×

Data protection method, authentication method, and program therefor

  • US 7,979,465 B2
  • Filed: 10/30/2007
  • Issued: 07/12/2011
  • Est. Priority Date: 03/24/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A data protection method for accepting an access request for a file stored in a file system of a storage device and referring or updating to the file based on the access request, comprising the steps of:

  • relating a first user to a first kind of permitted access class which restrictively permits the first user to access for maintenance of the file during a preset monitoring period, relating a second user to a second kind of permitted access class which permits the second user to access without restriction during the monitoring period, and relating a third user to a third kind of permitted access class which rejects any access from the third user to during the monitoring period;

    determining whether a current time is within the monitoring period;

    obtaining a snapshot of the file system at the time of start of the monitoring period after the current time reaches the start of the monitoring period;

    writing an update file as an object of an update request into the file system during the monitoring period in response to the write request accepted from the first user;

    writing an updated file as an object of an update request into a temporary storage area during the monitoring period in response to the update request accepted from the second user, the temporary storage area is provided with a storage device and being different from the file system;

    rejecting an update request accept from the third user during the monitoring period;

    restoring the file system with the snapshot of the file system at the time of start of the monitoring period to revoke the file updated by the first user during the monitoring period, after the current time reaches to the end of monitoring period; and

    writing, after the restoring with the snapshot, the updated file in the temporary storage area written by the second user into the file system.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×