Computer system and method having isolatable storage for enhanced immunity to viral and malicious code infection
First Claim
Patent Images
1. A computer that has enhanced resistance or immunity to viral, Trojan-horse, hacker, or other malicious code infection, the computer comprising:
- a processor;
a memory coupled to the processor;
a plurality of identified storage; and
a switch selectively enabling access with only one of the plurality of storage with said processor and said memory by opening or closing a predetermined electrical circuit of a device to be switched;
the selectively enabling access to the one storage disabling access among or between the processor, memory and another of the plurality of identified storage, wherein only a single storage is accessed at a time, preventing a virus, a hacking executable code, an infection, or other harmful or malicious element from executing or from contaminating another storage;
a data port and means for mediating access of the computer over an external communications link with an external system;
and the computer being operable in a connected state and in a disconnected state;
the disconnected state being a state in which (i) the computer is prevented from communicating over the data port, and (ii) the data-store switch may enable access with any plurality of storage including permitting access with the first storage and the second storage;
the connected state being a state in which (iii) the computer is permitted to communicate over the data port, and (iv) the data-store switch may not enable access with the first storage but may enable access with the second storage; and
the permitting or preventing access to particular storage depending on whether the computer is communicating or not communicating with an external system via the data port and operable for isolating data received only to the second storage so that if the data received has a virus, a hacking executable code, an infection, or other harmful or malicious element it is confined to the second storage.
2 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method of supporting the backup and recovery of a computing device. The computing device typically includes both a user computing environment and a supporting environment which enhances the stability and functionality of the user computing environment.
-
Citations
61 Claims
-
1. A computer that has enhanced resistance or immunity to viral, Trojan-horse, hacker, or other malicious code infection, the computer comprising:
-
a processor; a memory coupled to the processor; a plurality of identified storage; and a switch selectively enabling access with only one of the plurality of storage with said processor and said memory by opening or closing a predetermined electrical circuit of a device to be switched; the selectively enabling access to the one storage disabling access among or between the processor, memory and another of the plurality of identified storage, wherein only a single storage is accessed at a time, preventing a virus, a hacking executable code, an infection, or other harmful or malicious element from executing or from contaminating another storage; a data port and means for mediating access of the computer over an external communications link with an external system; and the computer being operable in a connected state and in a disconnected state; the disconnected state being a state in which (i) the computer is prevented from communicating over the data port, and (ii) the data-store switch may enable access with any plurality of storage including permitting access with the first storage and the second storage; the connected state being a state in which (iii) the computer is permitted to communicate over the data port, and (iv) the data-store switch may not enable access with the first storage but may enable access with the second storage; and the permitting or preventing access to particular storage depending on whether the computer is communicating or not communicating with an external system via the data port and operable for isolating data received only to the second storage so that if the data received has a virus, a hacking executable code, an infection, or other harmful or malicious element it is confined to the second storage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method for enhancing resistance or immunity to viral, Trojan-horse, hacker, or other malicious code infection in a device of the type having a processor, a memory coupled to the processor, and a least one physical storage, the method comprising:
-
identifying a plurality of storage from said at least one physical storage including a logical or physical first storage and a second logical or physical storage; and selectively enabling access with only one of the plurality of identified storage with said processor and said memory by opening or closing a predetermined electrical circuit of a device to be switched; the selectively enabling access to the one storage disabling access among or between the processor, memory and another of the plurality of identified storage, wherein only a single storage is accessed at a time, preventing a virus, a hacking executable code, an infection, or other harmful or malicious element from executing or from contaminating another storage; the computer further being of the type having a data port and means for mediating access of the computer over an external communications link with an external system; and
the method further comprising;operating the computer in a connected state and in a disconnected state; the disconnected state being a state in which (i) the computer is prevented from communicating over the data port, and (ii) the data-store switch may enable access with any plurality of storage including permitting access with the first storage and the second storage; the connected state being a state in which (iii) the computer is permitted to communicate over the data port, and (iv) the data-store switch may not enable access with the first storage but may enable access with the second storage; and the permitting or preventing access to particular storage depending on whether the computer is communicating or not communicating with an external system via the data port and operable for isolating data received only to the second storage so that if the data received has a virus, a hacking executable code, an infection, or other harmful or malicious element it is confined to the second storage. - View Dependent Claims (31, 32, 33, 34, 35)
-
-
36. A computer that self-repairs to maintain an operational status at any time during operation, the computer comprising:
-
a main computer hardware box;
at least one CPU disposed within the main computer hardware box;at least one random access memory disposed within the main computer hardware box and coupled to the at least one CPU; the at least one CPU and random access memory providing at least one user computing environment and a supporting computing environment substantially isolated from the user computing environment and operative to enhance the stability and functionality of the user computing environment by monitoring processes running or enabled within the user computing environment; first and second controllers for respective first and second data storage devices disposed within the main computer hardware box of the computer prior to a need for repair, the first data storage device storing programs and data for the user computing environment and the second data storage device being associated with the supporting computing environment and containing at least one backup snap-shot; and means for controlling the self-repair of the computer cooperatively coupled with said at least one CPU, said at least one random access memory, and said first and second controllers. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55)
-
-
56. A computer that has enhanced resistance or immunity to viral, Trojan-horse, hacker, or other malicious code infection, the computer comprising:
-
a processor; a memory coupled to the processor; a plurality of identified storage; a switch selectively enabling or disabling access with any selected one or combination of the plurality of storage with said processor, said memory, or other ones of said plurality of storage;
the selectively enabling or disabling access among or between the processor, memory and other of the plurality of identified storage preventing a virus, a hacking executable code, an infection, or other harmful or malicious element from executing or from contaminating another storage;a data port and means for mediating access of the computer over an external communications link with an external system; the computer being switchable to operable in a connected state and in a disconnected state; the disconnected state being a state in which (i) the computer is prevented from communicating over the data port, and (ii) the data-store switch may enable access with any plurality of storage including permitting access with the first storage and the second storage; the connected state being a state in which (iii) the computer is permitted to communicate over the data port, and (iv) the data-store switch may not enable access with the first storage but may enable access with the second storage; the permitting or preventing access to particular storage depending on whether the computer is communicating or not communicating an external system via the data port isolating data received only to storage so that if the data received has a virus, a hacking executable code, an infection, or other harmful or malicious element it is confined to the second storage; and the switching between the disconnected mode and the connected mode is initiated by an event, and the event includes a initiation of an internet browser program on the computer, the external system comprises an external network, and the communications link comprises a communications with the Internet network. - View Dependent Claims (57)
-
-
58. A computer that has enhanced resistance or immunity to viral, Trojan-horse, hacker, or other malicious code infection, the computer comprising:
-
a processor; a memory coupled to the processor; a plurality of identified storage; a switch selectively enabling or disabling access with any selected one or combination of the plurality of storage with said processor, said memory, or other ones of said plurality of storage;
the selectively enabling or disabling access among or between the processor, memory and other of the plurality of identified storage preventing a virus, a hacking executable code, an infection, or other harmful or malicious element from executing or from contaminating another storage;a data port and means for mediating access of the computer over an external communications link with an external system; the computer being operable in a connected state and in a disconnected state; the disconnected state being a state in which (i) the computer is prevented from communicating over the data port, and (ii) the data-store switch may enable access with any plurality of storage including permitting access with the first storage and the second storage; the connected state being a state in which (iii) the computer is permitted to communicate over the data port, and (iv) the data-store switch may not enable access with the first storage but may enable access with the second storage; and the permitting or preventing access to particular storage depending on whether the computer is communicating or not communicating an external system via the data port isolating data received only to storage so that if the data received has a virus, a hacking executable code, an infection, or other harmful or malicious element it is confined to the second storage; and wherein a browser on the second storage may launch automatically on the boot from the second storage.
-
-
59. A computer that has enhanced resistance or immunity to viral, Trojan-horse, hacker, or other malicious code infection, the computer comprising:
-
a processor; a memory coupled to the processor; a plurality of identified storage; and a switch selectively enabling or disabling access with any selected one or combination of the plurality of storage with said processor, said memory, or other ones of said plurality of storage;
the selectively enabling or disabling access among or between the processor, memory and other of the plurality of identified storage preventing a virus, a hacking executable code, an infection, or other harmful or malicious element from executing or from contaminating another storage;a data port and means for mediating access of the computer over an external communications link with an external system; and the computer being operable in a connected state and in a disconnected state; the disconnected state being a state in which (i)the computer is prevented from communicating over the data port, and (ii) the data-store switch may enable access with any plurality of storage including permitting access with the first storage and the second storage; the connected state being a state in which (iii) the computer is permitted to communicate over the data port, and (iv) the data-store switch may not enable access with the first storage but may enable access with the second storage; the permitting or preventing access to particular storage depending on whether the computer is communicating or not communicating an external system via the data port isolating data received only to storage so that if the data received has a virus, a hacking executable code, an infection, or other harmful or malicious element it is confined to the second storage; and the second storage does not contain application software to process the data received over the communications link and there is a need to migrate the data on the second storage to the first storage For processing or migrate the application program on first storage to the second storage for processing the data on first storage.
-
-
60. A computer that has enhanced resistance or immunity to viral, Trojan-horse, hacker, or other malicious code infection, the computer comprising:
-
a processor; a memory coupled to the processor; a plurality of identified storage; and a switch selectively enabling or disabling access with any selected one or combination of the plurality oF storage with said processor, said memory, or other ones of said plurality of storage;
the selectively enabling or disabling access among or between the processor, memory and other of the plurality of identified storage preventing a virus, a hacking executable code, an infection, or other harmful or malicious element from executing or from contaminating another storage;a data pod and means for mediating access of the computer over an external communications link with an external system; and the computer being operable in a connected state and in a disconnected state; the disconnected state being a state in which (i) the computer is prevented from communicating over the data port, and (ii) the data-store switch may enable access with any plurality of storage including permitting access with the first storage and the second storage; the connected state being a state in which (iii) the computer is permitted to communicate over the data port, and (iv) the data-store switch may not enable access with the first storage but may enable access with the second storage; the permitting or preventing access to particular storage depending on whether the computer is communicating or not communicating an external system via the data port isolating data received only to storage so that if the data received has a virus, a hacking executable code, an infection, or other harmful or malicious element it is confined to the second storage; and the computer simultaneously enables the first and second storage and copies the data received over the communications link to first storage for processing on the first storage.
-
-
61. A computer that has enhanced resistance or immunity to viral, Trojan-horse, hacker, or other malicious code infection, the computer comprising:
-
a processor; a memory coupled to the processor; a plurality of identified storage; and a switch selectively enabling or disabling access with any selected one or combination of the plurality of storage with said processor, said memory, or other ones of said plurality of storage;
the selectively enabling or disabling access among or between the processor, memory and other of the plurality of identified storage preventing a virus, a hacking executable code, an infection, or other harmful or malicious element from executing or from contaminating another storage;a data port and means for mediating access or the computer over an external communications link with an external system; and the computer being operable in a connected state and in a disconnected state; the disconnected state being a state in which (i) the computer is prevented from communicating over the data port, and (ii) the data-store switch may enable access with any plurality of storage including permitting access with the first storage and the second storage; the connected state being a state in which (iii) the computer is permitted to communicate over the data port, and (iv) the data-store switch may not enable access with the first storage but may enable access with the second storage; the permitting or preventing access to particular storage depending on whether the computer is communicating or not communicating an external system via the data port isolating data received only to storage so that if the data received has a virus, a hacking executable code, an infection, or other harmful or malicious element it is confined to the second storage; and the computer simultaneously enables the first and second storage and copies the applications program to the second storage for processing of the data on the second storage.
-
Specification