Data processing: database and file management or data structures – Database design – Data structure types
Reexamination Certificate
2007-01-16
2007-01-16
Gaffin, Jeffrey (Department: 2165)
Data processing: database and file management or data structures
Database design
Data structure types
C707S793000
Reexamination Certificate
active
10249829
ABSTRACT:
A security system with methodology for computing a machine independent unique identifier for an executable file across different machines is described. In response to a request to uniquely identify an executable file that has been installed on a given machine, portions of the executable file modified as a result of installation of the executable file on the given machine are identified. A machine independent unique identifier is determined by performing a calculation on the executable file. The calculation is performed by excluding at least the identified portions of the executable file modified as a result of installation of the executable file on the given machine.
REFERENCES:
patent: 4914586 (1990-04-01), Swinehart et al.
patent: 5475817 (1995-12-01), Waldo et al.
patent: 5586260 (1996-12-01), Hu
patent: 5623601 (1997-04-01), Vu
patent: 5764887 (1998-06-01), Kells et al.
patent: 5815574 (1998-09-01), Fortinsky
patent: 5828833 (1998-10-01), Belville et al.
patent: 5832211 (1998-11-01), Blakley et al.
patent: 5838903 (1998-11-01), Blakely et al.
patent: 5857191 (1999-01-01), Blackwell et al.
patent: 5864665 (1999-01-01), Tran
patent: 5875296 (1999-02-01), Shi et al.
patent: 5881230 (1999-03-01), Christensen et al.
patent: 5966702 (1999-10-01), Fresko et al.
patent: 5987611 (1999-11-01), Freund
patent: 6802006 (2004-10-01), Bodrov
patent: 6966002 (2005-11-01), Torrubia-Saez
patent: 6996843 (2006-02-01), Moran
Microsoft Corporation, MSDN—ImageGetDigestStream, Microsoft Windows Platform SDK, Debugging and Error Handling, 2002.
Williams, R., A Painless Guide to CRC Error Detection Algorithms, Rocksoft Pty Ltd., Aug. 19, 1993.
Rivest, R., RFC 1321: The MD5 Message-Digest Algorithm, MIT Laboratory for Computer Science, Apr. 1992.
Check Point Software Technologies, Inc.
Gaffin Jeffrey
Smart John A.
Wu Yicun
LandOfFree
Security system with methodology for computing unique... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security system with methodology for computing unique..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security system with methodology for computing unique... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3767656