Threat event-driven backup
First Claim
Patent Images
1. A method of preserving integrity of data stored on a computing device, comprising:
- obtaining at least one event that indicates an imminent threat to the integrity of the data stored on a hard drive of the computing device, the imminent threat comprising a malware threat;
in response to the at least one event, determining whether data on the hard drive has been corrupted by the malware threat;
upon determining that the data on the hard drive has been corrupted, identifying a snapshot of the data that is not infected by the malware threat; and
creating a backup of the data on the hard drive using the uninfected snapshot, the backup being created on a primary computer-readable storage medium other than the hard drive.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for backing up data in response to detection of an imminent threat to the integrity of the data stored on the storage component a computing device is disclosed. The storage component may be a hard drive and the imminent threat may be a hard drive failure or a malware threat. In response to the receipt of an imminent threat, data stored on the storage component is copied to a computer-readable media either automatically or in response to user input. The backup procedure is configured by selecting data to backup and a media of storage on which to store the backup. Various sources of threat events are described.
-
Citations
16 Claims
-
1. A method of preserving integrity of data stored on a computing device, comprising:
-
obtaining at least one event that indicates an imminent threat to the integrity of the data stored on a hard drive of the computing device, the imminent threat comprising a malware threat; in response to the at least one event, determining whether data on the hard drive has been corrupted by the malware threat; upon determining that the data on the hard drive has been corrupted, identifying a snapshot of the data that is not infected by the malware threat; and creating a backup of the data on the hard drive using the uninfected snapshot, the backup being created on a primary computer-readable storage medium other than the hard drive. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-readable storage medium having stored thereon computer-executable instructions which when executed by a processor of a computing device perform a method, comprising:
-
obtaining at least one event that indicates an imminent threat to the integrity of data stored on a hard drive of the computing device, the imminent threat comprising a malware threat; in response to the at least one event, determining whether data on the hard drive has been corrupted by the malware threat; upon determining that the data on the hard drive has been corrupted, identifying a snapshot of the data that is not infected by the malware threat; and creating a backup of the data on the hard drive using the uninfected snapshot, the backup being created on a primary computer-readable storage medium other than the hard drive. - View Dependent Claims (14, 15, 16)
-
Specification