PROTECTION AGAINST UNINTENTIONAL FILE CHANGING
First Claim
Patent Images
1. A method of protecting files in an operating system, comprising:
- determining, in a computer, a group of files making up an operating system crucial set of files;
detecting, using the computer, an attempt to change any of said operating system crucial set of files;
responsive to said detecting an attempt, signaling a user via an output directed to a user interface of the computer that a change to said any of said operating system crucial set of files has been attempted, and checking for a specified response on the user interface of the computer;
first allowing said any of said operating system crucial set of files to be changed only if said specified response is received on said user interface and not allowing said any of said operating system crucial set of files to be changed only if said specified response is not received on said user interface; and
allowing other files, other than said operating system crucial set of files, to be changed on the computer without said specified response being received on said user interface.
0 Assignments
0 Petitions
Accused Products
Abstract
Files are protected against intrusion. A first embodiment protects certain files against changes. A second embodiment encrypts the files that are stored using user'"'"'s personal information.
15 Citations
18 Claims
-
1. A method of protecting files in an operating system, comprising:
-
determining, in a computer, a group of files making up an operating system crucial set of files; detecting, using the computer, an attempt to change any of said operating system crucial set of files; responsive to said detecting an attempt, signaling a user via an output directed to a user interface of the computer that a change to said any of said operating system crucial set of files has been attempted, and checking for a specified response on the user interface of the computer; first allowing said any of said operating system crucial set of files to be changed only if said specified response is received on said user interface and not allowing said any of said operating system crucial set of files to be changed only if said specified response is not received on said user interface; and allowing other files, other than said operating system crucial set of files, to be changed on the computer without said specified response being received on said user interface. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product, comprising a computer usable non transitory tangible medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method of protecting files in an operating system, comprising:
-
determining, in a computer, a group of files making up an operating system crucial set of files; detecting, using the computer, an attempt to change any of said operating system crucial set of files; responsive to said detecting an attempt, signaling a user via an output directed to a user interface of the computer that a change to said any of said operating system crucial set of files has been attempted, and checking for a specified response on the user interface of the computer; first allowing said any of said operating system crucial set of files to be changed only if said specified response is received on said user interface and not allowing said any of said operating system crucial set of files to be changed only if said specified response is not received on said user interface; and allowing other files, other than said operating system crucial set of files, to be changed on the computer without said specified response being received on said user interface. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A method, comprising:
-
determining information about a user as part of a computer session on a computer; encrypting each of a plurality of read/write files on the computer; based on said information about the user, using the computer for determining if the user is authorized for access to said files, based on said information about the user; based on said determining indicating that the user has access to said files, reading a first file from among said plurality of files from the computer responsive to a request for reading said first file, said reading comprising using a specified decryption routine to decrypt at least a portion of said first file for access by a user; saving any changes to the first file while storing the first file in encrypted form in a way such that the file cannot be viewed without using said decryption routine; detecting an external drive being attached to the computer; and responsive to a user request, automatically saving a file to the external drive in a non-encrypted form, in a way such that the file can be viewed without using said decryption routine. - View Dependent Claims (15, 16, 17, 18)
-
Specification