Security system for data processing applications

Electrical computers and digital processing systems: memory – Storage accessing and control – Control technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C711S112000, C713S152000, C713S001000

Reexamination Certificate

active

06799259

ABSTRACT:

FIELD OF THE INVENTION
The present invention relates to security systems for computer-related applications generally, and more particularly to methods for isolating data in data processing applications.
BACKGROUND OF THE INVENTION
An ever-present issue associated with computers and computer-related applications is the security of data stored within the computers. Typically, electronic data is magnetically stored in specific physical locations within the computers. Examples of such physical locations include hard drives or hard disks, random access memory (RAM), and read-only memory (ROM). Electronic data may also be stored on portable devices such as floppy disks, recordable tapes, and compact digital disks. Such data may also be stored on a central database, which database is housed in a physically distinct structure and connected to a plurality of remote computers via electrical transmission means. The data in the central databases may then be remotely accessed and manipulated by a remote computer user at any time. Once the user is finished with the data, it can be re-saved to the database or deleted altogether.
Each category of data storage locations has particular characteristics which, in sum, provide a full spectrum of storage capabilities. Hard drives or hard disks are usually utilized to hold data that is intended to be kept in the computer on a quasi-permanent basis. As such, data in respective hard disks is maintained until specifically deleted, whether the respective computer is powered on or not.
A common modality for computer systems used in a variety of applications is the utilization of one or more hard disks. Such hard disks may be used to store a variety of information, such as operating system software, application software, drivers for various peripheral attachments, and data used by the various application program software. Operation system software typically resides on the “boot” hard disk. In the present systems, there is generally only one hard disk that may be designated as the “boot” hard disk. Such operating system software typically controls all computer functions, and it is usually the software through which all application software is executed.
Other hard disks connected to a respective computer are generally designated by the operating system software as data disks. If these additional hard disks also contain operating system software, such hard disks may only be utilized as the “boot” disk if the “boot” designation is reassigned and the operating system software has been booted up for use.
Random access memory is typically used as a temporary holding location for data viewed by the computer user. Information in the RAM is usually erased each time the respective computer is turned off. Internal computer instructions driving systems such as the boot up sequence, saving sequence, etc. are normally stored in the read only memory. Information in the ROM may be accessed by a computer user, but may not usually be manipulated.
In most applications, the most preferred mode of data storage maintains the information for as long as the computer operator desires. Accordingly, hard disks and central data repositories have become critically important in the field of data storage and management.
In many applications today, computers containing stored data are operably coupled to external communication means for communicating over a global computer network such as the internet. Such communication means may include telephone lines, digital service lines (DSL), dedicated digital fiber optic lines, cable and satellite links. When the communication means are active, information may be transferred between remote computers and central data repositories. Information received by such remote computers may be viewed temporarily, or may be stored in particular memory devices in the computers. As stated above, hard disks within the computers are typically utilized in situations where relatively long-term data storage is desired. Data imported from external databases is therefore regularly stored in hard disks, in which locally generated data is also held. Such imported and local data are generally commingled in the hard disk, wherein no physical separation exists between the two types of data. The same scenario is true in a central database, in that data from various sources is stored in common memory structures.
With the advent of computer networks allowing multiple computers to simultaneously communicate and receive information from one another, data security has become an increasingly important issue. Remote computers connected to such networks routinely store, or “download”, data received through network communication channels. Such data may sometimes contain rogue computer instructions, often referred to as “viruses”. The imported viruses are unwittingly stored to hard disks and databases along with the remainder of the imported data. Once the viruses are in the storage structures, the coded set of instructions defining the viruses automatically initiate, thereby causing the computer to carry out the instructions. These instructions may be relatively harmless, or may be totally destructive to key portions of the host computer. Often times, such viruses act to destroy other stored data in the memory structure at issue.
Computers connected to networks may also be susceptible to unauthorized users accessing stored information. In some cases, unauthorized users may be able to gain access to particular computers via respective network connections and subsequently take control of such computers. Once access to the computers has been achieved, the unauthorized user can remotely access software and data stored in those computers, and can read, write or erase any or all associated data or application software, thereby compromising the security of such computers.
Various systems have been implemented to counteract such security breaches, but have been met with only limited success. Anti-virus software has been developed to detect particular series of instructions that may constitute a virus. Such software scans data before the data is stored to find any suspicious instructions. If these instructions are detected, the virus software may automatically delete them, or may alert a system manager to the potential problem.
Most anti-virus programs in use today, however, can only efficiently detect known viruses or known virus instruction patterns. Thus, newly developed viruses having unique instruction patterns may not be detected by the anti-virus software programs. In addition, anti-virus programs may be circumvented by being attached to documents or other data groups which are not scanned by the anti-virus procedure. Such anti-virus software programs, therefore, do not typically form a complete barrier to the incursion of virus programs in sensitive computer memory structures.
Network security software has also been developed to provide security measures protecting particular computer network connections. Such software may provide, for example, encryption techniques, password-enabled security gates, and other tools for identifying the user requesting access to a particular network connection. To access a protected computer, a user typically needs to provide certain information given only to authorized users of the computer.
Some users, however, who do not have such information may still be able to access the protected computer by utilizing techniques to discover the information and subsequently use it to access the computer, or by utilizing techniques that allow the unauthorized user to circumvent or disable the security software. Once past the gate defined by the security software, the unauthorized user can access data stored on the computer, thus compromising the privacy of such data. The essence of the present invention is to make such access virtually impossible.
As discussed above, existing methods for protecting and securing electronic data stored on computers connected to a network of computers are inadequate for securing such data. One solution to this problem is to have mu

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security system for data processing applications does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security system for data processing applications, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security system for data processing applications will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3218635

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.