System and method of protecting files from unauthorized modification or deletion
First Claim
Patent Images
1. A method comprising:
- receiving a write request for a file;
creating a first version of a temporary file associated with the file in response to the write request in order to verify that the temporary file can be created, the first version of the temporary file having a setting to restrict write access to only a component that created the first version of the temporary file;
closing the first version of the temporary file to enable a component that initiated the write request to access a second version of the temporary file;
authenticating modifications to the second version of the temporary file after data has been written to the second version of temporary file by the component that initiated the write request; and
concurrently updating the file and a backup file with data from the second version of temporary file.
2 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment of the invention, a method comprises receiving a write request for a file. A temporary file associated with the file is created in response to the write request. A write-lock is applied to the temporary file, namely the file includes a setting that restricts write access to only a component that created or opens the temporary file. Thereafter, the temporary file is closed to disable the write-lock and to enable a component that initiated the write request to access the temporary file.
-
Citations
16 Claims
-
1. A method comprising:
-
receiving a write request for a file; creating a first version of a temporary file associated with the file in response to the write request in order to verify that the temporary file can be created, the first version of the temporary file having a setting to restrict write access to only a component that created the first version of the temporary file; closing the first version of the temporary file to enable a component that initiated the write request to access a second version of the temporary file; authenticating modifications to the second version of the temporary file after data has been written to the second version of temporary file by the component that initiated the write request; and concurrently updating the file and a backup file with data from the second version of temporary file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. Software stored in a non-transitory machine-readable medium of a computing device and, when executed, protect both static and dynamic files stored within the computing device from unauthorized modification or deletion, the software comprising:
-
a communication component adapted to control communications with and receive a Write command associated with a file from a program; and a security agent operating as an intermediary between the program and an operating system of the computing device, the security agent to receive the Write command, to create a first version of a temporary file associated with the file, the first temporary file is created with file-sharing settings that restrict write access of the first temporary file by only the security agent, to close the first version of the temporary file to enable access to a second version of the temporary file, to authenticate modifications to the second version of the temporary file after data has been written to the second version of the temporary file in response to the Write command, and to concurrently update the file and a backup file with data written to the second version of the temporary file. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computing device, comprising:
-
a processor; a hard disk drive to store an operating system; and a security agent stored within the hard disk drive, the security agent operating as an intermediary between a component of the computing device and the operating system, the security agent to create and use temporary files associated with a file to be modified in order to protect the file from unauthorized modification or deletion, the security agent to (i) create a first version of a temporary file in response to a Write command from the component of the computing device, the first temporary file having a setting to restrict write access to only a component that created or opens the first version of the temporary file, (ii) closing the first version of the temporary file to enable the component to access a second version of the temporary file, and (iii) authenticate modifications of the second version of the temporary file after data has been written to the second version of the temporary file by the component of the computing device; and concurrently updating the file and a backup file with the data from the second version of the temporary file. - View Dependent Claims (16)
-
Specification