Method and system for rendering harmless a locked pestware...

Electrical computers and digital processing systems: virtual mac – Task management or control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000

Reexamination Certificate

active

08079032

ABSTRACT:
A method and system for rendering harmless a locked pestware executable object is described. In one illustrative embodiment, a locked pestware executable object is detected on a storage device of a computer, the locked pestware executable object being inaccessible via the computer's operating system; the locked pestware executable object is accessed through direct drive access; and data in the locked pestware executable object is modified in a manner that renders it harmless to the computer.

REFERENCES:
patent: 5537540 (1996-07-01), Miller
patent: 5623600 (1997-04-01), Ji et al.
patent: 5684875 (1997-11-01), Ellenberger
patent: 5920696 (1999-07-01), Brandt et al.
patent: 5951698 (1999-09-01), Chen et al.
patent: 6069628 (2000-05-01), Farry et al.
patent: 6073241 (2000-06-01), Rosenberg et al.
patent: 6092194 (2000-07-01), Touboul
patent: 6154844 (2000-11-01), Touboul
patent: 6167520 (2000-12-01), Touboul
patent: 6310630 (2001-10-01), Kulkarni et al.
patent: 6347375 (2002-02-01), Reinert
patent: 6397264 (2002-05-01), Stasnick et al.
patent: 6405316 (2002-06-01), Krishnan et al.
patent: 6460060 (2002-10-01), Maddalozzo, Jr. et al.
patent: 6480962 (2002-11-01), Touboul
patent: 6535931 (2003-03-01), Celi, Jr.
patent: 6611878 (2003-08-01), De Armas et al.
patent: 6633835 (2003-10-01), Moran et al.
patent: 6667751 (2003-12-01), Wynn et al.
patent: 6701441 (2004-03-01), Balasubramaniam et al.
patent: 6772345 (2004-08-01), Shetty
patent: 6785732 (2004-08-01), Bates et al.
patent: 6804780 (2004-10-01), Touboul
patent: 6813711 (2004-11-01), Dimenstein
patent: 6829654 (2004-12-01), Jungek
patent: 6910134 (2005-06-01), Maher et al.
patent: 6965968 (2005-11-01), Touboul
patent: 7058822 (2006-06-01), Edery et al.
patent: 7107617 (2006-09-01), Hursey et al.
patent: 7603440 (2009-10-01), Grabowski et al.
patent: 2002/0162015 (2002-10-01), Tang
patent: 2002/0166063 (2002-11-01), Lachman et al.
patent: 2003/0065943 (2003-04-01), Geis et al.
patent: 2003/0074581 (2003-04-01), Hursey et al.
patent: 2003/0101381 (2003-05-01), Mateev et al.
patent: 2003/0159070 (2003-08-01), Mayer et al.
patent: 2003/0217287 (2003-11-01), Kruglenko
patent: 2004/0030914 (2004-02-01), Kelley et al.
patent: 2004/0034794 (2004-02-01), Mayer et al.
patent: 2004/0064736 (2004-04-01), Obrecht et al.
patent: 2004/0080529 (2004-04-01), Wojcik
patent: 2004/0143763 (2004-07-01), Radatti
patent: 2004/0187023 (2004-09-01), Alagna et al.
patent: 2004/0225877 (2004-11-01), Huang
patent: 2005/0038697 (2005-02-01), Aaron
patent: 2005/0138433 (2005-06-01), Linetsky
patent: 2005/0154885 (2005-07-01), Viscomi et al.
patent: 2006/0074896 (2006-04-01), Thomas
patent: 2006/0075494 (2006-04-01), Bertman et al.
patent: 2006/0075501 (2006-04-01), Thomas et al.
patent: 2006/0085528 (2006-04-01), Thomas
patent: 2006/0161988 (2006-07-01), Costea et al.
patent: 2006/0272021 (2006-11-01), Marinescu et al.
patent: 2006/0294590 (2006-12-01), Enstone et al.
patent: WO 93/25024 (1993-12-01), None
patent: WO 02/084482 (2002-10-01), None
patent: PCT/US2006/041798 (2007-12-01), None
Bontchev, V.;Possible Virus Attacks Against Integrity Programs and How to Prevent Them; Virus Bulletin Conference, Virus Bulletin LTd., Abington, GB; Sep. 2, 1992; pp. 131-142, XP000613974; paragraph [02.1].
Yi-Min Wang et al.;Detecting Stealth Software with Strider GhostBuster; Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on Yokohama, Japan Jun. 1-28, 2005, Piscataway, NJ, USA, IEEE, Jun. 28, 2005, pp. 368-377, XP010817813; ISBN: 0-7695-2282-3; paragraph [0002].
International Search Report and Written Opinion dated Sep. 27, 2007 for PCT/US2007/064489.
U.S. Appl. No. 10/956,578, filed Oct. 1, 2004, Steve Thomas.
U.S. Appl. No. 11/145,593, filed Jun. 6, 2005, Tony Nichols et al.
U.S. Appl. No. 11/145,592, filed Jun. 6, 2005, Tony Nichols et al.
U.S. Appl. No. 11/454,097, filed Jun. 15, 2006, Troy A. Carpenter et al.
Codeguru, Three Ways to Inject Your Code Into Another Process, by Robert Kuster, Aug. 4, 2003, 22 pgs.
Codeguru, Managing Low-Level Keyboard Hooks With the Windows API for VB .Net, by Paul Kimmel, Apr. 18, 2004, 10 pgs.
Codeguru, Hooking The Keyboard, by Anoop Thomas, Dec. 13, 2001, 6 pgs.
Illusive Security, Wolves In Sheep's Clothing: Malicious DLLs Injected Into trusted Host Applications, Author Unknown, home.arcor.de/scheinsicherheit/dll.htm 13 pgs., Aug. 10, 2003.
DevX.com, Intercepting Systems API Calls, by Seung-Woo Kim, May 13, 2004, 6 pgs.
Microsoft.com, How to Subclass A Window in Windows 95, Article ID 125680, Jul. 11, 2005, 2 pgs.
MSDN, Win32 Hooks by Kyle Marsh, Jul. 29, 1993, 15 pgs.
PCT Search Report, PCT/US05/34874, Jul. 5, 2006, 7 Pages.
Yurcik, William et al., A Planning Framework for Implementing Virtual Private Networks, Jun. 2001, IT Pro, IEEE, pp. 41-44.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for rendering harmless a locked pestware... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for rendering harmless a locked pestware..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for rendering harmless a locked pestware... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4254528

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.