System and method of protecting files from unauthorized modification or deletion
First Claim
Patent Images
1. A method comprising:
- receiving a write request for a file;
creating a temporary file associated with the file in response to the write request, the temporary file having a setting to restrict write access to only a component that created or opens the temporary file; and
closing the temporary file to enable a component that initiated the write request to access the temporary file.
2 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment of the invention, a method comprises receiving a write request for a file. A temporary file associated with the file is created in response to the write request. A write-lock is applied to the temporary file, namely the file includes a setting that restricts write access to only a component that created or opens the temporary file. Thereafter, the temporary file is closed to disable the write-lock and to enable a component that initiated the write request to access the temporary file.
-
Citations
17 Claims
-
1. A method comprising:
-
receiving a write request for a file; creating a temporary file associated with the file in response to the write request, the temporary file having a setting to restrict write access to only a component that created or opens the temporary file; and closing the temporary file to enable a component that initiated the write request to access the temporary file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. Software stored in machine-readable medium of a computing device and, when executed, protect both static and dynamic files stored within the computing device from unauthorized modification or deletion, the software comprising:
-
a communication component adapted to control communications with and receive a Write command associated with a file from a program; and a security agent operating as an intermediary between the program and an operating system of the computing device, the security agent to receive the Write command and to create a first temporary file associated with the file, the first temporary file is created with file-sharing settings that restrict write access of the first temporary file by only the security agent. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computing device, comprising:
-
a processor; a hard disk drive to store an operating system; and a security agent stored within the hard disk drive, the security agent operating as an intermediary between a component of the computing device and the operating system, the security agent to create and use temporary files associated with a file to be modified in order to protect the file from unauthorized modification or deletion. - View Dependent Claims (16, 17)
-
Specification