Appeal 2006-2685 Application 09/801,614 BACKGROUND Appellants’ invention relates to security of data files by setting up for destruction of intruded files as soon as an intrusion is suspected. For each file, a duplicate or a backup, which remains substantially inaccessible to user requests, is stored for reloading after the compromised data is destroyed (Specification 3-4). An understanding of the invention can be derived from a reading of exemplary independent claim 1, which is reproduced as follows: 1. In a data processing operation having stored data in a plurality of data files, a system for protecting said data files from unauthorized user comprising: means for storing for each of said plurality of data files, a backup file inaccessible to user requests; means for receiving user requests for access to data files; means for determining whether said requests are unauthorized intrusions into said requested data files; means responsive to an initial determination that a request is unauthorized for destroying the requested data files; and means for reloading a backup file for each destroyed file. The Examiner relies on the following references: Schneck US 5,933,498 Aug. 3, 1999 Groshon US 6,351,811 B1 Feb. 26, 2002 2Page: Previous 1 2 3 4 5 6 7 Next
Last modified: September 9, 2013