Computer system and method for secure installation and...

Data processing: software development – installation – and managem – Software installation

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C717S176000, C717S177000, C717S178000

Reexamination Certificate

active

10785579

ABSTRACT:
A computer system provides for the secure installation and operation of software. The computer system includes a platform, such as a personal computer, having a processor and the Microsoft® Windows® operating system. The computer system also includes a first drive, such as a network, DVD or CD-ROM drive, adapted for access by the processor, and a second drive, such as a hard disk, adapted for access by the processor. The second drive includes an NT File Structure logical volume. The computer system further includes an installer operatively associated with the first drive. The installer cooperates with the processor to write a Primary Data Stream file to the NT File Structure logical volume, to associate data with the Primary Data Stream file, and to write the associated data to the NT File Structure logical volume as an Alternate Data Stream file.

REFERENCES:
patent: 5537592 (1996-07-01), King et al.
patent: 5991778 (1999-11-01), Starek et al.
patent: 6026474 (2000-02-01), Carter et al.
patent: 6205527 (2001-03-01), Goshey et al.
patent: 6314437 (2001-11-01), Starek et al.
patent: 6321219 (2001-11-01), Gainer et al.
patent: 6351850 (2002-02-01), van Gilluwe et al.
patent: 6377958 (2002-04-01), Orcutt
patent: 6418449 (2002-07-01), Chen et al.
patent: 6490723 (2002-12-01), Bearden et al.
patent: 6519762 (2003-02-01), Colligan et al.
patent: 6618857 (2003-09-01), Zimniewicz et al.
patent: 6658435 (2003-12-01), McCall
patent: 6744450 (2004-06-01), Zimniewicz et al.
patent: 6807665 (2004-10-01), Evans et al.
patent: 2002/0019935 (2002-02-01), Andrew et al.
patent: 2002/0129277 (2002-09-01), Caccavale
patent: 2004/0083381 (2004-04-01), Sobel et al.
patent: 2004/0133761 (2004-07-01), Goodman
patent: 2004/0143736 (2004-07-01), Cross et al.
patent: 2004/0230599 (2004-11-01), Moore et al.
patent: 2005/0097549 (2005-05-01), Chu et al.
patent: 2005/0138110 (2005-06-01), Redlich et al.
Han et al., Secure multicast software delivery, IEEE, Jun. 14-16, 2000 pp. 207-212.
Chu-Hsing et al., One-time installation with traitors tracing for copyright programs, IEEE, Oct. 16-19, 2001 pp. 149-155.
Hui et al., A secure mobile IP implementation for windows-based wireless LAN stations using special network drivers, IEEE, vol. 1, Sep. 7-10, 2003 pp. 453-459 vol. 1.
Han et al., A scheme to construct global file system, IEEE, Dec. 3-6, 2001 pp. 206-212 vol. 2.
Richter et al., A File System for the 21st Century: Previewing the Windows NT 5.0 File System, http://www.microsoft.com/msj/1198
tfs
tfs.aspx, Nov. 1998, p. 1-16.
Seifried, M-034: Window File Wiping Utilities Miss Alternate Data Streams, google.com, Jan. 30, 2002, p. 1-7.
Berghel et al., Phishing in Alternate Data Streams, ACM, Feb. 6, 2004, p. 1-9.
NTFS.com, NTFS general information Boot Sector, NTFS.com, 1998-2000.
Enclaves: enabling secure collaboration over the Internet, Li Gong, Selected Areas in Communications, IEEE Journal on, vol. 15 Issue: 3 Apr. 1997, IEEE, pp. 567-575.
Protection reconfiguration for reusable software, Jensen, C.D.; Hagimont, D., Software Maintenance and Reengineering, 1998. Proceedings of the Second Euromicro Conference on, Mar. 8-11, 1998, IEEE, pp. 74-80.
Hiding program slices for software security, Xiangyu Zhang; Gupta, R., Code Generation and Optimization, 2003. CGO 2003. International Symposium on, Mar. 23-26, 2003, IEEE, pp. 325-336.
Carvey, H., “The Dark Side of NTFS (Microsoft's Scarlet Letter)”, http://patriot.net/˜carvdawg/docs/dark—side.html, Oct. 30, 2003, pp. 1-12.
Red Hat, Inc., “Cygwin” TM, http:\\www.redhat.com/software/cygwin/, Feb. 11, 2004, pp. 1-2.
Computer Knowledge, “Virus Types and Methods: NTFS ADS Viruses”, http://www.cknow.com/vtutor/vtntfsads.htm, Feb. 3, 2004, pp. 1-4.
Crucial Security, Inc., “Free Software Downloads”, http://www.crucialsecurity.com/downloads.html, Feb. 3, 2004, 4 pp.
JSI, Inc., “0483>> How can I hide files from Explorer and/or Dir?”, http://www.jsiinc.com/SUBA/tip0400/rh0483.htm, Oct. 30, 2003, pp. 1-2.
JSI, Inc., “2808 >> Alternate Data Stream tool.”, http://www.jsiinc.com/SUBF/tip2800/rh2808.htm, Oct. 30, 2003, pp. 1-2.
Pearson Technology Centre, “InformIT.com: Security”, http://www.informit.com/isapi/guide˜security/seq—id˜15/guide/contenLasp, Oct. 30, 2003, pp. 1-6.
LSOFT Technologies Inc., “NTFS—New Technology File System designed for Windows NT, 2000, XP”, http:\\www.ntfs.com, Oct. 30, 2003, pp. 1-2.
LSOFT Technologies Inc. “NTFS Multiple Data Streams”, http://www.ntfs.com
tfs-multiple.htm, Oct. 30, 2003, p. 1.
H. Berghel et al., Association for Computing Machinery, “Phishing in Alternate Data Streams”, http://www.acm.org/˜hlb/col-edit/digital—village/apr-04/dv—4-04.html, Jan. 6, 2004, 9 pp.
Peter Szor, Symantec Security Responses Homepage, “W2K.Stream”, http://web.archive.org/web/20030625134400/http://www.sarc.com/avcenter/venc/data/pf/w2k.stream.html, Jun. 25, 2003, 3 pp.
VMware, Inc., “VMware Workstation User's Manual Version 3.2”, Dec. 16, 2002, 41 pp.
Apple Computer, Inc., Apple Developer Connection, “File Forks”, http://developer.apple.com/documentation/mac/Files/Files-14.html, Jul. 2, 1996, 3 pp.
Anonymous, “Installation (computer programs)”, Internet Article, Wikipedia Retrieved from the Internet: URL:http://en.wikipedia.org/wiki/Installation—%28computer—programs%29>, Feb. 2006, 2pp.
H. Carvey, “NTFS Alternate Data Streams”, Information Security Bulletin, Feb. 2001, pp 27-30.
Microsoft Press, “The Windows Interface Guidelines for Software Design”, 1995, 10 pp.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Computer system and method for secure installation and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Computer system and method for secure installation and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer system and method for secure installation and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3920008

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.