Managing access to resources is becoming an increasingly important concern in modern computers and computer systems. Traditionally, access management is handled at the operating system level on a user-by-user or group basis. Each user of the computer or computer system is given a security level that determines which resources the user may access and manipulate. The user's level of access to resources is the same, regardless of which application the user runs. For example, the user may be granted either no access, read-only access, or read/write access as determined by the configuration settings for each specific resource. Although user-based security is widely used, it provides only a limited number of access options. For example, even read-only access rights typically allow a user to not only read a file, but also to print and/or copy the file. This may be insufficient in many applications including, for example, those where secrecy is important.
In one general aspect, embodiments of the invention are directed to methods of managing access to at least one resource in a computer system. The methods may comprise the step of associating access rights with an application resource. The access rights may define a level of access to the resource granted to the application. The methods may also comprise the step of digitally signing the access rights and the application resource. In various embodiments, the associating may comprise incorporating the access rights into a stream or sub-file of a file including the application resource. Also, in various embodiments, the associating may comprise incorporating the access rights into an extended attribute of a file including the application resource. In various embodiments, access rights may be associated with a user as well as an application resource.
In another general aspect, embodiments of the invention are directed to methods of managing access to a resource in a computer system. The methods may comprise the steps of receiving a request from the application to access the at least one resource and determining whether access rights associated with the application includes a reference to a key for decrypting the resource. The methods may also include the step of providing the application with the key if the access rights include the reference.
In yet another general aspect, embodiments of the invention are directed to methods of managing access to a resource in a computer system. The methods may comprise receiving a request from an application to access the at least one resource. The methods may also comprise the step of reading the access rights associated with the application. The access rights may be stored in a stream of a file, and a component of the application may be stored in a second stream of the file. The methods may also comprise the step of providing the application with access to the at least one resource if the access rights indicate that the application is entitled to access the resource.
Embodiments of the present invention are described herein, by way of example, in conjunction with the following figures, wherein:
Various embodiments of the present invention may be employed to manage access to computer resources (e.g., data, executable images, encryption keys, etc.) on an application-by-application basis. For example, applications running on a computer or computer system may be given associated access rights. The access rights may define the level of access to the resources that is available to the applications (and therefore to a user of the applications). In various embodiments, the access rights and a component of the application may be digitally signed for verification purposes.
The various devices 102, 104, 106, 108 of the computer system 100 may generally store resources and/or execute applications that allow users (not shown) of the system 100 to use and manipulate the resources. User devices 102 may include any kind of device that allows a user to access resources. Example user devices 102 include a desktop computer, a laptop computer, a handheld computer, a personal digital assistant (PDA), etc. The user devices 102 may be used to monitor and/or manipulate applications running on other components of the system 100 (e.g., the server 104), or access resources stored on other components of the system 100 (e.g., database 106). In various embodiments, however, user devices 102 may also store resources and/or execute applications.
The application 202 of the system architecture 200 may include a group of one or more software components executed by a processor or processors of one or more of the devices 102, 104, 106. The application 202 may perform at least one function such as, for example, providing e-mail service, providing word processing, providing financial management services, etc. The application 202 may perform functions by manipulating data. To acquire data for manipulation and output results, the application 202 may create “read requests” and “write requests” for particular data units. These requests may be handled by other components of the architecture 202 as described in more detail below. As described below, the application 202 may have associated access rights that define which resources (e.g., data and other applications) that the application 202 is authorized to access. It will be appreciated that the architecture 200 may, in various aspects, include additional applications (not shown).
Data utilized by the application 202 as well as other applications (e.g., resources) may be stored at data storage 208. Data storage 208 may include any kind of storage drive capable of storing data in an electronic or other suitable computer-readable format. In certain non-limiting embodiments, data storage 208 may include a single fixed disk drive, an array of disk drives, an array of disk drives combined to provide the appearance of a larger, single disk drive, a solid state drive, etc. Data storage 208 may be physically located at any device 102, 104, 106, 108 of the computer system 100. For example, data storage 208 may include various drives accessible over the network 110. In various embodiments, all or a part of data storage 208 may be located at database 106 and may be accessed through the network 110 by the other components, such as user devices 102, servers 104, etc.
File system 206 may be an organization system for logically and physically organizing data present at the data storage 208. In various non-limiting embodiments, the file system 206 may be a native file system included with the operating system 204, described below, or a third party file system. The file system 206 may organize data units into data files, and manage the location of data files in data storage 208. Each data file may include one or more data units. The file system 206 may be, for example, specific to a computer device 102, 104, 106 or to particular drives making up data storage 208. In various embodiments, a single file system 206 may manage associations between data files and physical locations for data storage 208 located across the computer system 100. The file system 206 may be any suitable file system including, as non-limiting examples, File Allocation Table 16 (FAT16), File Allocation Table 32 (FAT32), NTFS, High Performance File System (HPFS), UNIX file system (UFS), XFS, journaled file system (JFS), Universal Data Format File System (UDFS), CD-ROM File System (CDFS), Enhanced File System (EFS), SGI XFS, Clustered XFS (CXFS), HFS, VxFS, Raw File System (RawFS), Local File System (DCE/LFS), etc.
Interaction between the application 202 and the data storage 208 may be facilitated by the operating system 204. The operating system 204 may be any suitable operating system. For example, in various non-limiting embodiments, the operating system 204 may be any version of MICROSOFT WINDOWS, any UNIX operating system, any Linux operating system, OS/2, any version of Mac OS, etc. Each computer device 102, 104, 106, 108 may run its own instance of an operating system 204. The devices 102, 104, 106 of the computer system 100 may in various embodiments run the same type of operating system 204 or different types. The operating system 204 may provide services to the application 202 that facilitate the application's 202 functions. For example, the operating system 204 may allow the application 202 to access and manipulate data units stored at data storage 208. The operating system 204 may service read or write requests from the application 202, for example, by accessing local or remote data storage 208 through the file system 208.
It will be appreciated that the access rights may be expressed in various suitable ways. The particular expression may depend on the set-up of the computer system 100 and architecture 200. For example, in various embodiments, the access rights may include a generalized access setting for the application 202. The generalized access setting may define a level of access to the resources of the system 100 and/or the architecture 200. In various embodiments, the generalized access level may be predefined by the operating system 204, or other component of the system 100 or architecture 200. Existing operating systems often define generalized access settings, (e.g., administrator, power user, user, etc.), with each access setting corresponding to a predetermined level of access to resources. For example, an application or user having administrative access may have read and write access to all resources, while applications or users having other generalized access levels may have less access.
Also, in various embodiments, the access rights may allow the application 202 to use encryption keys 214 necessary to access desired resources. The resources may be encrypted according to any suitable encryption method (e.g., block substitution methods, dual-key encryption algorithms, etc.). In various embodiments, different resources or sets of resources may be encrypted by different encryptions keys or sets thereof. The access rights may allow the application 202 to access the encryption key or keys that are necessary to decrypt the resources that the application 202 is entitled to access. In various embodiments, the encryption keys may be stored at data storage 208, for example, at an encryption key database 214, or at a peripheral device 108, such as a USB dongle. The access rights may include security log-in and/or authentication data (e.g., a digital certificate), that allows the application to access the encryption key server and/or database 214 to retrieve the appropriate encryption key or keys. In various embodiments, the access rights associated with the application 202 may include the appropriate encryption key or keys. For example, the access rights and/or the appropriate encryption key or keys may be stored as a stream or attribute of the application resource 210, as discussed in more detail below.
At step 304, the access rights determined at step 302 may be encoded, or reduced to a data unit that can be associated with the application 202. It will be appreciated that the data unit may be expressed in any suitable format including, for example, a binary format, a Security Descriptor Definition Language (SDDL) script, an Extensible Markup Language (XML) script, etc.
The access rights may be associated with the application 202 at step 306. In various embodiments, the access rights may be associated with the application 202 by associating the data unit representing the access rights with an application resource 210. The application resource 210 may be, for example, an executable image, a dynamically linked library (DLL), a script or other data unit associated with the application 202. The access rights may be associated with the application resource 210 according to any suitable method. For example, the access rights may be incorporated into the file including the application resource 210 such as a stream or attribute. In various embodiments, the access rights may be placed into a separate file 602, as shown by
In various embodiments, the access rights may be associated with the application resource 210 by placing a data unit representing the access rights into a stream or sub-file of the file including the application resource 210. In a MICROSOFT WINDOWS environment, this concept may be called a “file system filter driver;” in a UNIX/Linux environment, it may be called a “layered” or “stackable” file system; and in MICROSOFT DISK OPERATING SYSTEM (MS-DOS), it may be called an INT21 or INT13 driver.
Also, in various embodiments, the access rights may be included as an extended attribute of the application resource file 210. Support for extended attributes may be implemented in any suitable way, with extended attribute data stored within or outside of the application resource file 210. For example, the OS/2 operating system allows support for extended attributes in the FAT file system by storing extended attribute data in a hidden file in the root directory of a folder or drive. Each file having extended attributes is then modified to include a pointer to the location in the hidden file including its extended attribute data. In various embodiments, the access rights may be otherwise stored as an external file 602, shown in
At step 310, the application resource 210 and access rights may be digitally signed together. In this way, the access rights may be secured, as modifying the access rights after signing will destroy the validity of the digital signature. In various embodiments where the access rights are included in the same file as the application resource 210, the digital signing may involve digitally signing the application resource file 210. In embodiments where the access rights are stored in a separate file, then both the application resource file 210 and the access rights file 602 may be digitally signed together. The operating system 204 or other architecture component (e.g., security driver 802 discussed below) may verify the digital signature to determine whether the access rights have been modified, inadvertently or maliciously, to change the access level of the application 202.
The application resource 210 and access rights may be digitally signed according to any known method or configuration. For example, in various embodiments, the component 210 and access rights may be signed, and later verified, by authorized entities within the computer system 100. Each authorized entity may have an associated digital certificate. The digital certificates of authorized entities may be kept at a central location or certificate store. In various embodiments, security may be enhanced by placing the certificate store on a peripheral device 108, such as, for example, a USB dongle.
At 706, the access rights associated with the application resource 210 may be extracted. For example, in embodiments where the access rights are stored in a stream 404, 504, the stream may be read and the data unit including the access rights extracted. In embodiments where the access rights are stored in a separate file associated with the application resource 210, the separate file may be located and read. The digital signature of the application resource 210 and access rights may be verified at step 708. Verifying the digital signature may involve comparing the application resource 210 and access rights, as signed, to some indicator (e.g., a digital certificate, public key, etc.) of all of the authorized entities permitted to sign the data units. If the verification of the application resource 210 and the access rights fails, it may indicate that the access rights have been corrupted. In this case, the application may not be granted access to at least some resources.
At step 710, the application 202 may make a request to access resources. The request may be a read request, where the application 202 asks to view data, and/or a write request where the application 202 asks to modify data. At step 711, it may be determined whether the access rights indicate that the application 202 is entitled to access the requested resources. For example, in embodiments where the resources are encrypted, it may be determined if the appropriate encryption key and/or authorization to access the appropriate encryption key is included in the access rights. In embodiments where the access rights include a privilege setting for the application 202, it may be determined whether the privilege setting allows the level of access requested. If the application 202 is not entitled to the level of access requested, then the access request may be denied at step 712. In various embodiments, where the resources are encrypted, if the access rights do not entitle the application 202 to access the appropriate encryption key, the requested resource may be delivered to the application 202 anyway, albeit in encrypted and therefore unusable form. If the application 202 is entitled to the level of access requested, then the requested resource may be forwarded to the application 202 and/or edited as requested at step 714.
In various embodiments, the functionality necessary to implement process flows 300 and 700 may be inherent in the operating system 204. It will be appreciated, however, that the methods of process flows 300 and 700 may be implemented on operating systems 204 lacking such functionality by utilizing one or more security drivers, such as security driver 802, shown in
Also, in various embodiments, the security driver 802 may facilitate the associating of an access rights with application resource 210. For example, in embodiments where the access rights are stored as a separate file 602, the security driver 802 may store the access rights file 602 at the appropriate location and retrieve it when necessary. The security driver 802 may also facilitate the digital signing and subsequent verification of the access rights. For example, the security driver 802 may direct the access rights and application resource 210 to an authorized entity for signature. In various embodiments, the security driver 802 may be an authorized entity. The security driver 802 may also have the ability to verify a digital signature previously applied to an access rights and application resource 210. The security driver 208 may also facilitate access rights or privileges while the application 202 is running. For example, the security driver 208 may intercept read requests and write requests from the application 202. The security driver 208 may then determine whether the application is authorized to make the requests and grant them (e.g., by passing them along to the data storage 208 or operating system 204, by providing the application 202 with a key, etc.), only when an application's 202 access rights indicate that it is entitled to the requested access, for example, as shown in process flow 700.
As used herein, the term “data unit” refers to a group of related data. As used herein, the term “data file” refers to an organizational unit of data. For example, a data file may include one or more data units. In various non-limiting embodiments, a data file may be an application data file, a database record or a file containing some or all of an executable image, such as an application program, code library, device driver, operating system image file, etc. As used herein, the terms “sub-file” and “stream” refer to an organizational unit of data organized within a data file. For example, a stream may include one or more data units.
It is to be understood that the figures and descriptions of the present invention have been simplified to illustrate elements that are relevant for a clear understanding of the present invention, while eliminating other elements, for purposes of clarity. Those of ordinary skill in the art will recognize that these and other elements may be desirable. However, because such elements are well known in the art and because they do not facilitate a better understanding of the present invention, a discussion of such elements is not provided herein.
As used herein, a “computer,” “computer system,” and the like, may be, for example and without limitation, either alone or in combination, a personal computer (PC), server-based computer, main frame, server, microcomputer, minicomputer, laptop, personal data assistant (PDA), cellular phone, pager, processor, including wireless and/or wireline varieties thereof, and/or any other computerized device capable of configuration for processing data for standalone application and/or over a networked medium or media. Computers and computer systems disclosed herein may include operatively associated memory for storing certain software applications used in obtaining, processing, storing and/or communicating data. It can be appreciated that such memory can be internal, external, remote or local with respect to its operatively associated computer or computer system. Memory may also include any means for storing software or other instructions including, for example and without limitation, a hard disk, an optical disk, floppy disk, ROM (read only memory), RAM (random access memory), PROM (programmable ROM), EEPROM (extended erasable PROM), and/or other like computer-readable media.
The described systems may include various modules and/or components implemented as software code to be executed by a processor(s) of the systems or any other computer system using any type of suitable computer instruction type. The software code may be stored as a series of instructions or commands on a computer readable medium. The term “computer-readable medium” as used herein may include, for example, magnetic and optical memory devices such as diskettes, compact discs of both read-only and writeable varieties, optical disk drives, and hard disk drives. A computer-readable medium may also include memory storage that can be physical, virtual, permanent, temporary, semi-permanent and/or semi-temporary. A computer-readable medium may further include one or more data signals transmitted on one or more carrier waves.
While several embodiments of the invention have been described, it should be apparent that various modifications, alterations and adaptations to those embodiments may occur to persons skilled in the art with the attainment of some or all of the advantages of the present invention. It is therefore intended to cover all such modifications, alterations and adaptations without departing from the scope and spirit of the present invention.
Number | Name | Date | Kind |
---|---|---|---|
4135240 | Ritchie | Jan 1979 | A |
4959811 | Szczepanek | Sep 1990 | A |
4984153 | Kregness et al. | Jan 1991 | A |
5027395 | Anderson et al. | Jun 1991 | A |
5488701 | Brady et al. | Jan 1996 | A |
5506983 | Atkinson et al. | Apr 1996 | A |
5530850 | Ford et al. | Jun 1996 | A |
5537588 | Engelmann et al. | Jul 1996 | A |
5551003 | Mattson et al. | Aug 1996 | A |
5574898 | Leblang et al. | Nov 1996 | A |
5606983 | Monty et al. | Mar 1997 | A |
5652879 | Harris et al. | Jul 1997 | A |
5664178 | Sinofsky | Sep 1997 | A |
5706504 | Atkinson et al. | Jan 1998 | A |
5715441 | Atkinson et al. | Feb 1998 | A |
5734861 | Cohn et al. | Mar 1998 | A |
5752252 | Zbikowski et al. | May 1998 | A |
5757915 | Aucsmith et al. | May 1998 | A |
5764880 | Gerdt et al. | Jun 1998 | A |
5781797 | Crick et al. | Jul 1998 | A |
5799324 | McNutt et al. | Aug 1998 | A |
5802344 | Menon et al. | Sep 1998 | A |
5815707 | Krause et al. | Sep 1998 | A |
5832515 | Ledain et al. | Nov 1998 | A |
5857207 | Lo et al. | Jan 1999 | A |
5873097 | Harris et al. | Feb 1999 | A |
5923878 | Marsland | Jul 1999 | A |
5991893 | Snider | Nov 1999 | A |
5996054 | Ledain et al. | Nov 1999 | A |
6006227 | Freeman et al. | Dec 1999 | A |
6021408 | Ledain et al. | Feb 2000 | A |
6021509 | Gerdt et al. | Feb 2000 | A |
6038668 | Chipman et al. | Mar 2000 | A |
6065100 | Schafer et al. | May 2000 | A |
6079047 | Cotugno et al. | Jun 2000 | A |
6101186 | Craig | Aug 2000 | A |
6108420 | Larose et al. | Aug 2000 | A |
6128630 | Shackelford | Oct 2000 | A |
6148368 | DeKoning | Nov 2000 | A |
6240527 | Schneider et al. | May 2001 | B1 |
6260036 | Almasi et al. | Jul 2001 | B1 |
6321239 | Shackelford | Nov 2001 | B1 |
6336164 | Gerdt et al. | Jan 2002 | B1 |
6347397 | Curtis | Feb 2002 | B1 |
6366987 | Tzelnic et al. | Apr 2002 | B1 |
6367008 | Rollins | Apr 2002 | B1 |
6377958 | Orcutt | Apr 2002 | B1 |
6381682 | Noel et al. | Apr 2002 | B2 |
6418509 | Yanai et al. | Jul 2002 | B1 |
6430548 | Deis et al. | Aug 2002 | B1 |
6438594 | Bowman-Amuah | Aug 2002 | B1 |
6449688 | Peters et al. | Sep 2002 | B1 |
6490664 | Jones et al. | Dec 2002 | B1 |
6526570 | Click, Jr. et al. | Feb 2003 | B1 |
6529909 | Bowman-Amuah | Mar 2003 | B1 |
6535949 | Parker | Mar 2003 | B1 |
6577254 | Rasmussen | Jun 2003 | B2 |
6597812 | Fallon et al. | Jul 2003 | B1 |
6601104 | Fallon | Jul 2003 | B1 |
6604158 | Fallon | Aug 2003 | B1 |
6624761 | Fallon | Sep 2003 | B2 |
6625671 | Collette et al. | Sep 2003 | B1 |
6628411 | Miller et al. | Sep 2003 | B2 |
6633244 | Avery et al. | Oct 2003 | B2 |
6633883 | Koskas | Oct 2003 | B2 |
6643405 | Sako | Nov 2003 | B1 |
6643652 | Helgeson et al. | Nov 2003 | B2 |
6654851 | McKean | Nov 2003 | B1 |
6657565 | Kampf | Dec 2003 | B2 |
6664903 | Kugai | Dec 2003 | B2 |
6704839 | Butterworth et al. | Mar 2004 | B2 |
6711709 | York | Mar 2004 | B1 |
6732125 | Autrey et al. | May 2004 | B1 |
6738863 | Butterworth et al. | May 2004 | B2 |
6741747 | Burns et al. | May 2004 | B1 |
6775781 | Phillips et al. | Aug 2004 | B1 |
6782319 | McDonough | Aug 2004 | B1 |
6785768 | Peters et al. | Aug 2004 | B2 |
6795640 | Honda | Sep 2004 | B1 |
6795897 | Benveniste et al. | Sep 2004 | B2 |
6847681 | Saunders et al. | Jan 2005 | B2 |
6856993 | Verma et al. | Feb 2005 | B1 |
6901403 | Bata et al. | May 2005 | B1 |
6944619 | Gruenwald | Sep 2005 | B2 |
6947556 | Matyas, Jr. et al. | Sep 2005 | B1 |
6983456 | Poznanovic et al. | Jan 2006 | B2 |
7051031 | Schein | May 2006 | B2 |
7085766 | Keith, Jr. | Aug 2006 | B2 |
7100047 | Stamons et al. | Aug 2006 | B2 |
7107267 | Taylor | Sep 2006 | B2 |
7146009 | Andivahis et al. | Dec 2006 | B2 |
7191189 | Bhatti | Mar 2007 | B2 |
7340581 | Gorobets et al. | Mar 2008 | B2 |
7392383 | Basibes et al. | Jun 2008 | B2 |
7444625 | Anwar et al. | Oct 2008 | B2 |
7487363 | Alve et al. | Feb 2009 | B2 |
7502713 | Hillier et al. | Mar 2009 | B2 |
7523221 | Hillberg | Apr 2009 | B2 |
7530016 | Sahota et al. | May 2009 | B2 |
7536418 | Buchsbaum et al. | May 2009 | B2 |
7546221 | Moon et al. | Jun 2009 | B2 |
7549174 | Falkner et al. | Jun 2009 | B1 |
7702995 | Sahota et al. | Apr 2010 | B2 |
7802082 | Kruse et al. | Sep 2010 | B2 |
7930756 | Crocker et al. | Apr 2011 | B1 |
7949693 | Manson et al. | May 2011 | B1 |
20020007456 | Peinado et al. | Jan 2002 | A1 |
20020052868 | Mohindra et al. | May 2002 | A1 |
20020073066 | Coutts et al. | Jun 2002 | A1 |
20020143735 | Ayi et al. | Oct 2002 | A1 |
20030110478 | Duesterwald et al. | Jun 2003 | A1 |
20030123446 | Muirhead et al. | Jul 2003 | A1 |
20030131251 | Fetkovich | Jul 2003 | A1 |
20040015958 | Veil et al. | Jan 2004 | A1 |
20040103202 | Hildebrand et al. | May 2004 | A1 |
20040167916 | Basso et al. | Aug 2004 | A1 |
20040181772 | Pensak et al. | Sep 2004 | A1 |
20040186920 | Birdwell et al. | Sep 2004 | A1 |
20040250247 | Deeths et al. | Dec 2004 | A1 |
20050144189 | Edwards et al. | Jun 2005 | A1 |
20050240966 | Hindle et al. | Oct 2005 | A1 |
20050256878 | Brown et al. | Nov 2005 | A1 |
20060031246 | Grayson | Feb 2006 | A1 |
20060070076 | Ma | Mar 2006 | A1 |
20060101025 | Tichy et al. | May 2006 | A1 |
20060123250 | Maheshwari et al. | Jun 2006 | A1 |
20060190417 | Hilkemeyer et al. | Aug 2006 | A1 |
20060195476 | Nori et al. | Aug 2006 | A1 |
20060277153 | Mason et al. | Dec 2006 | A1 |
20070277234 | Bessonov et al. | Nov 2007 | A1 |
20080134154 | Patel et al. | Jun 2008 | A1 |
20090249277 | Prakash | Oct 2009 | A1 |
Number | Date | Country |
---|---|---|
1320010 | Jun 2003 | EP |
WO 2006081508 | Aug 2006 | WO |
Entry |
---|
Notice of Allowability issued on Dec. 17, 2008 in U.S. Appl. No. 11/505,582. |
Office Action issued on Mar. 19, 2008 in U.S. Appl. No. 11/145,433. |
Office Action (Interview Summary) issued on May 23, 2008 in U.S. Appl. No. 11/145,433. |
Office Action issued on Sep. 16, 2008 in U.S. Appl. No. 11/145,433. |
Office Action issued on Sep. 8, 2008 in U.S. Appl. No. 11/505,582. |
U.S. Appl. No. 11/505,582, filed Aug. 17, 2006. |
U.S. Appl. No. 11/789,147, filed Apr. 24, 2007. |
U.S. Appl. No. 11/844,102, filed Aug. 23, 2007. |
Office Action issued on Jul. 20, 2007 in U.S. Appl. No. 11/145,433. |
Office Action (Interview Summary) issued on Nov. 14, 2007 in U.S. Appl. No. 11/145,433. |
Response to Nov. 14, 2007 Office Action (Interview Summary) filed Dec. 4, 2007 in U.S. Appl. No. 11/145,433. |
Burrows et al., “On-line Data Compression in a Log-structured File System,” proceedings of the Fifth International Conference on Architectural Support for Programming Languages and Operating Systems, Oct. 12-15, 1992, ACM Press, pp. 1-21. |
Rosenblum, Mendel and John K. Ousterhout, “The Design and Implementation of a Log-Structured File System,” ACM Transactions on Computer Systems, vol. 10, No. 1, Feb. 1992; pp. 26-52. |
“Windows Streams—An Introduction to File System Streams,” printed from http://www.osronline.com, The NT Insider, vol. 13, Issue 2, Mar.-Apr. 2006, Apr. 17, 2006, 6 pages. |
“Sponsor Sessions,” printed from http://microsoft.com/whdc/driverdevcon/ddctracks2005/d05—sponsors.mspx, updated Mar. 25, 2005, printed Apr. 25, 2006, 2 pages. |
“Windows Driver Devcon 2005; Practical Challenges in Implementing Encryption/Compression Filters,” Microsoft Windows Hardware & Driver Central, Microsoft Corporation, 2005, 21 pages. |
Mac OS X ABI Mach-O File Format Reference, Oct. 3, 2006, 62 pages. |
Office Action issued on Feb. 23, 2009 in U.S. Appl. No. 11/145,433. |
Office Action issued on Aug. 3, 2009 in U.S. Appl. No. 11/145,433. |
Office Action issued on Dec. 15, 2009 in U.S. Appl. No. 12/388,712. |
Office Action (Interview Summary) issued on Feb. 1, 2010 in U.S. Appl. No. 11/145,433. |
Office Action issued on Mar. 30, 2010 in U.S. Appl. No. 11/789,147. |
Office Action issued on Mar. 2, 2010 in U.S. Appl. No. 11/844,102. |
U.S. Appl. No. 12/388,712, filed Feb. 19, 2009. |
Duncan, Geoff, “Man Buys Used iPod with U.S. Troop Data”, Jan. 27, 2009, printed from http://digitaltrends.com/internatiorial/man-buys-used-ipod-with-us-troop-data/ (1 page). |
Examiner's Answer issued on Jul. 7, 2010 in U.S. Appl. No. 11/145,433. |
Office Action (Interview Summary) issued on Apr. 8, 2009 in U.S. Appl. No. 11/145,433. |
Decision on Appeal issued on Jan. 29, 2013 in U.S. Appl. No. 11/145,433. |
Oral Hearing Held Jan. 17, 2013 issued on Feb. 20, 2013 in U.S. Appl. No. 11/145,433. |
Office Action issued on Feb. 3, 2011 in U.S. Appl. No. 11/789,147. |
Notice of Allowance mailed May 26, 2011 in U.S. Appl. No. 11/789,147. |
Notice of Allowance mailed Sep. 16, 2010 in U.S. Appl. No. 11/844,102. |
Notice of Allowance mailed Jan. 20, 2011 in U.S. Appl. No. 11/844,102. |
Notice of Abandonment under 37 CFR 1.53(f) or (g) mailed Oct. 11, 2011 in U.S. Appl. No. 12/985,923. |
Office Action issued on May 20, 2010 in U.S. Appl. No. 12/388,712. |
Notice of Allowance mailed Jul. 1, 2010 in U.S. Appl. No. 12/388,712. |