Apparatus and method for protecting a computer system against computer viruses and unauthorized access
First Claim
1. An apparatus for protecting a first computer system from an intrusion such as a computer virus or an unauthorized access, said apparatus comprising:
- a second computer system coupled to said first computer system, said second computer system capable of detecting said intrusion before said intrusion reaches said first computer system.
1 Assignment
0 Petitions
Accused Products
Abstract
There is disclosed an apparatus and method for protecting a first computer system against an intrusion such as a computer virus or an unauthorized access. The apparatus comprises a second computer system that is coupled to the first computer system in a manner that permits the second computer system to receive all computer communications that are directed to the first computer system. The second computer system detects an intrusion before the intrusion reaches the first computer system. The second computer system deletes the intrusion by deleting the operating system and all other data on the second computer system. After the compromised operating system and data have been erased, a clean version of the operating system and data is supplied to the second computer system from a restoration controller within the second computer system, or from the first computer system, or from a backup copy of the clean version of the data.
-
Citations
47 Claims
-
1. An apparatus for protecting a first computer system from an intrusion such as a computer virus or an unauthorized access, said apparatus comprising:
a second computer system coupled to said first computer system, said second computer system capable of detecting said intrusion before said intrusion reaches said first computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 28, 29, 30)
-
13. A virus trap computer system for protecting a host computer system from an intrusion such as a computer virus or an unauthorized access, said virus trap computer system comprising:
an embedded personal computer coupled to said host computer system, said embedded personal computer capable of receiving all external computer communications that are directed to said host computer system, and capable of detecting said intrusion before said intrusion reaches said host computer system.
-
27. A virus trap computer system for protecting a host computer system from an intrusion such as a computer virus or an unauthorized access, said virus trap computer system comprising:
-
an embedded personal computer coupled to said host computer system, said embedded personal computer capable of receiving all external computer communications that are directed to said host computer system, and capable of detecting an intrusion before said intrusion reaches said host computer system;
a mass storage device coupled to said embedded personal computer;
a restoration controller coupled to said embedded personal computer and coupled to said mass storage device, said restoration controller capable of deleting said intrusion by erasing data within said embedded personal computer and within said mass storage device, said restoration controller capable of supplying a clean version of said erased data to said embedded personal computer and to said mass storage device; and
a mass storage integrity controller coupled to said embedded personal computer and to said mass storage device, said mass storage integrity controller capable of detecting an intrusion on said mass storage device.
-
-
31. A method for protecting a first computer system from an intrusion such as a computer virus or an unauthorized access, said method comprising the steps of:
-
coupling a second computer system to said first computer system, and detecting said intrusion in said second computer system before said intrusion reaches said first computer system. - View Dependent Claims (32, 33, 34, 35, 36, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
37. A method for protecting a host computer system from an intrusion such as a computer virus or an unauthorized access, said method comprising the steps of:
-
coupling a virus trap computer system to said host computer system, said virus trap computer system comprising an embedded personal computer coupled to said host computer;
receiving in said embedded personal computer all external computer communications that are directed to said host computer system; and
detecting said intrusion in said embedded personal computer before said intrusion reaches said host computer system.
-
Specification