Tsr backup pro
Author: m | 2025-04-23
Download TSR Backup Pro latest version for Windows free to try. TSR Backup Pro latest update:
PlanetSofts - TSR Backup software PRO - TSR Backup.
Matter of any one or more of Examples 12-15 optionally include wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the method further comprising: detecting a trigger to recover the file from the TSR; formatting the storage device using the OS; installing a new operating system on the formatted storage device; and writing the backup of the file from the TSR to the SSR. OS operating system Example 17 the subject matter of Example 16 optionally includes detecting a second trigger to back up the file in the SSR to the TSR; determining any changes to the file since it was last backed-up to the TSR; and sending a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key. Example 18 the subject matter of Example 17 optionally includes wherein writing the backup of the file from the TSR to the SSR further comprises: logically combining the backup of the file and the file delta in the TSR; and writing the combination from the TSR to the SSR as the backup of the file. Example 19 the subject matter of Example 18 optionally includes deleting the file in the SSR; generating a link in the SSR in place of the deleted file; and recovering the file from the TSR to the SSR based on an activation of the link. Example 20 the subject matter of any one or more of Examples 18-19 optionally include wherein the trigger to recover the file comprises: the size of the associated file delta being within a threshold value of the size of the file in the SSR; the file comprising a text file and a spell check of the backup or the file delta including a number of misspelled words greater than a threshold value; or the file comprising a media file and a value representative of the randomness of data values of the backup or the file delta being greater than a specified threshold value. Example 21 the subject matter of Example 20 optionally includes wherein: the associated file delta comprises multiple associated file deltas; the trigger to recover the file is detected based on the most recent of the multiple associated file deltas backed-up to the TSR; and recovering the file from the TSR to the SSR further comprises: deleting the most recent associated file delta; logically combining the backup of the file and the multiple associated file deltas in the TSR, except for the most recent file delta; and writing the combination to the SSR as the backup of the Download TSR Backup Pro latest version for Windows free to try. TSR Backup Pro latest update: To recover the file comprises:the size of the associated file delta being within a threshold value of the size of the file in the SSR;the file comprising a text file and a spell check of the backup or the file delta including a number of misspelled words greater than a threshold value; orthe file comprising a media file and a value representative of the randomness of data values of the backup or the file delta being greater than a specified threshold value. 9. The system of claim 8, wherein:the associated file delta comprises multiple associated file deltas;the trigger to recover the file is detected based on the most recent of the multiple associated file deltas backed-up to the TSR; andto recover the file from the TSR to the SSR, the memory further comprises instructions which, when executed by the processor, cause the processor to:delete the most recent associated file delta;logically combine the backup of the file and the multiple associated file deltas in the TSR, except for the most recent file delta; andwrite the combination to the SSR as the backup of the file. 10. The system of claim 9, the memory further comprising instructions which, when executed by the processor, cause the processor to:generate a log of the multiple associated file deltas; andsend a write instruction to the storage device to store the log to the TSR, the write instruction signed using the private key. 11. A method of using a trusted storage region to back up files, the method comprising:executing a backup recovery process in a secure enclave provided by the processor, backup recovery process causing the processor togenerating a public/private key pair;providing the public key to a storage device comprising a standard storage region (SSR) a trusted storage region (TSR), the TSR not being writable by an instruction that is not signed using the private key;detecting a trigger to back up a file in the SSR to the TSR;sending a write instruction to the storage device to perform the backup, the write instruction signed using the private key;causing the storage device to verily the private key signature, of the write instruction, using the public key; andwriting a backup of the file to the TSR based on the private key signature being verified, wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the method further comprising:detecting a trigger to recover the file from the TSR;formatting the storage device using the OS;installing a new operating system on the formatted storage device; andwriting the backup of the file from the TSR to the SSR. 12. The method of claim 11, wherein the TSR comprises a region of the storage device which is protected, fromComments
Matter of any one or more of Examples 12-15 optionally include wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the method further comprising: detecting a trigger to recover the file from the TSR; formatting the storage device using the OS; installing a new operating system on the formatted storage device; and writing the backup of the file from the TSR to the SSR. OS operating system Example 17 the subject matter of Example 16 optionally includes detecting a second trigger to back up the file in the SSR to the TSR; determining any changes to the file since it was last backed-up to the TSR; and sending a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key. Example 18 the subject matter of Example 17 optionally includes wherein writing the backup of the file from the TSR to the SSR further comprises: logically combining the backup of the file and the file delta in the TSR; and writing the combination from the TSR to the SSR as the backup of the file. Example 19 the subject matter of Example 18 optionally includes deleting the file in the SSR; generating a link in the SSR in place of the deleted file; and recovering the file from the TSR to the SSR based on an activation of the link. Example 20 the subject matter of any one or more of Examples 18-19 optionally include wherein the trigger to recover the file comprises: the size of the associated file delta being within a threshold value of the size of the file in the SSR; the file comprising a text file and a spell check of the backup or the file delta including a number of misspelled words greater than a threshold value; or the file comprising a media file and a value representative of the randomness of data values of the backup or the file delta being greater than a specified threshold value. Example 21 the subject matter of Example 20 optionally includes wherein: the associated file delta comprises multiple associated file deltas; the trigger to recover the file is detected based on the most recent of the multiple associated file deltas backed-up to the TSR; and recovering the file from the TSR to the SSR further comprises: deleting the most recent associated file delta; logically combining the backup of the file and the multiple associated file deltas in the TSR, except for the most recent file delta; and writing the combination to the SSR as the backup of the
2025-04-15To recover the file comprises:the size of the associated file delta being within a threshold value of the size of the file in the SSR;the file comprising a text file and a spell check of the backup or the file delta including a number of misspelled words greater than a threshold value; orthe file comprising a media file and a value representative of the randomness of data values of the backup or the file delta being greater than a specified threshold value. 9. The system of claim 8, wherein:the associated file delta comprises multiple associated file deltas;the trigger to recover the file is detected based on the most recent of the multiple associated file deltas backed-up to the TSR; andto recover the file from the TSR to the SSR, the memory further comprises instructions which, when executed by the processor, cause the processor to:delete the most recent associated file delta;logically combine the backup of the file and the multiple associated file deltas in the TSR, except for the most recent file delta; andwrite the combination to the SSR as the backup of the file. 10. The system of claim 9, the memory further comprising instructions which, when executed by the processor, cause the processor to:generate a log of the multiple associated file deltas; andsend a write instruction to the storage device to store the log to the TSR, the write instruction signed using the private key. 11. A method of using a trusted storage region to back up files, the method comprising:executing a backup recovery process in a secure enclave provided by the processor, backup recovery process causing the processor togenerating a public/private key pair;providing the public key to a storage device comprising a standard storage region (SSR) a trusted storage region (TSR), the TSR not being writable by an instruction that is not signed using the private key;detecting a trigger to back up a file in the SSR to the TSR;sending a write instruction to the storage device to perform the backup, the write instruction signed using the private key;causing the storage device to verily the private key signature, of the write instruction, using the public key; andwriting a backup of the file to the TSR based on the private key signature being verified, wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the method further comprising:detecting a trigger to recover the file from the TSR;formatting the storage device using the OS;installing a new operating system on the formatted storage device; andwriting the backup of the file from the TSR to the SSR. 12. The method of claim 11, wherein the TSR comprises a region of the storage device which is protected, from
2025-03-31File deltas; andsending a write instruction to the storage device to store the log to the TSR, the write instruction signed using the private key. 21. At least one non-transitory machine-readable storage medium comprising instructions, which when executed by a processor of a machine, cause the machine to:execute a backup recovery process in a secure enclave provided by the processor, backup recovery process causing the processor togenerate a public/private key pair;provide the public key to a storage device comprising a standard storage region (SSR) a trusted storage region (TSR), the TSR not being writable by an instruction that is not signed using the private key;detect a trigger to back up a file in the SSR to the TSR;send a write instruction to the storage device to perform the backup, the write instruction signed using the private key;cause the storage device to verify the private key signature, of the write instruction, using the public key; andwrite a backup of the file to the TSR based on the private key signature being verified, wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the medium further comprising instructions which, when executed by the processor, cause the machine to:detect a trigger to recover the file from the TSR;format the storage device using the OS;install a new operating system on the formatted storage device; andwrite the backup of the file from the TSR to the SSR. 22. The machine-readable storage medium of claim 21, further comprising instructions which, when executed by the processor, cause the machine to:detect a second trigger to back up the file in the SSR to the TSR;determine any changes to the file since it was last backed-up to the TSR;send a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key;write the backup of the file from the TSR to the SSR by:logically combining the backup and the file delta in the TSR; andwriting the combination to the SSR as the backup of the file. US15/349,410 2016-11-11 2016-11-11 File backups using a trusted storage region Expired - Fee Related US10116451B2 (en) Priority Applications (1) Application Number Priority Date Filing Date Title US15/349,410 US10116451B2 (en) 2016-11-11 2016-11-11 File backups using a trusted storage region Applications Claiming Priority (1) Application Number Priority Date Filing Date Title US15/349,410 US10116451B2 (en) 2016-11-11 2016-11-11 File backups using a trusted storage region Publications (2) Publication Number Publication Date US20180139053A1 US20180139053A1 (en) 2018-05-17 US10116451B2 true US10116451B2 (en) 2018-10-30 Family ID=62108175 Family Applications (1) Application Number Title Priority Date Filing Date US15/349,410 Expired - Fee Related US10116451B2 (en)
2025-04-09Was last backed-up to the TSR; and sending a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key. In Example 18, the subject matter of Example 17 optionally includes wherein writing the backup of the file from the TSR to the SSR further comprises: logically combining the backup of the file and the file delta in the TSR; and writing the combination from the TSR to the SSR as the backup of the file. In Example 19, the subject matter of Example 18 optionally includes deleting the file in the SSR; generating a link in the SSR in place of the deleted file; and recovering the file from the TSR to the SSR based on an activation of the link. In Example 20, the subject matter of any one or more of Examples 18-19 optionally include wherein the trigger to recover the file comprises: the size of the associated file delta being within a threshold value of the size of the file in the SSR; the file comprising a text file and a spell check of the backup or the file delta including a number of misspelled words greater than a threshold value; or the file comprising a media file and a value representative of the randomness of data values of the backup or the file delta being greater than a specified threshold value. In Example 21, the subject matter of Example 20 optionally includes wherein: the associated file delta comprises multiple associated file deltas; the trigger to recover the file is detected based on the most recent of the multiple associated file deltas backed-up to the TSR; and recovering the file from the TSR to the SSR further comprises: deleting the most recent associated file delta; logically combining the backup of the file and the multiple associated file deltas in the TSR, except for the most recent file delta; and writing the combination to the SSR as the backup of the file. In Example 22, the subject matter of Example 21 optionally includes generating a log of the multiple associated file deltas; and sending a write instruction to the storage device to store the log to the TSR, the write instruction signed using the private key. Example 23 is at least one machine-readable storage medium comprising instructions, which when executed by a processor of a machine, cause the machine to: generate a public/private key pair; provide the public key to a storage device comprising a standard storage region (SSR) a trusted storage region (TSR), the TSR not being writable by an instruction that
2025-04-17Perform the backup, the write instruction signed using the private key;cause the storage device to verily the private key signature, of the write instruction, using the public key; andwrite a backup of the file to the TSR based on the private key signature being verified, wherein the TSR cannot be formatted by an operating system (OS) on the storage device, the memory further comprising instructions which, when executed by the processor, cause the processor to:detect a trigger to recover the file from the TSR;format the storage device using the OS;install a new operating system on the formatted storage device; andwrite the backup of the file from the TSR to the SSR. 2. The system of claim 1, wherein the TSR comprises a region of the storage device which is protected, from being written, by hardware or firmware of the storage device. 3. The system of claim 1, wherein the trigger to back up the file comprises a change to the file in the SSR or the passing of a specified time period since the file was last backed-up from the SSR to the TSR. 4. The system of claim 1, the memory further comprising instructions which, when executed by the processor, cause the processor to send the write instruction via a protected instruction channel based on the private key signature, the protected instruction channel providing confidentiality and integrity protection to the private key using hardware or firmware of the system. 5. The system of claim 1, the memory further comprising instructions which, when executed by the processor, cause the processor to:detect a second trigger to back up the file in the SSR to the TSR;determine any changes to the file since it was last backed-up to the TSR; andsend a write instruction to the storage device to back up data comprising the changes to the TSR as a file delta associated with the backup of the file, the write instruction signed using the private key. 6. The system of claim 5, wherein to write the backup of the file from the TSR to the SSR, the memory further comprises instructions which, when executed by the processor, cause the processor to:logically combine the backup of the file and the file delta in the TSR; andwrite the combination from the TSR to the SSR as the backup of the file. 7. The system of claim 6, the memory further comprising instructions which, when executed by the processor, cause the processor to:delete the file in the SSR;generate a link in the SSR in place of the deleted file; andrecover the file from the TSR to the SSR based on an activation of the link. 8. The system of claim 6, wherein the trigger
2025-04-12