SEARCH
Tynax ~ Patent Library

Patent for Sale:

Dynamic Associative Storage Security for Long-Term Memory Storage Devices    

Hardware-based computer security system.

Overview

This technology enables a computer manufacturer to prevent damage from malicious programs by utilizing mirrored files and quarantining malicious programs within files that are merely a reflection of the computer's real working files. More specifically, this is a hierarchial folder security system for mapping files into and out of alias directories and/or real directories pending on:

1) the directory of the specific file being accessed
2) the program thread requesting access to a memory storage device
3) the type of access requesting being made

Primary Application of the Technology

Computer manufacturers, hardware developers, technology development companies, virus protection software companies

The Problem Solved by the Technology

Prevent damage to computer files and programs by malicious programs at the hardware level.

How the Technology Solves the Problem

Computer software solutions for malicious programs are far from foolproof, requiring constant updating with the associated expenses and complications. This technology provides a far superior solution. As long as each program seeking to access a computer's files is properly identified, permanent damage by malicious programs will be prevented.

Competitive Advantage

There is no known competition producing a comparable hardware-based security solution for the market.

Patent Summary

U.S. Patent Classes & Classifications Covered in this listing:

Class 726: Information Security

This class provides, within a computer or digital data processing system, for processes or apparatus for increasing a system s extension of protection of system hardware, software, or data from maliciously caused destruction, unauthorized modification, or unauthorized disclosure. It provides for protection of data processing systems, apparatus, and methods as well as protection of information and services. Subject matter included in this class includes security policies, access control, monitoring, scanning data, countermeasures, usage control, and data protection from maliciously caused destruction, unauthorized modification, or unauthorized disclosure, and includes protection of hardware, and user protection, e.g., privacy, etc.

Subclass 26: PREVENTION OF UNAUTHORIZED USE OF DATA INCLUDING PREVENTION OF PIRACY, PRIVACY VIOLATIONS, OR UNAUTHORIZED DATA MODIFICATION
Subclass 27: Access control
Subclass 30: By authorizing data

Class 713: Electrical Computers And Digital Processing Systems: Support

This class provides, within a computer or digital data processing system, for the following processes or apparatus for: 1. establishing original operating parameters or data for a computer or digital data processing system, such as, allocating extended or expanded memory, specifying device drivers, paths, files, buffers, disk management, etc.; 2. for changing system settings or operational modes in a computer or digital data processing system after they have been set; 3. for increasing a systemís extension of protection of system hardware,software, or data frm maliciously caused destruction, unauthorized modification, or unauthorized disclosure; 4. for modifying or responding to the available power to a computer or digital data processing system or programmable calculator; 5. for synchronization of two or more processors; 6. wherein a clock or timing signals, timing pulses, or data associated with the control or regulation of any one or combination of processing components, memory components, and peripheral components are caused to operate in synchronization; 7. for generation, division, or distribution of clock signals, pulse signals, or timing signals in a computer or digital data processing system from one or more sources into groups of continuous and successive time increments, and including event timing and counting, and the correction of the clock signals, pulse signals, or timing signals; 8. wherein there is a significant temporal, incremental or sequencing control provided to one or more computers, digital data processing systems, processors, memory, or peripherals, or to data transmission between these systems or components.

Subclass 165: File protection
Subclass 193: By stored data protection