Installation setup

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C719S331000, C719S332000

Reexamination Certificate

active

07640592

ABSTRACT:
Tampering with pieces of software is inhibited. Installation setup protection inhibits tampering during the installation of various pieces of software. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided.

REFERENCES:
patent: 5748739 (1998-05-01), Press
patent: 5794232 (1998-08-01), Mahlum et al.
patent: 5802368 (1998-09-01), Grigsby et al.
patent: 5845129 (1998-12-01), Wendorf et al.
patent: 5915019 (1999-06-01), Ginter et al.
patent: 6006328 (1999-12-01), Drake
patent: 6236971 (2001-05-01), Stefik et al.
patent: 6731756 (2004-05-01), Pizano et al.
patent: 6978303 (2005-12-01), McCreesh et al.
patent: 7000100 (2006-02-01), Lacombe et al.
patent: 7146505 (2006-12-01), Harada et al.
patent: 7281271 (2007-10-01), Szor
patent: 7424615 (2008-09-01), Jalbert et al.
patent: 2001/0027383 (2001-10-01), Maliszewski
patent: 2002/0002678 (2002-01-01), Chow et al.
patent: 2002/0062451 (2002-05-01), Scheidt et al.
patent: 2003/0097577 (2003-05-01), Sotoodeh et al.
patent: 2003/0208562 (2003-11-01), Hauck et al.
patent: 2004/0107368 (2004-06-01), Colvin
patent: 2004/0158708 (2004-08-01), Peyravian et al.
patent: 2004/0260953 (2004-12-01), Jamieson et al.
patent: WO 99/01815 (1999-01-01), None
patent: WO 03/007571 (2003-01-01), None
Llbrary (computing), Wikipedia, printed out in 2008.
Michael Kaplan, “Lunch with Julie Bennett”, printed out in 2008.
List of Unicode Directors, printed out in 2008, which includes Julie Bennett of Microsoft.
Ullman, CS-245 Winter 2002, class assignment, Professor Ullman, Stanford University, year 2002.
Collberg et al., Watermarking, Tamper-Proofing, and Obfuscation—Tools for Software Protection, IEEE Transactions on Software Engineering, vol. 28, Aug. 2002, pp. 735-746, year 2002.
Linn et al., Obfuscation of Executable Code to Improve Resistance to Static Disassembly, total of 10 pages without numbering in the pages, Oct. 2003.
UUT Explorer: Shop Replaceable Unit (SRU) graphical display application; Fleming, B.; AUTOTESTCON, 2008 IEEE Sep. 8-11, 2008 pp. 613-615.
Jiang Zheng; Williams, L.; Robinson, B.; Smiley, K.; Incorporating COTS Software into Software Systems: Tools and Techniques, 2007. IWICSS '07. Second International Workshop on May 20-26, 2007 pp. 9-9.
Design of DSP-based Open Control System for Industrial Robot; Bo You; Dongjie Li; Suju Liu; Automation and Logistics, 2007 IEEE International Conference on Aug. 18-21, 2007 pp. 1585-1590.
Labir, E., “Unpacking by Code Injection,”The CodeBreakers Journal 1(2):1-16, 2004.
PCT/US05/20638, International Search Report and Written Opinion, Jan. 18, 2006.
“Code Integrity (ci.dll) Security Policy,” http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp890.pdf, printed out in 2008 (pp. 1-6).
“Description of E1-Garnmal (one of the inventors),” http://www.linkedin.corn/pub/5/985/36, printed out in 2008 (pp. 1-2).
“Sorting it all Out,”MSDN Blogs, http://blogs.msdn.com/michkap/archive/2005/02/12/371650.aspx, including a section on Julie Bennett, printed out in 2008.
“Unicode Directors,”Unicode Consortium, http://unicode.org/consortium/directors.html, listing Julie Bennett, printed out in 2008 (pp. 1-9).
Baldi et al. “The TrustedFlow™ Protocol Idiosyncratic Signatures for Authenticated Execution” copyright 2002, presented in Jun. 2003 at West Point, New York (2 pages).
Eyers et al., “Compile-Time Enforcement of Dynamic Security Policies,”IEEE Workshop, pp. 119-126 (2008).
Jochen et al., “Towards the Safe Use of Dynamically Transformed Itinerant Software,”Univ. of Delaware(printed 2008) 7 pages.
Madou et al. “Software Protection Through Dynamic Code Mutation” In Information Security Applications, (2005) (15 pages).
Memon et al., “Preventing Reverse Engineering Threat in Java Using Byte Code Obfuscation Techniques,”IEEE-ICET, pp. 689-694 (2006).
Microsoft, Creating and Using Dynamic Library, http://msdn.microsoft.com/en-us/library/ms235636(VS.80).aspx, printed out in 2008 (pp. 1-6).
Petkac et al., “Security Agility for Dynamic Execution Environments,”DARPA contract(printed 2008) (15 pages).
Preda et al., “Control Code Obfuscation by Abstract Interpretation,”IEEE, 10 pages (2005).
Udupa et al., Deobfuscation Reverse Engineering Obfuscated Code,IEEE, 10 pages (2005).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Installation setup does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Installation setup, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Installation setup will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4119053

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.