Information protection system
First Claim
1. In a computer system, a method for protecting a target file located at a target location, comprising the steps of:
- generating an archive having an archive file;
automatically synchronizing the target file to match the archive file;
periodically comparing the target file to the archive file; and
updating the target file according to the comparison such that the target file is identical to the archive file.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and system for facilitating the protection of files at one or more target locations. An archive containing one or more file collections is generated that stores the original set of files for the target locations. Each archived file collection may have one or more target locations that correspond to the archived file collection. The target locations are automatically synchronized to the archived file collection whenever the file collection is updated. In addition, at specified times or by demand, the files of a specified file collection are compared to the files at the target locations that correspond to the file collection. If a file addition, alteration, or deletion is detected, then an automatic correction of the file takes place so that the target location is seamlessly corrected. In this manner, a set of files, such as the files that contain the contents of a web site, can be maintained and kept up to date in a real time manner, without bringing down the web site to detect and correct unauthorized changes to the web site.
74 Citations
32 Claims
-
1. In a computer system, a method for protecting a target file located at a target location, comprising the steps of:
-
generating an archive having an archive file;
automatically synchronizing the target file to match the archive file;
periodically comparing the target file to the archive file; and
updating the target file according to the comparison such that the target file is identical to the archive file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer system for protecting one or more target files located at a target location, comprising:
-
a processor;
a memory coupled to the processor;
an archive collection of at least one file, wherein the archive collection is stored in the memory; and
program code executed by the processor, the program code configured to cause the processor to perform the following steps;
automatically synchronizing each of the target locations to the archive collection, wherein each of the files of the target locations corresponds to a file of the archive collection;
comparing each of the files of the target locations to the corresponding file of the archive collection; and
updating the files of the target locations according to the step of comparing such that the files of the target locations are rendered identical to the files of the archive collection. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer readable program for protecting one or more files located at one or more target locations, wherein each of the files has a first set of associated file statistics, the computer readable program configured to cause a computer to perform the following method:
-
generating an archive collection of at least one file having a second set of associated file statistics;
automatically synchronizing each of the target locations to the archive collection, wherein each of the files of the target locations corresponds to a file of the archive collection;
periodically comparing each of the files of the target locations to the corresponding file of the archive collection; and
updating the files of the target locations as necessary, such that the files of the target locations are identical to the files of the archive collection. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
Specification