks in the free space by the server  wherein the encrypted content stored in the free space of the electronic device is invisible to owner of the electronic device  access the encrypted content stored in the blocks using the server and copy the encrypted content to a new electronic device connected in the network  if the block is unavailable.

BRIEF DESCRIPTION OF THE FIGURES
[008] The embodiments herein will be better understood from the following detailed description with reference to the drawings  in which:
[009] FIG. 1 illustrates a block diagram of the overall system  according to embodiments disclosed herein; and
[0010] FIG. 2 is a flow diagram explaining the various steps involved in an enterprise distributed free space file system  according to embodiments disclosed herein.

DETAILED DESCRIPTION OF INVENTION
[001] The embodiments herein and the various features and details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly  the examples should not be construed as limiting the scope of the embodiments herein.
[002] The embodiments herein disclose a method and a system for effective utilization of free space in electronic devices having a non-volatile memory  across an enterprise. The enterprise distributed free space file system disclosed herein is a dynamic and distributed file system which is created in the free space available in the personal computers (PCs) that are connected in a network. The content stored in the free space is invisible to the owner of the electronic device and is not readable (encrypted). The network with a plurality of nodes  where each node is connected to an electronic device is monitored by a central server. The enterprise distributed free space file system (EDFS-FS) disclosed herein comprises a central server and multiple nodes with an agent in each node. The agent creates hidden blocks of configurable sizes in the free spaces available in each electronic device and reports the availability of these blocks to the central server. The central server encrypts the content to be stored in the blocks and generates an encryption key for each block. The encryption keys are randomly generated and stored in the database of the central server. The encryption key is not shared with nodes or any other system. Further  the stored content in the blocks of free spaces can be accessed only through the central server. The central server copies the stored content to a new node which is available. In case there is any block that is unavailable for a given period of time.
[003] In an embodiment  the method and system of free space file system disclosed herein can be applicable to an enterprise  data centers  other organizations like internet service providers (ISPs) and telecom service providers (TSPs). Further  the cloud service providers can create such file system using the devices or PCs that are under their control.
[004] Referring now to the drawings  and more particularly to FIGS. 1 and 2  where similar reference characters denote corresponding features consistently throughout the figures  there are shown embodiments.
[005] FIG. 1 illustrates a block diagram of the overall system  according to embodiments disclosed herein. As depicted in the figure  the enterprise distributed free space file system comprises a plurality of electronic devices with non-volatile memory space connected to a central server 100  an agent in each node connected to the central server 100. The agents in each node connected to the central server are shown in the figure as agent 101a  agent 101b  agent 101c and agent 101d. Further  a user 102 can access the stored content in the free space of the electronic devices using the central server 100. For the purpose of demonstration  only the electronic devices with non-volatile storage space that are connected to the central server 100 are shown. For example  the electronic device with memory space may be a PC with a hard disk  which is divided into used disk space and free disk space  as shown in the figure. Each electronic device with storage space (for example  a PC with a hard disk) is connected to the central server 100 through a node. In an embodiment  the agent can be software residing in the hard disk of the electronic device and each agent in the hard disk plays a similar role.
[006] In an embodiment  the electronic device can be personal computer (PC)  cell phone  tablet  Personal Digital Assistant (PDA)  laptop  media players and any electronic gadget comprising a non-volatile memory space.
[007] The agent present in each node creates hidden blocks of configurable sizes in the free space and reports the availability of blocks to the central server 100. For example  a block of size 1Gb can be created by the agent and this availability of 1Gb sized block is reported to the central server by the agent in each node. Further  the 1Gb blocks created in the free space is a typical binary file in the base files system such as new technology file system (NTFS)  yet another flash file system (YAFFS) or file allocation table (FAT) or third extended file system (EXT3). These files will be hidden to the users of the electronic device by using a file system filter driver which is part of a node agent.
[008] The central server 100 detects the availability of hidden blocks through the agent. Further  the central server 100 tracks all the nodes attached to it and monitor each and every node. Every new file created or modified is encrypted by the central server 100 and is divided into the blocks of 1 Gb size (configurable). For example  consider a file of size 10 Gb needs to be stored in the free space of the electronic device. This file is divided into ten parts with each part holding 1 Gb of data by the central server 100. This 1 Gb parts are stored in the hidden blocks in the free space. Further  the file is stored in more than two configurable nodes (electronic devices) of the network. In other words  the content stored in each and every block will have a multiple replica. This is to ensure the effective recovery of the stored content in case of unavailability of any particular block over a period of time. The central server 100 monitors or tracks the unavailability of blocks stored in nodes. Incase if there is any block which is unavailable for more than a given period of time (say 24 hours)  the central server 100 copies the stored content to a new node which is available in the network.
[009] This stored content in the free space is invisible to the owner of the electronic device. The central server 100 generates an encryption key for each block randomly and stores all the encryption keys in a database. In an embodiment  the database that stores all the encryption keys of the hidden blocks in the free spaces may reside in the central server 100. The data transferred to the nodes are encrypted and the encryption key is never shared with the nodes or any other system that supports any block encryption algorithm that is in use today. In an embodiment  there can exist any number of nodes to the central server 100  where a plurality of electronic devices are interconnected to each other to form a network across an enterprise.
[0010] The user 102 can access the stored content (files) in the hidden blocks only though the central server 100. The central server 100 provides access to the stored content through any of the protocols such as hyper text transfer protocol (HTTP)  file transfer protocol (FTP)  network file system (NFS)  common internet file system (CIFS) and so on.
[0011] The content is stored in the free (unused file system area) space in the desktops. The owner of the electronic device will be able to view and can use his free space  anytime whenever he wants. This will be handled using a file system filter driver. In an embodiment  the actual content is hidden in the free space areas of the electronic device that are owned by an organization or an enterprise.
[0012] FIG. 2 is a flow diagram explaining the various steps involved in an enterprise distributed free space file system  according to embodiments disclosed herein. The method and system for creating an enterprise distributed free space file system (EDFS-FS) is as described herein. Initially an agent in each node connected to the central server 100  creates (201) hidden blocks of configurable sizes in the free space of the electronic devices. In an embodiment  the agent in each node creates blocks of 1Gb size (which can be configurable according to the storage requirements) in the available free spaces of the electronic devices in the network. The network comprises a plurality of electronic devices having non-volatile memory space are interconnected to each other and is monitored by a central server 100. Further  the agent  after creating the hidden blocks of configurable sizes in the free spaces  reports (202) the availability of free space in the hidden blocks to the central server 100. The central server 100 stores (203) the new file that is created or modified into the blocks in the free space of the electronic device by dividing the new file into blocks of configurable sizes. Further  the central server 100 encrypts (204) the content that is stored in the hidden blocks of the free space.
[0013] Every new file that is created or modified is encrypted by the central server 100 and is divided into the blocks of 1Gb size (configurable). Further  the file is stored in more than two configurable nodes by the central server 100. In other words  the content stored in each and every block will have a multiple replica in the other nodes that are available. This is to ensure the effective recovery of the stored content in case of unavailability of any particular block over a period of time.
[0014] The central server 100 generates (205) a different encryption key for the content stored in each block in the free space and stores in a database. In an embodiment  the database that stores all the encryption keys of the hidden blocks in the free spaces may reside in the central server 100. The data transferred to the nodes are encrypted and the encrypted keys are not shared with the nodes or any other system that supports block encryption algorithm that is in use today. Further  the central server monitors all the nodes that are connected to it.
[0015] Further  if the central server 100 detects the unavailability of a block with a stored content in any of the nodes in the network  the central server 100 copies (206) the stored content to a new node (electronic device) which is available. In an embodiment  the if the central server 100 detects any block unavailable for more than 24 hours (configurable)  the central server 100 copies the content to another electronic device that is available in the network. In this way the encrypted content that is stored in the hidden blocks of the free space in the electronic s device will be copied and stored in multiple nodes of a network  thereby enabling the backup of the data every time. Even when one electronic device on the network is not functioning (e.g. PC is not operating over a given time)  the encrypted content in the blocks can be accessed using any other node in that network through the central server 100. Hence effective backup and archiving of data can be achieved using the method and system of enterprise distributed free space file system. There can be a scenario  where the total free space available in a node is more than the storage requirement. In such scenarios  the administrator of the network should be able to add more disk space by adding new nodes anytime.
[0016] By using the method and system of enterprise distributed free space file system as described above  the organizations or enterprises can create huge volumes of storage space with near dollar investment. Further  by using this method  a maximum utilization of free space in an electronic device or an instrument can be achieved. The method can achieve inherent disaster recovery  if the nodes in the disclosed method are distributed into multiple geo locations. Further  this method reduces the processing overhead in node PCs.
[0017] The disclosed method of enterprise distributed free space file system can create huge storage volumes when it is implemented in cloud based devices or PC management systems. Further  the method assumes good network connectivity among the nodes for achieving better performance.
[0018] The embodiments disclosed herein can be implemented through at least one software program running on at least one hardware device and performing network management functions to control the elements. The elements shown in Figs. 1 include blocks which can be at least one of a hardware device  or a combination of hardware device and software module.
[0019] Therefore  it is understood that the scope of the protection is extended to such a program and in addition to a computer readable means having a message therein  such computer readable storage means contain program code means for implementation of one or more steps of the method  when the program runs on a server or mobile device or any suitable programmable device.
[0020] The foregoing description of the specific embodiments will so fully reveal the general nature of the embodiments herein that others can  by applying current knowledge  readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept  and  therefore  such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore  while the embodiments herein have been described in terms of preferred embodiments  those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the claims as described herein.

CLAIMS
We claim:
1. A method for maximum utilization of free space in electronic devices with non-volatile memory connected in a network  wherein said method comprises:
creating blocks in said free space of at least one electronic device  wherein said at least one electronic device is connected to a server;
storing at least one encrypted content in said blocks in said free space by said server  wherein said encrypted content stored in said free space of said electronic device is invisible to owner of said electronic device;
accessing said encrypted content stored in said blocks using said server; and
copying said encrypted content to a new electronic device connected in said network  if said block is unavailable.
2. The method as in claim 1  wherein said method creates said blocks of configurable sizes in said free spaces of said electronic device using an agent associated with said electronic device.
3. The method as in claim 1  wherein said content is divided into said blocks of said configurable sizes  before storing said content in said free spaces of said at least one electronic device in said network.
4. The method as in claim 3  wherein said content in said blocks is encrypted by said server  before storing said content in said free space  and said server generates different encryption keys for said blocks.
5. The method as in claim 1  wherein said encrypted content is copied to said new electronic device in said network  if said block with said encrypted content is unavailable for a certain time period  wherein said time period is configurable.
6. A system for maximum utilization of free space in electronic devices with non-volatile memory  connected in a network  wherein said system comprises:
a central server;
an electronic device;
an agent;
wherein said agent is associated with said electronic device  further said system is configured to:
create blocks in said free space of at least one electronic device  wherein said at least one electronic device is connected to a server;
store at least one encrypted content in said blocks in said free space by said server  wherein said encrypted content stored in said free space of said electronic device is invisible to owner of said electronic device;
access said encrypted content stored in said blocks using said server; and
copy said encrypted content to a new electronic device connected in said network  if said block is unavailable.
7. The system as in claim 6  wherein said agent is configured to create said blocks of configurable sizes  further said agent is configured to report the availability of said blocks to said server.
8. The system as in claim 6  wherein said server is configured to encrypt said content in said blocks  before storing said encrypted content in said free spaces of said at least one electronic device in said network.
9. The system as in claim 6  wherein said server is configured to generate different encryption keys for said blocks.
10. The system as in claim 6  wherein said is server is configured to copy said encrypted content to said new electronic device in said network  if said block with said encrypted content is unavailable for a certain time period  wherein said time period is configurable.

Dated: 5th Day of November 2012 Signature:

Dr Kalyan Chakravarthy
(Patent Agent)

ABSTRACT
A method and system for effective utilization of free space in electronic devices with a non-volatile memory  across an enterprise is disclosed. The enterprise distributed free space file system disclosed herein comprises a central server and multiple nodes with an agent in each node. The agent creates hidden blocks of configurable sizes in the free spaces of each electronic device and reports the availability of blocks to the central server. The central server encrypts the content to be stored in the blocks and generates an encryption key for each block. The encryption keys are randomly generated and stored in the database of the central server. The encrypted content is invisible to the owner of the electronic device. The encryption key is not shared with nodes or any other system. Further  the stored content in the free spaces can be accessed only through the central server.
FIG. 1

Documents

Application Documents

# Name Date
1 4623-CHE-2012-AbandonedLetter.pdf 2019-03-05
1 Power of Authority.PDF 2012-11-08
2 Form-5.pdf 2012-11-08
2 4623-CHE-2012-FER.pdf 2018-08-29
3 Form-3.pdf 2012-11-08
3 Form 3 [13-06-2016(online)].pdf 2016-06-13
4 Form-1.pdf 2012-11-08
4 4623-CHE-2012 FORM-3 30-09-2013.pdf 2013-09-30
5 Drawings.pdf 2012-11-08
5 4623-CHE-2012 FORM-1 25-02-2013.pdf 2013-02-25
6 4623-CHE-2012 POWER OF ATTORNEY 25-02-2013.pdf 2013-02-25
6 4623-CHE-2012 FORM-9 17-12-2012.pdf 2012-12-17
7 4623-CHE-2012 CORRESPONDENCE OTHERS 25-02-2013.pdf 2013-02-25
7 4623-CHE-2012 FORM-18 17-12-2012.pdf 2012-12-17
8 abstract4623-CHE-2012.jpg 2012-12-24
8 4623-CHE-2012 CORRESPONDENCE OTHERS 17-12-2012.pdf 2012-12-17
9 abstract4623-CHE-2012.jpg 2012-12-24
9 4623-CHE-2012 CORRESPONDENCE OTHERS 17-12-2012.pdf 2012-12-17
10 4623-CHE-2012 FORM-18 17-12-2012.pdf 2012-12-17
10 4623-CHE-2012 CORRESPONDENCE OTHERS 25-02-2013.pdf 2013-02-25
11 4623-CHE-2012 POWER OF ATTORNEY 25-02-2013.pdf 2013-02-25
11 4623-CHE-2012 FORM-9 17-12-2012.pdf 2012-12-17
12 Drawings.pdf 2012-11-08
12 4623-CHE-2012 FORM-1 25-02-2013.pdf 2013-02-25
13 Form-1.pdf 2012-11-08
13 4623-CHE-2012 FORM-3 30-09-2013.pdf 2013-09-30
14 Form-3.pdf 2012-11-08
14 Form 3 [13-06-2016(online)].pdf 2016-06-13
15 Form-5.pdf 2012-11-08
15 4623-CHE-2012-FER.pdf 2018-08-29
16 Power of Authority.PDF 2012-11-08
16 4623-CHE-2012-AbandonedLetter.pdf 2019-03-05

Search Strategy

1 SEARCH4623_29-08-2018.pdf