System and method for backing up data
First Claim
Patent Images
1. A method for detecting file tampering on a computer, comprising:
- generating a digital fingerprint for each file on the computer using a substantially collision-free algorithm; and
comparing the digital fingerprints of the computer files with digital fingerprints of the computer files generated when the files were previously saved;
wherein tampering exists on a file if the digital fingerprint of that file differs from the digital fingerprint generated when that file was previously saved.
0 Assignments
0 Petitions
Accused Products
Abstract
A method is provided to facilitate the detection of file tampering, such as a computer virus, on a computer. In one example, a digital fingerprint is generated for each file on the computer using a substantially collision-free algorithm. The digital fingerprints of the computer files are compared with digital fingerprints of the computer files generated when the files were previously saved. If the digital fingerprint of that file differs from the digital fingerprint generated when that file was previously saved, a computer virus or other tampering may exist on the file.
27 Citations
5 Claims
-
1. A method for detecting file tampering on a computer, comprising:
-
generating a digital fingerprint for each file on the computer using a substantially collision-free algorithm; and
comparing the digital fingerprints of the computer files with digital fingerprints of the computer files generated when the files were previously saved;
wherein tampering exists on a file if the digital fingerprint of that file differs from the digital fingerprint generated when that file was previously saved. - View Dependent Claims (2, 3)
-
-
4. A method for detecting a computer virus on a computer, comprising:
-
generating a digital fingerprint of the computer virus using a substantially collision-free algorithm;
generating a digital fingerprint for each file on the computer using the substantially collision-free algorithm; and
comparing the digital fingerprints of the computer files with the digital fingerprint of the computer virus;
wherein the computer virus exists on the computer if any digital fingerprint of the computer files matches the digital fingerprint of the computer virus. - View Dependent Claims (5)
-
Specification