Data processing: software development – installation – and managem – Software installation
Reexamination Certificate
2008-04-01
2011-11-29
Zhen, Wei (Department: 2191)
Data processing: software development, installation, and managem
Software installation
C717S176000, C717S177000, C717S178000
Reexamination Certificate
active
08069442
ABSTRACT:
A computer system provides for the secure installation and operation of software. The computer system includes a platform, such as a personal computer, having a processor and the Microsoft® Windows® operating system. The computer system also includes a first drive, such as a network, DVD or CD-ROM drive, adapted for access by the processor, and a second drive, such as a hard disk, adapted for access by the processor. The second drive includes an NT File Structure logical volume. The computer system further includes an installer operatively associated with the first drive. The installer cooperates with the processor to write a Primary Data Stream file to the NT File Structure logical volume, to associate data with the Primary Data Stream file, and to write the associated data to the NT File Structure logical volume as an Alternate Data Stream file.
REFERENCES:
patent: 5537592 (1996-07-01), King et al.
patent: 5991778 (1999-11-01), Starek et al.
patent: 6026474 (2000-02-01), Carter et al.
patent: 6205527 (2001-03-01), Goshey et al.
patent: 6314437 (2001-11-01), Starek et al.
patent: 6321219 (2001-11-01), Gainer et al.
patent: 6351850 (2002-02-01), van Gilluwe et al.
patent: 6377958 (2002-04-01), Orcutt
patent: 6418449 (2002-07-01), Chen et al.
patent: 6490723 (2002-12-01), Bearden et al.
patent: 6519762 (2003-02-01), Colligan et al.
patent: 6618857 (2003-09-01), Zimniewicz et al.
patent: 6744450 (2004-06-01), Zimniewicz et al.
patent: 6807665 (2004-10-01), Evans et al.
patent: 2002/0019935 (2002-02-01), Andrew et al.
patent: 2002/0129277 (2002-09-01), Caccavale
patent: 2004/0083381 (2004-04-01), Sobel et al.
patent: 2004/0133761 (2004-07-01), Goodman
patent: 2004/0230599 (2004-11-01), Moore et al.
patent: 2005/0097549 (2005-05-01), Chu et al.
Ryan L. Means; Alternate Data Streams: Out of the Shadows and into the Light; SANS Institute 2003, v3.1, pp. 1-45.
Berghel et al.; Phishing in Alternate Data Streams; Feb. 6, 2004; aquired from http://www.berghel.net/col-edit/digital—village/apr-04/dv—4-04.php; pp. 1-7.
Carvey, H., “The Dark Side of NTFS (Microsoft's Scarlet Letter)”, http://patriot.net/˜carvdawg/docs/dark—side.html, Oct. 30, 2003, pp. 1-12.
Red Hat, Inc., “Cygwin” TM, http:\\www.redhat.com/software/cygwin/, Feb. 11, 2004, pp. 1-2.
Computer Knowledge, “Virus Types and Methods: NTFS ADS Viruses”, http://www.cknow.com/vtutor/vtntfsads.htm, Feb. 3, 2004, pp. 1-4.
Crucial Security, Inc., “Free Software Downloads”, http://www.crucialsecurity.com/downloads.html, Feb. 3, 2004, 4 pp.
JSI, Inc., “0483 >>How can I hide files from Explorer and/or Dir?”, http://www.jsiinc.com/SUBA/tip0400/rh0483.htm, Oct. 30, 2003, pp. 1-2.
JSI, Inc., “2808 >>Alternate Data Stream tool.”, http://www.jsiinc.com/SUBF/tip2800/rh2808.htm, Oct. 30, 2003, pp. 1-2.
Pearson Technology Centre, “InformIT.com: Security”, http://www.informit.com/isapi/guide˜security/seq—id˜15/guide/content.asp, Oct. 30, 2003, pp. 1-6.
LSOFT Technologies Inc., “NTFS—New Technology File System designed for Windows NT, 2000, XP”, http:\\www.ntfs.com, Oct. 30, 2003, pp. 1-2.
LSOFT Technologies Inc. “NTFS Multiple Data Streams”, http://www.ntfs.com
tfs-multiple.htm, Oct. 30, 2003, p. 1.
H. Berghel et al., Association for Computing Machinery, “Phishing in Alternate Data Streams”, http://www.acm.org/˜hlb/col-edit/digital—village/apr-04/dv—4-04.html, Jan. 6, 2004, 9 pp.
Peter Szor, Symantec Security Response Homepage, “W2K.Stream”, http://web.archive.org/web/20030625134400/http://www.sarc.com/avcenter/venc/data/pf/w2k.stream.html, Jun. 25, 2003, 3 pp.
VMWARE, Inc., “VMware Workstation User's Manual Version 3.2”, Dec. 16, 2002, 41 pp.
Apple Computer, Inc.. Apple Developer Connection, “File Forks”, http://developer.apple.com/documentation/mac/Files/Files-14.html, Jul. 2, 1996, 3 pp.
Anonymous, “Installation (computer programs)”, Internet Article, Wikipedia Retrieved from the Internet: URL:http://en.wikipedia.org/wiki/Installation—%28computer—programs%29>, Feb. 2006, 2 pp.
H. Carvey, “NTFS Alternate Data Streams”, Information Security Bulletin, Feb. 2001, pp. 27-30.
Microsoft Press, “The Windows Interface Guidelines for Software Design”, 1995, 10 pp.
Han et al., “Secure multicast software delivery”, IEEE, Jun. 14-16, 2000, pp. 207-212.
Chu-Hsing et al., “One-time installation with traitors tracing for copyright programs”, IEEE, Oct. 16-19, 2001, pp. 149-155.
Hui et al., “A secure mobile IP implementation for windows-based wireless LAN stations using special network drivers”, IEEE, vol. 1, Sep. 7-10, 2003, pp. 453-459.
Han et al., “A scheme to construct global file system”, IEEE, vol. 2, Dec. 3-6, 2001, pp. 206-212.
Richter et al., “A File System for the 21st Century: Previewing the Windows NT 5.0 File System”, http://www.microsoft.com/msj/1198
tfs
tfs.aspx, Nov. 1998, pp. 1-16.
Seifried, “M-034: Window File Wiping Utilities Miss Alternate Data Streams”, google.com, Jan. 30, 2002, pp. 1-7.
Berghel et al., “Phishing in Alternate Data Streams”, ACM, Feb. 6, 2004, pp. 1-9.
NTFS.COM, “NTFS general information Boot Sector”, NTFS.com, 1998-2000.
Rampuria Satish
Research In Motion Limited
Ridout & Maybee LLP
Zhen Wei
LandOfFree
Computer system and method for secure installation and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Computer system and method for secure installation and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer system and method for secure installation and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4302298