Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2005-02-09
2011-11-15
Vu, Kim (Department: 2435)
Information security
Monitoring or scanning of software or data including attack...
C726S002000, C726S028000, C713S183000, C713S187000
Reexamination Certificate
active
08060933
ABSTRACT:
This computer data protection method of the present invention requires a user to enter a correct password for modifying any data. If wrong passwords are typed, this method forbids modification of any program modules. Further, if any program module is detected having unauthenticated modification, that program module is deleted and an original image of that program module is loaded to recover normal operation of the operation system. Additionally, a common password is also provided in the protection method. Some special function can use this common password to pass the detection of this method to perform any modification.
REFERENCES:
patent: 4719566 (1988-01-01), Kelley
patent: 5475839 (1995-12-01), Watson et al.
patent: 5768564 (1998-06-01), Andrews et al.
patent: 5809230 (1998-09-01), Pereira
patent: 6044155 (2000-03-01), Thomlinson et al.
patent: 6044471 (2000-03-01), Colvin
patent: 6134659 (2000-10-01), Sprong et al.
patent: 6668325 (2003-12-01), Collberg et al.
patent: 6804778 (2004-10-01), Levi et al.
patent: 6836883 (2004-12-01), Abrams et al.
patent: 2002/0033838 (2002-03-01), Krueger et al.
patent: 2002/0157021 (2002-10-01), Sorkin et al.
patent: 2002/0196274 (2002-12-01), Comfort et al.
patent: 2003/0009687 (2003-01-01), Ferchau et al.
patent: 2003/0028761 (2003-02-01), Platt
patent: 2003/0131002 (2003-07-01), Gennetten et al.
patent: 2003/0154468 (2003-08-01), Gordon et al.
patent: 2003/0208694 (2003-11-01), Fang
patent: 2003/0236986 (2003-12-01), Cronce et al.
patent: 2004/0003380 (2004-01-01), Fedorov
patent: 2004/0236884 (2004-11-01), Beetz
patent: 2005/0183072 (2005-08-01), Horning et al.
patent: 2006/0037075 (2006-02-01), Frattura et al.
patent: 2006/0064758 (2006-03-01), Petner et al.
patent: 2007/0028292 (2007-02-01), Kabzinski et al.
patent: 2007/0234070 (2007-10-01), Horning et al.
Stang, David J.; “Comparison: Products to Detect Changes to Programs”; 1991; National Computer Security Association.
McAfee Security, “McAfee Internet Security Suite—Version 6.0,” Jun. 2003, Networks Associates Technology, Inc.
“Fortres 101 Version 5.0.” 2003, Fortes Grand Corporation.
“Folder Guard,” WinAbility.com, fguard.hlp, retrieved www.archive.org, Apr. 1, 2003, p. 11.
“Microsoft, Computer Dictionary, Fifth Edition,” 2002, Microsoft Corporation, pp. 115-116.
“Folder Guard,” WinAbility.com, fguard.hlp, retrieved www.archive.org, Apr. 1, 2003, pp. 9 and 43.
U.S. Appl. No. 60/552,000.
U.S. Appl. No. 60/552,000, filed Mar. 10, 2004.
Rabin & Berdo P.C.
Schwartz Darren B
Vu Kim
LandOfFree
Computer data protecting method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Computer data protecting method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer data protecting method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4257058