Technique for scanning stealthed, locked, and encrypted files

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C707S793000, C726S021000, C726S022000, C726S026000, C726S027000, C709S247000, C713S189000, C713S191000

Reexamination Certificate

active

07634521

ABSTRACT:
A copy of the raw data on physical disk of an inaccessible source file is automatically generated in an accessible target file. When accessed, the copy of the raw data of the inaccessible source file in the accessible target file can be read allowing a user or application to evaluate the data of the accessible target file, and thus indirectly the raw data of the inaccessible source file. In some embodiments, the copy of the raw data is evaluated for malicious code, allowing a user or application to take protective actions, such as deleting the inaccessible source file. Where the raw data of the inaccessible source file is encrypted, the copy of the raw data is automatically decrypted by the operating system when read yielding unencrypted data. Where the raw data of the inaccessible source file is compressed, the copy of the raw data is automatically decompressed by the operating system when read yielding uncompressed data.

REFERENCES:
patent: 6851058 (2005-02-01), Gartside
patent: 7293150 (2007-11-01), Witt et al.
patent: 2008/0016304 (2008-01-01), Witt et al.
patent: 2008/0270804 (2008-10-01), Terranova et al.
WinZip, 1991-2005, WinZip International LLC.
Nebbett, G., “Windows NT/2000 Native API Reference”, Macmillan Technical Publishing, Indianapolis, IN, Jan. 2000, pp. 457-475.
“Encrypting File System in Windows XP and Windows Server 2003”, Microsoft Corporation, Aug. 1, 2002, updated Apr. 11, 2003, pp. 1-40 [online]. Retrieved on Feb. 17, 2006. Retrieved from the Internet:<URL:http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/cryptfs.mspx>.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Technique for scanning stealthed, locked, and encrypted files does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Technique for scanning stealthed, locked, and encrypted files, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Technique for scanning stealthed, locked, and encrypted files will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4115099

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.