This invention relates to apparatus for the recovery of compromised data in a computer system and more particularly to such apparatus which is portable.
Data recovery operations are frequent occurrences for computer systems due often to disk crashes, worms, unauthorized access—etc. Elaborate security arrangements are normally employed to limit access for different data security levels to limit the potential for data loss or compromise. Still, when data loss or corruption occurs, the result could be catastrophic. Not only is data recovery action necessitated, but also secure movement of the data is paramount.
At present, when data in a computer memory is corrupted, remediation often requires that at least parts of the computer such as a hard drive be taken off site to a facility with the equipment to reboot the computer and transfer the data to different data store.
In accordance with the principles of this invention, data recovery apparatus is self-contained within a portable envelope and includes software for booting up a computer and recovering compromised data in the computer memory. The ability to move remediation equipment into the field rather than requiring the computed data in a laboratory setting depends on the capability of being able to maintain the data in a reliable secure environment.
In accordance with the principles of this invention, a portable data recovery unit having a hard drive or memory is operative in a manner such that data recovered from a corrupted memory can only be moved to the hard drive on the portable unit and vice versa, any movement from the hard drive to the original data memory can only operate to move the data to the hard drive in the portable unit.
The exclusion of all other possible destination for data movement is achieved, for example, by recording the serial number of the hard drive in the portable unit and the serial number of the hard disk (the original data store) in the corrupted computer. Any instruction to move data from the portable unit or the original data store is accompanied by a destination code. A comparator, activated by a “transfer data” command compares the destination code to the serial number of the hard disk in the portable unit. If no match occurs, transfer of data is denied. For data transfer out of the hard disk, the comparator compares the destination code with the serial number of the data store in the corrupted computer. If no match occurs, data transfer is denied.
The use of the originating data memory store serial number and the serial number of the hard disk in the portable unit as identifiers ensures that the data is secured and cannot be transferred to an unauthorized data memory store. Data from the hard drive on the portable unit can only be transferred back to the originating memory.
This security regimen permits the portable unit to, for example, interact with a number of computers in a given facility, establishing a file in the hard disk of the portable unit for each computer. In this case, each file has the serial number of the data store in the corresponding computer. Thus, data transfer from that file can only occur to a destination with a serial number which matches the serial number of the originating data store.
A portable unit, programmed to perform the data recovery operations common for in-laboratory equipment, can service a number of computers, on site, by connecting, for example, to the USB Port of a computer, downloading the program to initiate remediation of the data, disconnecting and repeating the operation with each of the remaining computers.
Again although downloaded data from each of the (corrupted) computers to corresponding files in the hard drive in the portable unit can only be moved from that hard drive to the data store with the originating serial number.
Specifically, in reference to
The program next operates to open a file in the computer containing an identifier as indicated by block 31. The identifier is copied and stored in a portion of the memory designated the “folder” in, for example, the protected memory 13 in the unit 10 of
The next step is to copy the unit identifier, which preferably is the serial number of hard drive 11, and store the identifier in a folder in the computer 20 as indicated by block 34. Each folder is named in unit 10 with the corresponding identifier code as indicated by block 35 for situations where a plurality of computers is being serviced simultaneously by a unit 10 as will become clear hereinafter.
The next step is to copy the designated data in the computer into a folder in the unit 10 (in association with the computer identifier). This step is indicated by block 37. The transferred data is now secured and is incapable of being transferred out of the unit except to the memory in the computer with the identifier defined in block 32.
Unit 10 and the computer can now perform the required operations as indicated by block 38 in
When the processing is completed data may be returned to the original computer. The return destination is to the memory in the computer which has the designated identifier. This step is represented by block 39.
If the unit is connected to a computer with the correct identifier, the data are returned, as indicated by block 40 and arrow 41, to the originating file as indicated by block 37. If a wrong identifier is indicated, no transfer occurs as indicated by block 43 and arrow 42.
The processing terminates and the data in the folder in the unit may be erased as indicated in block 44.
Because of the security system described in accordance with the principles of this invention, a unit 45 can be reconnected to a computer from which it had been disconnected with the confidence that the identical unit is being reconnected.
When the unit is reconnected as indicated by block 50 of
The program automatically validates that the computer identifier and the unit identifiers are correct as indicated by block 53. If the identifiers correspond to the identifiers when previously connected (block 55), the unit 45 carries out any further processing required as indicated by block 56. If they are not the same, the connection is terminated.
When processing is complete, all data transferred to the unit may be erased and all data copied from the computer are deleted and the unit is disconnected as indicated by blocks 57 and 58.
In summary, a control unit is used to run various programs on two or more computers simultaneously while ensuring that data from a particular computer can only be transferred between that computer and the control unit running programs on that computer.
Specifically, the control unit is prevented from transferring data to a data memory other than the one from which the data were originally transferred to the control unit.
The unit is connected to a computer and downloads a program into the computer's memory so that the computer can be controlled using the unit's operating system (OS).
The unit copies the unit's identifier into the computer's memory and also records the computer's memory identifier into the unit's memory. The program then starts required processes, creates/stores data needed for operation/documentation and record keeping. Such data in the unit are linked by data codes to the specific computer being processed.
The unit is disconnected from the computer and the computer memory identifier that is stored in the unit is preserved. The unit identifier is preserved in the computer memory. If the program stops, reconnection is required with the original unit.
In the event that the control unit is connected to another memory device, the unit's program automatically compares that memory's identifier with the identifier in the unit's protected memory. Since there will not be a match, data transfer will not occur.
In the event of a problem, an error message is sent from the computer to the designated computer. The unit that was originally used to start the process on that computer is taken back and reconnected to the computer, and appropriate measures are taken to solve the problem.
On completion of the required processing steps, the computer indicates completion on its display. The unit is taken to that computer and reconnected. In order to maintain process continuity and prevent leakage of data to an unauthorized unit or computer the following steps are taken.
The computer confirms, by comparing identifiers that this unit is the unit used to start the process and to which data had been transferred.
The unit confirms by comparing identifiers that this is the computer from which data were originally transferred.
Process documentation is transferred to and/or created by the unit and stored in the suitable unit memory.
It is to be understood that although the description herein is in terms of hard drives, it is only illustrative. It is contemplated that memories other than hard drives can be used in accordance with the principles of the invention such as flash memories, optical memories - - - etc, and these will have characteristic serial numbers or can be so designated. Also, it is contemplated that in a facility with a plurality of computers serviced by the server, the unit herein can be connected to the server for interacting with the individual computers as discussed above. Also, although the invention is described in terms of storing in a unit the identifier for a computer to which it is connected and storing in the computer the serial number of the unit which is the most secure embodiment. In some instances only the computer identifier need be stored in the unit.
What has been described herein is considered merely illustrative of the principles of this invention and it is within the purview of those skilled in the art to devise various modifications thereof within the spirit and scope of the invention as encompassed by the following claims.
This application claims priority from U.S. Provisional Application Ser. No. 61/004,122 filed on Nov. 24, 2007 the content of which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
61004122 | Nov 2007 | US |