Stored memory recovery system
First Claim
1. A method comprising:
- creating a first recovery point corresponding to a first state of a computer system, wherein the first recovery point is usable to store data associated with the first state to restore the computer system to the first state;
subsequently creating a second recovery point corresponding to a second state of the computer system, wherein the second recovery point is usable to store data associated with the second state to restore the computer system to the second state;
subsequently creating a third recovery point corresponding to a third state of the computer system, wherein the third recovery point is usable to store data associated with the third state to restore the computer system to the third state;
applying security features to control access to the first, second, and third recovery points created for the computer system; and
deleting either the first or second recovery points while maintaining the remaining ones of the first, second, and third recovery points.
5 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments of systems and methods for preserving saved memory states to which a computer system can be restored are disclosed. In certain embodiments, the systems and methods intercept write operations to protected memory locations and redirect them to alternate memory locations. Embodiments of the systems and methods include creation of a table for each memory state. Certain embodiments additionally include a recovery capability, by which the protected memory in the computer system is capable of being restored or recovered to a recovery point that represents a saved memory state. Further embodiments relate to systems and methods for preventing protected memory locations from being overwritten that utilize a plurality of memory state values.
152 Citations
18 Claims
-
1. A method comprising:
-
creating a first recovery point corresponding to a first state of a computer system, wherein the first recovery point is usable to store data associated with the first state to restore the computer system to the first state; subsequently creating a second recovery point corresponding to a second state of the computer system, wherein the second recovery point is usable to store data associated with the second state to restore the computer system to the second state; subsequently creating a third recovery point corresponding to a third state of the computer system, wherein the third recovery point is usable to store data associated with the third state to restore the computer system to the third state; applying security features to control access to the first, second, and third recovery points created for the computer system; and deleting either the first or second recovery points while maintaining the remaining ones of the first, second, and third recovery points. - View Dependent Claims (2, 3, 4)
-
-
5. A method comprising:
-
creating a first recovery point corresponding to a first state of a computer system, wherein the first recovery point is usable to restore the computer system to the first state; subsequently creating a second recovery point corresponding to a second state of the computer system, wherein the second recovery point is usable to restore the computer system to the second state; subsequently creating a third recovery point corresponding to a third state of the computer system, wherein the third recovery point is usable to restore the computer system to the third state; deleting either the first or second recovery points while maintaining the remaining ones of the first, second, or third recovery points; and associating security information with each of the first, second and third recovery points, wherein the security information for each recovery point is operable to control access to that recovery point, wherein the security information for each recovery point is operable to; enable a first user to initiate restoration of the computer system to the state associated with the recovery point; and prevent a second user from initiating restoration of the computer system to the state associated with the recovery point. - View Dependent Claims (6, 7)
-
-
8. A method comprising:
-
creating a first recovery point corresponding to a first state of a computer system, wherein the first recovery point is usable to restore the computer system to the first state; subsequently creating a second recovery point corresponding to a second state of the computer system, wherein the second recovery point is usable to restore the computer system to the second state; subsequently creating a third recovery point corresponding to a third state of the computer system, wherein the third recovery point is usable to restore the computer system to the third state; and associating security information with each of the first, second and third recovery points, wherein the security information for each recovery point is operable to control access to that recovery point, wherein; security information for the first recovery point enables a first user to initiate restoration of the computer system to the state associated with the first recovery point and further enables the first user to initiate deletion of the first recovery point, while preventing a second user and a third user from accessing the first recovery point; security information for the second recovery point enables the second user to initiate restoration of the computer system to the state associated with the second recovery point and further enables the second user to initiate deletion of the second recovery point, while preventing the first user and the third user from accessing second recovery point; and security information for the third recovery point enables the third user to initiate restoration of the computer system to the state associated with the third recovery point and further enables the third user to initiate deletion of the third recovery point, while preventing the first user and the third user from accessing the recovery point; and deleting either the first or second recovery points while maintaining the remaining ones of the first, second, and third recovery points. - View Dependent Claims (9)
-
-
10. A computer readable medium storing instructions that, responsive to being executed by a computer system, cause the computer system to:
-
provide a plurality of recovery options to a user of the computer system, including a first recovery point that is usable to store data that is associated with a first state to restore the computer system to the first state in which a first operating system is operable to control the computer system, and further including a second recovery point that is usable to store data that is associated with a second state to restore the computer system to the second state in which a second operating system is operable to control the computer system; applying security features to control access to the plurality of recovery options including the first and second recovery points; receive input indicative of one of the plurality of recovery options; and restore the computer system to the state indicated by the received input. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer readable medium storing instructions that, responsive to being executed by a computer system, cause the computer system to:
-
provide a plurality of recovery options to a user of the computer system, including a first recovery point usable to restore the computer system to a first state in which a first operating system is operable to control the computer system, and further including a second recovery point usable to restore the computer system to a second state in which a second operating system is operable to control the computer system, wherein the plurality of recovery options includes a first set of recovery data corresponds to the first operating system, and wherein the plurality of recovery options further includes a second set of recovery data that corresponds to the second operating system; create new recovery points to the first and second sets of recovery data, including a third recovery point that includes an update to the first operating system, the new recovery points including; a forth recovery point to the first set of recovery data responsive to an update of an application configured to operate with the first operating system; and a fifth recovery point to the second set of recovery data responsive to an update of an application configured to operate with the second operating system; associate each of the first and second sets of recovery data with security information, wherein, for each of the first and second sets of recovery data, the corresponding security information is usable to control access to that recovery data; receive input indicative of one of the plurality of recovery options; and restore the computer system to the recovery point indicated by the received input.
-
-
16. A method, comprising:
-
creating a first recovery point on a computer system at a first point in time, wherein said first recovery point is usable to store data that is associated with a first state to restore the computer system to the first state, wherein the first state includes a first file as stored on the computer system at the first point in time; subsequently creating a second recovery point on the computer system at a second point in time, wherein said second recovery point is usable to store data that is associated with a second state to restore the computer system to the second state, wherein the second state includes the first file as stored on the computer system at the second point in time, wherein the first file as stored on the computer system at the second point in time is modified relative to the first point in time; applying security features to control access to the first and second recovery points on the computer system; after the second point in time, restoring the computer system to the first state using the first recovery point; after said restoring, using the second recovery point to access the first file as it was stored on the computer system at the second point in time. - View Dependent Claims (17, 18)
-
Specification