Hardware data protection device
First Claim
1. An apparatus for preventing modification and protecting of data stored in a data storage device present on a computer system in such a manner that presents an illusion/false impression that the data can be modified or be copied, the apparatus being adapted to function as a switch between an existing data storage device and a secondary data storage device, the apparatus comprising:
- a local memory;
connecting data storage device controller to connect to the existing data storage device and the secondary data storage device;
a data protection logic configured to connect to the computer system such that the apparatus appears to the computer system as the existing data storage device, the data protection logic connecting to the computer system through a data storage device bus and using an internal table in the local memory, the local memory having flags indicating whether requested data of the computer system is to be retrieved from the existing data storage device or the secondary data storage device;
whereinthe apparatus is configured to determine which storage device from which to retrieve the requested data using the internal table,the local memory is configured to store the data to be written in the secondary data storage device,the apparatus is configured to transfer data from the existing data storage device or the secondary data storage device in response to a request by the computer system, andthe apparatus is configured to function as a bridge between the computer system and the existing data storage device to pass all data through its connection without modification.
0 Assignments
0 Petitions
Accused Products
Abstract
A device is connected between an storage device controller and a storage device, providing data storage device protection in a manner transparent to the computing system and to the user of the computing system independent of operating system. The device protects the user from malicious code by preventing its execution and the unauthorized or unwanted user data modification by making the contents of one of the storage device read only. All the operations of the device are invisible to the computing system and to the user independent of installed operating system. The device can be disabled by a switch or by other means. When this happens the effect is the same as if the device were physically removed of the computing system.
-
Citations
11 Claims
-
1. An apparatus for preventing modification and protecting of data stored in a data storage device present on a computer system in such a manner that presents an illusion/false impression that the data can be modified or be copied, the apparatus being adapted to function as a switch between an existing data storage device and a secondary data storage device, the apparatus comprising:
-
a local memory; connecting data storage device controller to connect to the existing data storage device and the secondary data storage device; a data protection logic configured to connect to the computer system such that the apparatus appears to the computer system as the existing data storage device, the data protection logic connecting to the computer system through a data storage device bus and using an internal table in the local memory, the local memory having flags indicating whether requested data of the computer system is to be retrieved from the existing data storage device or the secondary data storage device;
whereinthe apparatus is configured to determine which storage device from which to retrieve the requested data using the internal table, the local memory is configured to store the data to be written in the secondary data storage device, the apparatus is configured to transfer data from the existing data storage device or the secondary data storage device in response to a request by the computer system, and the apparatus is configured to function as a bridge between the computer system and the existing data storage device to pass all data through its connection without modification. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of operating an apparatus for preventing modification and protecting of data stored in a data storage device present on a computer system in such a manner that presents an illusion/false impression that the data can be modified or copied, the apparatus including a local memory, a data storage device controller and a data protection logic, and the apparatus being adapted to function as a switch between an existing data storage device and a secondary data storage device, the method comprising:
-
connecting the existing data storage device and the secondary data storage device; connecting the data protection logic to the computer system through a data storage device bus and using an internal table in the local memory such that the apparatus appears to the computer system as the existing data storage device, the local memory having flags indicating whether requested data of the computer system is to be retrieved from the existing data storage device or the secondary data storage device; receiving retrieving requests from the computer system to retrieve data; determining which storage device from which to retrieve the requested data using the internal table, transferring data from the existing data storage device or the secondary data storage device in response to the retrieving request from the computer system;
whereinthe apparatus functions as a bridge between the computer system and the existing data storage device such that all data transmitted between the computer system and the existing storage device is transmitted without modification. - View Dependent Claims (8, 9, 10, 11)
-
Specification