Data loss and theft protection method
First Claim
Patent Images
1. A method for protecting data files having attributes stored on a storage device of a computer system comprising:
- a. creating and storing on the computer system at least one parameter used to identify data files to be protected;
b. creating a recovery directory;
c. restricting to at least one administrator the ability to delete, edit or overwrite files stored in said recovery directory;
d. when the computer system receives any instruction to delete a file stored on a storage device of the computer other than a filed stored in the recovery directory, comparing the attributes of the file which is the subject of the instruction to said at least one parameter to determine whether a match exists;
e. in the event of a match (i) automatically placing said file or a copy thereof in the recovery directory; and
(ii) automatically recording information related to the instruction to delete said file
1 Assignment
0 Petitions
Accused Products
Abstract
Files stored on a non-removable storage device of a computer system are susceptible to being deleted and to theft. The present invention ensures that vital data files are not lost and that removable storage devices are not used to steal data.
131 Citations
26 Claims
-
1. A method for protecting data files having attributes stored on a storage device of a computer system comprising:
-
a. creating and storing on the computer system at least one parameter used to identify data files to be protected; b. creating a recovery directory; c. restricting to at least one administrator the ability to delete, edit or overwrite files stored in said recovery directory; d. when the computer system receives any instruction to delete a file stored on a storage device of the computer other than a filed stored in the recovery directory, comparing the attributes of the file which is the subject of the instruction to said at least one parameter to determine whether a match exists; e. in the event of a match (i) automatically placing said file or a copy thereof in the recovery directory; and
(ii) automatically recording information related to the instruction to delete said file - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 26)
-
-
12. The method of claim 12 wherein said method is performed under software control and said software is stored in said removable storage device.
-
14. A method for protecting data files stored on storage devices of a computer system, said method comprising:
-
a. monitoring said computer to detect the presence of a removable storage device and preventing unauthorized copying of files to and from said removable storage device; b. creating on at least one of said storage devices of said computer system a recovery directory; c. creating and storing on at least one of said storage devices of said computer system in an encrypted file at least one parameter used to identify which files should be either copied or moved to said recovery directory in the event a command is given to the computer system to delete a file; d. upon receipt of a command to delete a file, automatically comparing the attributes of said file to said at least one parameter and, if there is a match moving or copying said file to said recovery directory. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method for protecting data files stored on a storage device of a computer system, said computer system having a first mode of operation, at least one device capable of being used to copy files from said storage device to a removable storage device, and at least one recovery directory on a storage device, said method comprising:
-
a. detecting whether a removable storage device is present; b. determining whether use of said removable storage device is unauthorized; c. modifying the operation of the computer system from said first mode of operation to prevent copying of data files to an unauthorized removable storage device when an unauthorized removable storage device is present; d. returning the operation of the computer system to said first mode of operation when the unauthorized removable storage device is no longer present or upon entry of a password of a user authorized to copy files to said removable storage device to authorize said removable storage device; and e. upon receipt of a command to delete files, copying or moving at least some of said files to said recovery directory.
-
Specification