Data processing: software development – installation – and managem – Software program development tool – Managing software components
Reexamination Certificate
2011-03-08
2011-03-08
Zhen, Wei Y (Department: 2191)
Data processing: software development, installation, and managem
Software program development tool
Managing software components
C717S143000, C713S184000
Reexamination Certificate
active
07904884
ABSTRACT:
A method of data processing that converts a set of restricted terms, which is considered prohibited for use in source files, into an encrypted form, which prevents unauthorized users from reading the set of restricted terms. Further, the terms from a selected source file are encrypted with the same algorithm that was used on the set of prohibited terms. Then, a determination is made if the selected source file has one or more of the encrypted, restricted terms. In response to determining that the selected source file has one or more of the encrypted, restricted terms, an indication is given that the selected source file has one or more of the encrypted, restricted terms.
REFERENCES:
patent: 7568109 (2009-07-01), Powell et al.
patent: 2003/0028651 (2003-02-01), Schreckengast et al.
patent: 2005/0216898 (2005-09-01), Powell et al.
patent: 2008/0040776 (2008-02-01), Bauer et al.
Brown Mark S.
Hall Kylene J.
Kirkland Dustin
Dillon & Yudell LLP
International Business Machines - Corporation
Nguyen Phillip H
Zhen Wei Y
LandOfFree
Identifying use of a restricted term in a source file does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Identifying use of a restricted term in a source file, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Identifying use of a restricted term in a source file will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2682468