18159394. JUST-IN-TIME FILESYSTEM-BASED RANSOMWARE BACKUP simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

JUST-IN-TIME FILESYSTEM-BASED RANSOMWARE BACKUP

Organization Name

Dell Products L.P.

Inventor(s)

Seth Jacob Rothschild of Littleton MA (US)

Farida Shafik of Cairo (EG)

JUST-IN-TIME FILESYSTEM-BASED RANSOMWARE BACKUP - A simplified explanation of the abstract

This abstract first appeared for US patent application 18159394 titled 'JUST-IN-TIME FILESYSTEM-BASED RANSOMWARE BACKUP

The abstract describes a method for detecting and creating backups of files targeted by ransomware processes.

  • Simplified Explanation: The method involves detecting file access processes, such as ransomware attacks, and creating backups of the targeted files to prevent data loss.
  • Key Features and Innovation:

- Detection of file access processes - Incrementing a counter based on detections - Creating backups when the counter exceeds a defined threshold - Backup files may be read-only and expire after a certain time

  • Potential Applications:

- Data protection against ransomware attacks - Preventing data loss in case of malicious file access - Enhancing cybersecurity measures for file security

  • Problems Solved:

- Mitigating the impact of ransomware attacks on data - Safeguarding files from unauthorized access and modifications

  • Benefits:

- Improved data security and protection - Reduced risk of data loss due to ransomware attacks - Enhanced file backup and recovery processes

  • Commercial Applications:

- Cybersecurity software development - Data protection services for businesses - Integration into file management systems for enhanced security

  • Prior Art:

- Researchers may explore existing patents related to file backup and ransomware detection technologies.

  • Frequently Updated Research:

- Stay informed about the latest advancements in ransomware detection and file backup technologies.

Questions about file backup and ransomware detection: 1. How does the method differentiate between legitimate file access and ransomware attacks? 2. What are the potential limitations of this method in detecting advanced ransomware techniques?

By providing a comprehensive overview of the method, its applications, benefits, and potential commercial uses, this article aims to educate readers on the innovative approach to file security and ransomware prevention.


Original Abstract Submitted

One example method includes detecting a file access process, such as a write operation performed by a ransomware process, directed to a file, based on the detecting, incrementing a counter, checking to determine if the counter exceeds a defined threshold, and when the counter exceeds the defined threshold, creating a backup of the file. The backup file may be a read-only file, and may expire, and be deleted, at a particular time, or after the passage of a period of time.