Method of transferring data
First Claim
Patent Images
1. A method of selectively transferring to a second device back-up data relating to modifications made to a file of a first device including the steps of:
- a) identifying the files that have been modified;
b) identifying altered blocks of the modified files;
c) checking the altered blocks of each modified file for the presence of a computer virus signature by means of an anti-virus program; and
d) transferring the back-up data relating to modified files to the second device if, and only if, no computer virus signature was detected in the altered blocks of the modified files.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of and apparatus for selectively transferring (114) to a second device (4) backup data relating to modifications made to a file (14) of a first device (2) includes the steps of identifying the altered blocks of files that have been modified (104), checking the altered blocks of each modified file for the presence of a computer virus signature (110) and transferring all the back-up data relating to the altered blocks of the modified file to the second device if, and only if, no computer virus signature was detected in altered blocks of the modified file.
39 Citations
15 Claims
-
1. A method of selectively transferring to a second device back-up data relating to modifications made to a file of a first device including the steps of:
-
a) identifying the files that have been modified;
b) identifying altered blocks of the modified files;
c) checking the altered blocks of each modified file for the presence of a computer virus signature by means of an anti-virus program; and
d) transferring the back-up data relating to modified files to the second device if, and only if, no computer virus signature was detected in the altered blocks of the modified files. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer programmed to selectively transfer to a second device back-up data relating to modifications made to a file of a first device, the computer being programmed to:
-
a) identify files that have been modified;
b) identify the altered blocks of the modified files;
c) check the modified blocks of each modified file for the presence of a computer virus signature by means of an anti-virus program;
d) transfer the back-up data relating to modified files to the second device if, and only if, no computer virus signature was detected in the altered blocks of the modified files. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer programmed to selectively transfer to a second device back-up data relating to modifications made to a file of a first device, the computer including:
-
a) identification means for identifying altered blocks of those of said files that have been modified;
b) checking means for checking said altered blocks for the presence of a computer virus signature by means of an anti-virus program; and
c) transfer means for transferring said back-up data relating to said modified files to said second device if, and only if, no computer virus signature was detected in said altered blocks of said modified files. - View Dependent Claims (12, 13, 14, 15)
-
Specification