Data processing: software development – installation – and managem – Software installation
Reexamination Certificate
2008-05-20
2008-05-20
Zhen, Wei (Department: 2191)
Data processing: software development, installation, and managem
Software installation
C717S176000, C717S177000, C717S178000
Reexamination Certificate
active
07376947
ABSTRACT:
A computer system provides for the secure installation and operation of software. The computer system includes a platform, such as a personal computer, having a processor and the Microsoft® Windows® operating system. The computer system also includes a first drive, such as a network, DVD or CD-ROM drive, adapted for access by the processor, and a second drive, such as a hard disk, adapted for access by the processor. The second drive includes an NT File Structure logical volume. The computer system further includes an installer operatively associated with the first drive. The installer cooperates with the processor to write a Primary Data Stream file to the NT File Structure logical volume, to associate data with the Primary Data Stream file, and to write the associated data to the NT File Structure logical volume as an Alternate Data Stream file.
REFERENCES:
patent: 5537592 (1996-07-01), King et al.
patent: 5991778 (1999-11-01), Starek et al.
patent: 6026474 (2000-02-01), Carter et al.
patent: 6205527 (2001-03-01), Goshey et al.
patent: 6314437 (2001-11-01), Starek et al.
patent: 6321219 (2001-11-01), Gainer et al.
patent: 6351850 (2002-02-01), van Gilluwe et al.
patent: 6377958 (2002-04-01), Orcutt
patent: 6418449 (2002-07-01), Chen et al.
patent: 6490723 (2002-12-01), Bearden et al.
patent: 6519762 (2003-02-01), Colligan et al.
patent: 6618857 (2003-09-01), Zimniewicz et al.
patent: 6658435 (2003-12-01), McCall
patent: 6744450 (2004-06-01), Zimniewicz et al.
patent: 6807665 (2004-10-01), Evans et al.
patent: 2002/0019935 (2002-02-01), Andrew et al.
patent: 2002/0129277 (2002-09-01), Caccavale
patent: 2004/0083381 (2004-04-01), Sobel et al.
patent: 2004/0133761 (2004-07-01), Goodman
patent: 2004/0143736 (2004-07-01), Cross et al.
patent: 2004/0230599 (2004-11-01), Moore et al.
patent: 2005/0097549 (2005-05-01), Chu et al.
patent: 2005/0138110 (2005-06-01), Redlich et al.
Han et al., Secure multicast software delivery, IEEE, Jun. 14-16, 2000 pp. 207-212.
Chu-Hsing et al., One-time installation with traitors tracing for copyright programs, IEEE, Oct. 16-19, 2001 pp. 149-155.
Hui et al., A secure mobile IP implementation for windows-based wireless LAN stations using special network drivers, IEEE, vol. 1, Sep. 7-10, 2003 pp. 453-459 vol. 1.
Han et al., A scheme to construct global file system, IEEE, Dec. 3-6, 2001 pp. 206-212 vol. 2.
Richter et al., A File System for the 21st Century: Previewing the Windows NT 5.0 File System, http://www.microsoft.com/msj/1198
tfs
tfs.aspx, Nov. 1998, p. 1-16.
Seifried, M-034: Window File Wiping Utilities Miss Alternate Data Streams, google.com, Jan. 30, 2002, p. 1-7.
Berghel et al., Phishing in Alternate Data Streams, ACM, Feb. 6, 2004, p. 1-9.
NTFS.com, NTFS general information Boot Sector, NTFS.com, 1998-2000.
Enclaves: enabling secure collaboration over the Internet, Li Gong, Selected Areas in Communications, IEEE Journal on, vol. 15 Issue: 3 Apr. 1997, IEEE, pp. 567-575.
Protection reconfiguration for reusable software, Jensen, C.D.; Hagimont, D., Software Maintenance and Reengineering, 1998. Proceedings of the Second Euromicro Conference on, Mar. 8-11, 1998, IEEE, pp. 74-80.
Hiding program slices for software security, Xiangyu Zhang; Gupta, R., Code Generation and Optimization, 2003. CGO 2003. International Symposium on, Mar. 23-26, 2003, IEEE, pp. 325-336.
Carvey, H., “The Dark Side of NTFS (Microsoft's Scarlet Letter)”, http://patriot.net/˜carvdawg/docs/dark—side.html, Oct. 30, 2003, pp. 1-12.
Red Hat, Inc., “Cygwin” TM, http:\\www.redhat.com/software/cygwin/, Feb. 11, 2004, pp. 1-2.
Computer Knowledge, “Virus Types and Methods: NTFS ADS Viruses”, http://www.cknow.com/vtutor/vtntfsads.htm, Feb. 3, 2004, pp. 1-4.
Crucial Security, Inc., “Free Software Downloads”, http://www.crucialsecurity.com/downloads.html, Feb. 3, 2004, 4 pp.
JSI, Inc., “0483>> How can I hide files from Explorer and/or Dir?”, http://www.jsiinc.com/SUBA/tip0400/rh0483.htm, Oct. 30, 2003, pp. 1-2.
JSI, Inc., “2808 >> Alternate Data Stream tool.”, http://www.jsiinc.com/SUBF/tip2800/rh2808.htm, Oct. 30, 2003, pp. 1-2.
Pearson Technology Centre, “InformIT.com: Security”, http://www.informit.com/isapi/guide˜security/seq—id˜15/guide/contenLasp, Oct. 30, 2003, pp. 1-6.
LSOFT Technologies Inc., “NTFS—New Technology File System designed for Windows NT, 2000, XP”, http:\\www.ntfs.com, Oct. 30, 2003, pp. 1-2.
LSOFT Technologies Inc. “NTFS Multiple Data Streams”, http://www.ntfs.com
tfs-multiple.htm, Oct. 30, 2003, p. 1.
H. Berghel et al., Association for Computing Machinery, “Phishing in Alternate Data Streams”, http://www.acm.org/˜hlb/col-edit/digital—village/apr-04/dv—4-04.html, Jan. 6, 2004, 9 pp.
Peter Szor, Symantec Security Responses Homepage, “W2K.Stream”, http://web.archive.org/web/20030625134400/http://www.sarc.com/avcenter/venc/data/pf/w2k.stream.html, Jun. 25, 2003, 3 pp.
VMware, Inc., “VMware Workstation User's Manual Version 3.2”, Dec. 16, 2002, 41 pp.
Apple Computer, Inc., Apple Developer Connection, “File Forks”, http://developer.apple.com/documentation/mac/Files/Files-14.html, Jul. 2, 1996, 3 pp.
Anonymous, “Installation (computer programs)”, Internet Article, Wikipedia Retrieved from the Internet: URL:http://en.wikipedia.org/wiki/Installation—%28computer—programs%29>, Feb. 2006, 2pp.
H. Carvey, “NTFS Alternate Data Streams”, Information Security Bulletin, Feb. 2001, pp 27-30.
Microsoft Press, “The Windows Interface Guidelines for Software Design”, 1995, 10 pp.
Eckert Seamans Cherin & Mellott , LLC
Houser Kirk D.
Rampuria Satish S
Research In Motion Limited
Zhen Wei
LandOfFree
Computer system and method for secure installation and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Computer system and method for secure installation and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer system and method for secure installation and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2763461