Error detection/correction and fault detection/recovery – Data processing system error or fault handling – Reliability and availability
Reexamination Certificate
1999-10-19
2003-07-15
Beausoliel, Robert (Department: 2184)
Error detection/correction and fault detection/recovery
Data processing system error or fault handling
Reliability and availability
C714S006130, C707S793000
Reexamination Certificate
active
06594780
ABSTRACT:
BACKGROUND
1. Technical Field
The present invention relates generally to computing systems; and, more particularly, it relates to protection of operating systems and application data within computing systems.
2. Related Art
Conventional programs and methods that seek to provide for disk protection and recovery of a computing system are intrinsically available to a user of the computing system. Such conventional programs and methods are installed by a user of the computing system and are easily available to the user. Sometimes, the user performs some modification of the actual conventional program or method that itself seeks to prevent catastrophic operating system failure of the computing system and to recover the operating system of the computing system after some hard disk crash. Examples of some instances where a user performs some undesirable modification of the operating system of the computing system that disables the computing system and prevents its operation.
Moreover, when the program or method that is used to prevent this collapse of the operating system of the computing system is easily visible or accessible to the user of the computing system, that program or method can itself be undesirably corrupted by the user. For example, when a user desires to “clean up” certain portions of the hard disk of the computing system, the user oftentimes goes through and deletes certain files within the hard disk without a great deal of caution or care. Such an instance would be a user-generated corruption to the operating system of the computing system. The inherent installation of conventional programs and methods that seek to provide for disk protection and recovery, in that they are easily available or accessible to the user of the computing system, may themselves be corrupted by the very user of the computing system whose computing system is meant to be “protected.”
Further limitations and disadvantages of conventional and traditional systems will become apparent to one of skill in the art through comparison of such systems with the present invention as set forth in the remainder of the present application with reference to the drawings.
SUMMARY OF THE INVENTION
Various aspects of the present invention can be found in an operating system and data protection system that is operable within a computing system. The operating system and data protection system contains, among other things, a computing system having a hard disk and an operating system. The operating system executes a number of disk access commands that are directed to the hard disk. In addition, the system and data protection system contains a virtual device driver that intercepts a disk access command that is directed to the hard disk. In accordance with the present invention, the virtual device driver (VXD) is substantially transparent to the operating system of the computing system. The virtual device driver (VXD) is incapable of being found using conventional search techniques. That is to say, the virtual device driver (VXD) is virtually hidden from any user of the computing system and is incapable of being altered by a user of the computing system.
In certain embodiments of the invention, the virtual device driver (VXD) of the operating system and data protection system employs a virtual file allocation table to re-direct the disk access command that is directed to the hard disk. In order to do so, the virtual device driver (VXD) is operable to perform dynamic floating point address calculation. The hard disk of the computing system is partitioned into a busy area of the hard disk and a free area of the hard disk, the busy area contains a base system setting of the computing system, From certain perspectives, the virtual device driver (VXD) of the invention safeguards a base system setting of the computing system from one of deletion, alteration, and corruption. This enables a user of the computing system to recover a previous base system setting of the computing system after some undesirable event has disabled the operation of the computing system. The virtual device driver (VXD) warns a user of the computing system of any BIOS changes to the base system setting of the computing system. The present invention is operable within any number of industry available operating systems including, but not limited to the Microsoft Windows 95 operating system and the Microsoft Windows 98 operating system.
Various aspects of the present invention can be found in a method that protects an operating system and data within a computing system. The method includes executing a disk access command to a busy area of a hard disk. Subsequently, the disk access command is intercepted and filtered. The intercepting and filtering of the disk access command is performed using a virtual device driver (VXD) in certain embodiments of the invention. The disk access command is re-directed to a free area of the hard disk when the disk access command is a write disk access command. If the disk access command is a read disk access command, then it is permitted to be directed to a busy area of the hard disk. The method employs floating point address calculation to perform the re-direction of the disk access command. When the method is performed within a computing system having an operating system, a virtual device driver within the computing system is substantially transparent to the operating system of the computing system. In certain embodiments of the invention, the method warns a user of a computing system on which the method is performed of any BIOS changes to a base system setting of the computing system. Similar to other embodiments of the invention as described above, the method is operable within any number of industry available operating systems including, but not limited to the Microsoft Windows 95 operating system and the Microsoft Windows 98.operating system.
Other aspects, advantages and novel features of the present invention will become apparent from the following detailed description of the invention when considered in conjunction with the accompanying drawings.
REFERENCES:
patent: 4683532 (1987-07-01), Yount et al.
patent: 4819156 (1989-04-01), DeLorme et al.
patent: 4951249 (1990-08-01), McClung et al.
patent: 4975950 (1990-12-01), Lentz
patent: 5008786 (1991-04-01), Thatte
patent: 5012514 (1991-04-01), Renton
patent: 5089958 (1992-02-01), Horton et al.
patent: 5109413 (1992-04-01), Comerford et al.
patent: 5175850 (1992-12-01), Hirata et al.
patent: 5325519 (1994-06-01), Long et al.
patent: 5479611 (1995-12-01), Oyama
patent: 5640507 (1997-06-01), Lipe
patent: 5642417 (1997-06-01), Stringer
patent: 5652646 (1997-07-01), Murayama et al.
patent: 5673407 (1997-09-01), Poland et al.
patent: 5679944 (1997-10-01), Cusey et al.
patent: 5680482 (1997-10-01), Liu et al.
patent: 5745752 (1998-04-01), Hurvig et al.
patent: 5752005 (1998-05-01), Jones
patent: 5761680 (1998-06-01), Cohen et al.
patent: 5768582 (1998-06-01), Korenshtein
patent: 5832513 (1998-11-01), Kennedy
patent: 5835722 (1998-11-01), Bradshaw et al.
patent: 5848420 (1998-12-01), Xu
patent: 5881221 (1999-03-01), Hoang et al.
patent: 5881282 (1999-03-01), Shipman
patent: 5924102 (1999-07-01), Perks
patent: 5946700 (1999-08-01), Pongracz et al.
patent: 5951681 (1999-09-01), Chang
patent: 5960084 (1999-09-01), Angelo
patent: 5991402 (1999-11-01), Jia et al.
patent: 5991856 (1999-11-01), Spilo et al.
patent: 6016553 (2000-01-01), Schneider et al.
patent: 6049807 (2000-04-01), Carroll et al.
patent: 6067582 (2000-05-01), Smith et al.
patent: 6067622 (2000-05-01), Moore
patent: 6110228 (2000-08-01), Albright et al.
patent: 6173291 (2001-01-01), Jenevein
patent: 6173417 (2001-01-01), Merrill
patent: 6173446 (2001-01-01), Khan et al.
patent: 6175904 (2001-01-01), Gunderson
patent: 6189146 (2001-02-01), Misra et al.
patent: 6205527 (2001-03-01), Goshey et al.
patent: 6205558 (2001-03-01), Sobel
patent: 6212635 (2001-04-01), Reardon
patent: 6226747 (2001-05-01), Larsson et al.
patent: 6226759 (2001-05-01), Miller et al.
patent: 6230285 (2001-05-01), Sadowsky et al.
patent: 6240
Jian Zhang
Shen Andrew W.
Sun Hanxiang
Beausoliel Robert
Chu Gabriel L
Inasoft, Inc.
Knobbe Martens Olson & Bear LLP
LandOfFree
Operating system and data protection does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Operating system and data protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Operating system and data protection will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3004167