Operating system and data protection
First Claim
1. A method of accessing and recovering data in locations of a memory in a computer system, the method comprising:
- receiving a write access command directed to a first location;
determining whether said first location is identified as protected;
if said first location is identified as protected, determining a second location that is not identified as protected;
re-directing the write access command to said second location;
receiving a subsequent write access command directed to said first location;
re-directing said subsequent write access command to a third location that is not identified as protected;
recovering a portion of the memory, where said recovery comprises removing the re-direction to said third location;
receiving a second subsequent write access command directed to said first location;
re-directing said second subsequent write access command to a further location that is not identified as protected;
receiving at least one read access command directed to said first location; and
re-directing said at least one read access command to said further location that is not identified as protected.
6 Assignments
0 Petitions
Accused Products
Abstract
The disclosed systems and methods provide for the protection of protected memory, for example, a hard disk, in a computer system. The systems and methods are configured to re-direct read and write access commands from locations in the protected memory to alternative storage locations. The systems and methods provide the ability for the user to accept or reject any BIOS changes that are to be made to the computing system. In addition, the systems and methods protect against operating system crash due to missing or corrupted files. The systems and methods are additionally operable to recover mistakenly deleted or damaged application data from a hard disk level, as well as to protect the operating system and data of the computing system against virus penetration. In other embodiments, the systems and methods are operable to provide for a security lock to the computing system and its associated data.
91 Citations
26 Claims
-
1. A method of accessing and recovering data in locations of a memory in a computer system, the method comprising:
-
receiving a write access command directed to a first location;
determining whether said first location is identified as protected;
if said first location is identified as protected, determining a second location that is not identified as protected;
re-directing the write access command to said second location;
receiving a subsequent write access command directed to said first location;
re-directing said subsequent write access command to a third location that is not identified as protected;
recovering a portion of the memory, where said recovery comprises removing the re-direction to said third location;
receiving a second subsequent write access command directed to said first location;
re-directing said second subsequent write access command to a further location that is not identified as protected;
receiving at least one read access command directed to said first location; and
re-directing said at least one read access command to said further location that is not identified as protected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system for accessing data in locations of a memory in a computer system, the computer system comprising:
-
a driver configured to;
receive a write access command directed to a first location;
determine whether said first location is identified as protected;
if said first location is identified as protected, determine a second location that is not identified as protected;
re-direct the write access command to said second location;
receive a subsequent write access command directed to said first location;
re-direct said subsequent write access command to a third location that is not identified as protected;
recovering a portion of the memory, wherein said recovering comprises removing the re-directing to said third location;
receiving a second subsequent write access command directed to said first location; and
re-directing said second subsequent write access command to a location that is not identified as protected. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method of accessing and recovering data in locations of a memory in a computer system, the method comprising:
-
receiving a write access command directed to a first location;
determining whether said first location is identified as protected;
if said first location is identified as protected, determining a new location that is not identified as protected;
re-directing the write access command to said new location;
receiving a read access command directed to said first location;
re-directing the read access command to said new location;
receiving a subsequent write access command directed to said first location;
re-directing said subsequent write access command to a second new location that is not identified as protected;
recovering a predetermined portion of the memory, wherein said recovering comprises removing the re-direction to said second new location so that subsequent read access commands are directed to said first location;
receiving a further subsequent write access command directed to said first location; and
re-directing said further subsequent write access command to a further location that is not identified as protected. - View Dependent Claims (15, 16, 17, 18)
receiving a second read access command directed to said first location; and
re-directing said second read access command to said further location.
-
-
16. The method of claim 14, wherein determining a new location that is not identified as protected further comprises determining a new location that is identified as available.
-
17. The method of claim 14, wherein said memory is a disk drive.
-
18. The method of claim 17, wherein said locations are sectors.
-
19. A method of accessing and recovering data in locations of a memory in a computer system, the method comprising:
-
receiving a write access command directed to a first location;
determining whether said first location is identified as protected;
if said first location is identified as protected, determining a second location that is not identified as protected;
re-directing the write access command to said second location;
receiving a first subsequent write access command directed to said first location;
re-directing said first subsequent write access command to a third location that is not identified as protected;
recovering a portion of the memory, where n said recovering comprises removing the re-direction to said third location;
receiving a second subsequent write access command directed to said first location; and
re-directing said second subsequent write access command to said second location. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
recovering a second portion of the memory, wherein said recovering comprises removing the re-direction to said second location;
receiving a third subsequent write access command directed to said first location; and
directing said third subsequent write access command to said first location.
-
-
21. The method of claim 19, determining a second location that is not identified as protected further comprises determining a second location that is identified available.
-
22. The method of claim 19, wherein said third location is identified as available.
-
23. The method of claim 19, wherein said memory is a disk drive and said locations are sectors.
-
24. The method of claim 19, wherein determining a second location that is pot identified as protected further comprises determining a second location that is identified as available.
-
25. The method of claim 19, wherein said memory is a disk drive.
-
26. The method of claim 25, wherein said locations are sectors.
Specification