Operating system and data protection

Error detection/correction and fault detection/recovery – Data processing system error or fault handling – Reliability and availability

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C714S006130, C714S015000, C714S019000

Reexamination Certificate

active

06802029

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates generally to computing systems; and, more particularly, it relates to protection of operating systems and application data within computing systems.
2. Description of the Related Technology
Conventional programs and methods that seek to, provide for disk protection and recovery of a computing system are intrinsically available to a user of the computing system. Such conventional programs and methods are installed by a user of the computing system and are easily available to the user. Sometimes, the user performs some modification of the actual conventional program or method that itself seeks to prevent catastrophic operating system failure of the computing system and to recover the operating system of the computing system after some hard disk crash. Examples of instances where a user performs some undesirable modification of the operating system of the computing system that disables the computing system and prevents its operation.
Moreover, when the program or method that is used to prevent this collapse of the operating system of the computing system is easily visible or accessible to the user of the computing system, that program or method can itself be undesirably corrupted by the user. For example, when a user desires to “clean up” certain portions of the hard disk of the computing system, the user oftentimes goes through and deletes certain files within the hard disk without a great deal of caution or care. Such an instance would be a user-generated completion to the operating system of the computing system. The inherent installation of conventional programs and methods that seek to provide for disk protection and recovery, in that they are easily available or accessible to the user of the computing system, may themselves be corrupted by the very user of the computing system whose computing system is meant to be “protected.”
Further limitations and disadvantages of conventional and traditional systems will become apparent to one of skill in the art through comparison of such systems with the present invention as set forth in the remainder of the present application with reference to the drawings.
SUMMARY OF CERTAIN INVENTIVE ASPECTS
Various inventive aspects can be found in an operating system and data protection system that is operable within a computing system. The operating system and data protection system contains, among other things, a computing system having a memory and an operating system. The operating system can execute a number of commands that are directed to the memory.
Certain aspects include a method of accessing data in locations of a memory in a computer system. The method comprises receiving a write access command directed to a first location, determining whether said first location is identified as protected, if said first location is identified as protected, determining a second location that is not identified as protected, re-directing the write access command to said second location, receiving a subsequent write access command directed to said first location, and re-directing said subsequent write access command to a third location that is not identified as protected.
In additional aspects, the method further comprises receiving at least one read access command directed to said first location, and re-directing said at least one read access command to said third location. Further aspects include the method wherein determining a second location that is not identified as protected further comprises determining a second location that is identified as available. Additional aspects include the method wherein said third location is identified as available.
Further aspects include the method wherein said memory is a disk drive and said locations are sectors. Additional aspects include the method wherein determining a second location that is not identified as protected further comprises determining a second location that is identified as available. Still further aspects include the method wherein said third location is identified as available. Additional aspects include the method wherein said memory is a disk drive. Certain other aspects include the method wherein said locations are sectors.
Additional aspects include a computer system for accessing data in locations of a memory in a computer system. The computer system comprises a driver configured to perform the steps as described in the various aspects of the method above.


REFERENCES:
patent: 4683532 (1987-07-01), Yount et al.
patent: 4819156 (1989-04-01), DeLorme et al.
patent: 4951249 (1990-08-01), McClung et al.
patent: 4975950 (1990-12-01), Lentz
patent: 5008786 (1991-04-01), Thatte
patent: 5012514 (1991-04-01), Renton
patent: 5089958 (1992-02-01), Horton et al.
patent: 5109413 (1992-04-01), Comerford et al.
patent: 5175850 (1992-12-01), Hirata et al.
patent: 5325519 (1994-06-01), Long et al.
patent: 5479611 (1995-12-01), Oyama
patent: 5640507 (1997-06-01), Lipe
patent: 5642417 (1997-06-01), Stringer
patent: 5652646 (1997-07-01), Murayama et al.
patent: 5673407 (1997-09-01), Poland et al.
patent: 5679944 (1997-10-01), Cusey et al.
patent: 5680482 (1997-10-01), Liu et al.
patent: 5745752 (1998-04-01), Hurvig et al.
patent: 5752005 (1998-05-01), Jones
patent: 5752268 (1998-05-01), Shimizu et al.
patent: 5761680 (1998-06-01), Cohen et al.
patent: 5768582 (1998-06-01), Korenshtein
patent: 5768617 (1998-06-01), Liu
patent: 5802583 (1998-09-01), Yeager et al.
patent: 5832513 (1998-11-01), Kennedy
patent: 5832515 (1998-11-01), Ledain et al.
patent: 5835722 (1998-11-01), Bradshaw et al.
patent: 5848420 (1998-12-01), Xu
patent: 5881221 (1999-03-01), Hoang et al.
patent: 5881282 (1999-03-01), Shipman
patent: 5924102 (1999-07-01), Perks
patent: 5951681 (1999-09-01), Chang
patent: 5960084 (1999-09-01), Angelo
patent: 5991402 (1999-11-01), Jia et al.
patent: 5991856 (1999-11-01), Spilo et al.
patent: 6016553 (2000-01-01), Schneider et al.
patent: 6067582 (2000-05-01), Smith et al.
patent: 6067622 (2000-05-01), Moore
patent: 6081875 (2000-06-01), Clifton et al.
patent: 6092161 (2000-07-01), White et al.
patent: 6110228 (2000-08-01), Albright et al.
patent: 6167494 (2000-12-01), Cheston et al.
patent: 6173291 (2001-01-01), Jenevein
patent: 6173417 (2001-01-01), Merrill
patent: 6173446 (2001-01-01), Khan et al.
patent: 6175904 (2001-01-01), Gunderson
patent: 6189146 (2001-02-01), Misra et al.
patent: 6199178 (2001-03-01), Schneider et al.
patent: 6205527 (2001-03-01), Goshey et al.
patent: 6205558 (2001-03-01), Sobel
patent: 6212635 (2001-04-01), Reardon
patent: 6212647 (2001-04-01), Sims et al.
patent: 6223263 (2001-04-01), Mathews et al.
patent: 6226747 (2001-05-01), Larsson et al.
patent: 6226759 (2001-05-01), Miller et al.
patent: 6230285 (2001-05-01), Sadowsky et al.
patent: 6240527 (2001-05-01), Schneider et al.
patent: 6240531 (2001-05-01), Spilo et al.
patent: 6243833 (2001-06-01), Hitchcock et al.
patent: 6247109 (2001-06-01), Kleinsorge et al.
patent: 6275942 (2001-08-01), Bernhard et al.
patent: 6289426 (2001-09-01), Maffezzoni et al.
patent: 6338149 (2002-01-01), Ciccone et al.
patent: 6345346 (2002-02-01), Biessener et al.
patent: 6356915 (2002-03-01), Chtchetkine et al.
patent: 6363400 (2002-03-01), Chtchetkine et al.
patent: 6366988 (2002-04-01), Skiba et al.
patent: 6374265 (2002-04-01), Chen et al.
patent: 6449111 (2002-09-01), Kool et al.
patent: 6510552 (2003-01-01), Benayoun et al.
patent: 6543006 (2003-04-01), Zundel et al.
patent: 2002/0019907 (2002-02-01), McMurdie et al.
patent: 2002/0023199 (2002-02-01), Biessener et al.
patent: 2002/0049883 (2002-04-01), Schneider et al.
patent: 363005451 (1988-01-01), None
patent: WO 99/12101 (1999-03-01), None
patent: WO 00/65447 (2000-11-01), None
Ron White, How Computers Work, Sep. 1999, QUE, Millennium Edition, pp. 146-147.
Microsoft Press Computer Dictionary, 1997, Microsoft Press, Third Edition, pp. 495 and 498.
“Troubleshooting Video Problems in Windows (Q127139),” May 30, 1996, Microsoft <http://support.microsoft.com/default.aspx?scid=kb;EN-US;q12

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Operating system and data protection does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Operating system and data protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Operating system and data protection will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3315005

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.