System and method for data recovery and protection
First Claim
1. In a data processor, a system for making an authentic backup file from an authorized protected data file, with the data in said authentic backup file translated from said authorized protected data file to camouflage the source or identity of said authentic backup file or its relationship with said authorized protected data file and with indicia produced by said translation representing said translation, stored in a recovery address group for comparison with a test identifier produced from the current protected data file to determine if the current protected data file is the same or different from the authorized protected data file and for access and use of said recovery address group for translation of said authentic backup file to said authorized data file and restoration of said authorized protected file, comprising, a) means for translation of an authorized protected data file to an authentic backup file, camouflaged to hide its relationship to said authorized protected data file, and for storing said authentic backup file;
- b) means for producing an identifier from aid authorized protected data file and for storing said identifier;
c) means for producing a test identifier from a current protected data file for comparison with said identifier for determining if said current protected file is the same or is different from said authorized protected data file; and
d) means responsive to said comparison for translating said authentic backup file to said authorized protected data file for restoring said authorized protected file.
1 Assignment
0 Petitions
Accused Products
Abstract
A protected data file currently in use is duplicated as an authentic backup file, while changing the current file'"'"'s data appearance and separating the location of the authentic backup file from the original and current file, to camouflage its identity from an unauthorized intruder intending to modify or destroy the original file. A series of indica is generated and stored in a recovery address group or file. The indica represent the original current file and is used to reconstruct the authentic backup file and to write a restored file into the current protected data file. The recovery process may be initiated on a schedule or whenever the original current file is accessed or whenever an unauthorized use of the current file is detected and a comparison of the authentic backup file indicates the original current file has been modified. In this way, the authentic data saved from the original current file may be used to restore the protected data file as originally written and saved in the authentic backup.
-
Citations
31 Claims
-
1. In a data processor, a system for making an authentic backup file from an authorized protected data file, with the data in said authentic backup file translated from said authorized protected data file to camouflage the source or identity of said authentic backup file or its relationship with said authorized protected data file and with indicia produced by said translation representing said translation, stored in a recovery address group for comparison with a test identifier produced from the current protected data file to determine if the current protected data file is the same or different from the authorized protected data file and for access and use of said recovery address group for translation of said authentic backup file to said authorized data file and restoration of said authorized protected file, comprising,
a) means for translation of an authorized protected data file to an authentic backup file, camouflaged to hide its relationship to said authorized protected data file, and for storing said authentic backup file; -
b) means for producing an identifier from aid authorized protected data file and for storing said identifier;
c) means for producing a test identifier from a current protected data file for comparison with said identifier for determining if said current protected file is the same or is different from said authorized protected data file; and
d) means responsive to said comparison for translating said authentic backup file to said authorized protected data file for restoring said authorized protected file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for restoring an authorized protected data file from an authentic backup file, comprising,
a) means for making an authentic backup file from an authorized protected data file; -
b) means for monitoring a current protected data file for a change in said current protected file and for making a new authentic backup file in response to an authorized change to said current protected data file;
c) said means for monitoring including means for restoring said authorized protected data file with said authentic backup file in response to an unauthorized change to said current protected data file. - View Dependent Claims (12, 13, 14, 15, 16, 17, 19, 20, 21, 22, 23, 24, 27, 28, 29, 30, 31)
-
-
18. A computer program recorded on a medium for use in a data processing system, comprising,
a) means for translating an authorized protected data file into an authentic backup file; -
b) means for producing an identifier for said authorized protected data file;
c) means for producing a test identifier for a current protected data file;
d) means for comparing said test identifier with said identifier;
e) means responsive to a said comparison for translating said authentic backup file into said authorized protected data file and for restoring said current protected data file with said authorized protected data file.
-
-
25. A data processing system, comprising,
a data processor; -
an active memory;
a static memory;
an operating system for transferring data to or from said active memory, said data processor or said static memory, for data processing or storage;
a program stored in said active or static memory;
said data processor responsive to said program for translating an authorized protected data file into a camouflaged authentic backup file;
said data processor responsive to said program for comparing said authorized protected data file with a current protected data file and producing an indication of a change in said current protected data file relative to said authorized protected data file; and
said data processor responsive to said indication of a change for reconstructing said authorized protected data file from said camouflaged authentic backup file and restoring said authorized protected data file.
-
-
26. A method for restoring an authorized protected data file from an authentic backup file, comprising the steps of,
a) the step of making an authentic backup file from an authorized protected data file; -
b) the step of monitoring the current protected data file for a change in said current protected file and making a new authentic backup file in response to an authorized change to said current protected data file or producing an indication of an unauthorized change made in said current protected data file; and
c) the step of restoring said authorized protected data file with said authentic backup file in response to said indication of an unauthorized change made in said current protected data file.
-
Specification