Dell products l.p. (20240248803). JUST-IN-TIME FILESYSTEM-BASED RANSOMWARE BACKUP simplified abstract

From WikiPatents
Jump to navigation Jump to search

JUST-IN-TIME FILESYSTEM-BASED RANSOMWARE BACKUP

Organization Name

dell products l.p.

Inventor(s)

Seth Jacob Rothschild of Littleton MA (US)

Farida Shafik of Cairo (EG)

JUST-IN-TIME FILESYSTEM-BASED RANSOMWARE BACKUP - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240248803 titled 'JUST-IN-TIME FILESYSTEM-BASED RANSOMWARE BACKUP

Simplified Explanation: The patent application describes a method for detecting and creating a backup of a file when a ransomware process attempts to access it.

Key Features and Innovation:

  • Detection of file access processes, such as ransomware attacks
  • Incrementing a counter based on detected access
  • Creating a backup of the file when the counter exceeds a defined threshold
  • Backup file may be read-only and have an expiration date

Potential Applications: This technology can be used in cybersecurity systems to protect files from ransomware attacks.

Problems Solved: This technology addresses the problem of data loss and corruption caused by ransomware attacks.

Benefits:

  • Enhanced file protection against ransomware
  • Prevention of data loss and corruption
  • Improved cybersecurity measures for businesses and individuals

Commercial Applications: The technology can be applied in antivirus software, data backup solutions, and cybersecurity services to enhance file protection against ransomware attacks.

Prior Art: Researchers can explore prior art related to file backup methods in cybersecurity systems and ransomware detection technologies.

Frequently Updated Research: Stay informed about the latest advancements in ransomware detection and file backup technologies to enhance cybersecurity measures.

Questions about Ransomware Detection and File Backup: 1. How does the method detect ransomware attacks on files? 2. What are the benefits of creating a read-only backup file in response to ransomware attacks?


Original Abstract Submitted

one example method includes detecting a file access process, such as a write operation performed by a ransomware process, directed to a file, based on the detecting, incrementing a counter, checking to determine if the counter exceeds a defined threshold, and when the counter exceeds the defined threshold, creating a backup of the file. the backup file may be a read-only file, and may expire, and be deleted, at a particular time, or after the passage of a period of time.