Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2005-11-03
2009-10-13
Lipman, Jacob (Department: 2434)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C713S165000
Reexamination Certificate
active
07603721
ABSTRACT:
A client computer runs an operating system that executes additional applications by loading them using an application loader and executes device drivers for peripheral devices by loading the drivers using a device loader. The operating system restricts the functionality of the operating system, such as by making selected portions and functionality of the operating system unavailable to the user or by limiting the user's ability to add software applications or device drivers to the computer. Additionally, various techniques can be used to remove or reduce the functionality limitations of the computer.
REFERENCES:
patent: 5208853 (1993-05-01), Armbruster et al.
patent: 5293422 (1994-03-01), Loiacono
patent: 5349643 (1994-09-01), Cox et al.
patent: 5365587 (1994-11-01), Campbell et al.
patent: 5748960 (1998-05-01), Fischer
patent: 5944821 (1999-08-01), Angelo
patent: 5966691 (1999-10-01), Kibre et al.
patent: 5968136 (1999-10-01), Saulpaugh et al.
patent: 6067575 (2000-05-01), McManis et al.
patent: 6175924 (2001-01-01), Arnold
patent: 6298025 (2001-10-01), McPherson et al.
patent: 0849658 (1998-06-01), None
Microsoft Computer Dictionary, Microsoft Press, 2002, fifth edition, pp. 276 and 378.
Watts, W., “The protection racket”, .EXE Magazine, vol. 5, Issue 5, Oct. 1990, pp. 12-13, 15-16 and 18.
Barbier, P., “Protection on a card with Argos”, Micro-Systemes, No. 76, Jun. 1987, pp. 86-87.
Ariet, B., “Methods for Protection against computer piracy, myth, and reality”, Micro-Systems, No. 101, Oct. 1989, pp. 75-81.
Holmes, B., “Single-copy security”, Software Protection, Systems International, vol. 16, No. 10, Oct. 1988, pp. 55-56.
Kuchinskas, S., “Aladdin knowledge Systems: securing the global village”, EContent, vol. 26, No. 5, May 2003, pp. 50-51.
Lutz, A., “Access Protection. The safe PC”, Personal Computer, No. 11, Nov. 1987, pp. 98, 100.
Yannicos, B., “Softguard protects programs. Copy protection module on the V.24 Interface”, Mikrocomputer-Zeitschrift, No. 1, 1986, pp. 52-53.
Feinleib David A.
Gulledge Carl L.
Haroun Wassef
Kempin Joachim
Kolb Kurt
Lipman Jacob
Microsoft Corporation
LandOfFree
Restricted software and hardware usage on a computer does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Restricted software and hardware usage on a computer, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Restricted software and hardware usage on a computer will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4136123