Ex Parte McBrearty et al - Page 2



                Appeal 2006-2685                                                                                
                Application 09/801,614                                                                          

                                                  BACKGROUND                                                    
                       Appellants’ invention relates to security of data files by setting up for                
                destruction of intruded files as soon as an intrusion is suspected.  For each                   
                file, a duplicate or a backup, which remains substantially inaccessible to user                 
                requests, is stored for reloading after the compromised data is destroyed                       
                (Specification 3-4).    An understanding of the invention can be derived from                   
                a reading of exemplary independent claim 1, which is reproduced as follows:                     
                       1.   In a data processing operation having stored data in a plurality of                 
                data files, a system for protecting said data files from unauthorized user                      
                comprising:                                                                                     
                       means for storing for each of said plurality of data files, a backup file                
                inaccessible to user requests;                                                                  
                       means for receiving user requests for access to data files;                              
                       means for determining whether said requests are unauthorized                             
                intrusions into said requested data files;                                                      
                       means responsive to an initial determination that a request is                           
                unauthorized for destroying the requested data files; and                                       
                       means for reloading a backup file for each destroyed file.                               
                       The Examiner relies on the following references:                                         
                       Schneck   US 5,933,498  Aug.  3, 1999                                                    
                       Groshon   US 6,351,811 B1  Feb. 26, 2002                                                 


                                                          2                                                     



Page:  Previous  1  2  3  4  5  6  7  Next

Last modified: September 9, 2013