Computer system and method for secure installation and operation of software
First Claim
1. A method for secure installation and operation of software, said method comprising:
- employing a New Technology File Structure logical volume;
employing an installer;
writing a Primary Data Stream file to said New Technology File Structure logical volume from said installer;
associating data with said Primary Data Stream file;
writing said associated data to said New Technology File Structure logical volume as an Alternate Data Stream file from said installer;
creating a Primary Data Stream directory chain;
writing said Primary Data Stream directory chain to said New Technology File Structure logical volume from said installer;
writing said Primary Data Stream file to said Primary Data Stream directory chain in said New Technology File Structure logical volume from said installer;
associating said data with said Primary Data Stream directory chain or said Primary Data Stream file by creating and closing said Alternate Data Stream file; and
installing said associated data to said New Technology File Structure logical volume as said Alternate Data Stream file from said installer.
4 Assignments
0 Petitions
Accused Products
Abstract
A computer system provides for the secure installation and operation of software. The computer system includes a platform, such as a personal computer, having a processor and the Microsoft® Windows® operating system. The computer system also includes a first drive, such as a network, DVD or CD-ROM drive, adapted for access by the processor, and a second drive, such as a hard disk, adapted for access by the processor. The second drive includes an NT File Structure logical volume. The computer system further includes an installer operatively associated with the first drive. The installer cooperates with the processor to write a Primary Data Stream file to the NT File Structure logical volume, to associate data with the Primary Data Stream file, and to write the associated data to the NT File Structure logical volume as an Alternate Data Stream file.
-
Citations
19 Claims
-
1. A method for secure installation and operation of software, said method comprising:
-
employing a New Technology File Structure logical volume; employing an installer; writing a Primary Data Stream file to said New Technology File Structure logical volume from said installer; associating data with said Primary Data Stream file; writing said associated data to said New Technology File Structure logical volume as an Alternate Data Stream file from said installer; creating a Primary Data Stream directory chain; writing said Primary Data Stream directory chain to said New Technology File Structure logical volume from said installer; writing said Primary Data Stream file to said Primary Data Stream directory chain in said New Technology File Structure logical volume from said installer; associating said data with said Primary Data Stream directory chain or said Primary Data Stream file by creating and closing said Alternate Data Stream file; and installing said associated data to said New Technology File Structure logical volume as said Alternate Data Stream file from said installer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer system for secure installation and operation of software, said computer system comprising:
-
a processor; a first drive adapted for access by said processor; a second drive adapted for access by said processor, said second drive including a New Technology File Structure logical volume; and an installer operatively associated with said first drive, said installer cooperating with said processor to write a Primary Data Stream file to said New Technology File Structure logical volume, associate data with said Primary Data Stream file, and write said associated data to said New Technology File Structure logical volume as an Alternate Data Stream file; and wherein said installer cooperates with said processor to create a Primary Data Stream directory chain, to write said Primary Data Stream directory chain to said New Technology File Structure logical volume, to write said Primary Data Stream file to said Primary Data Stream directory chain in said New Technology File Structure logical volume, to associate said data with said Primary Data Stream directory chain or said Primary Data Stream file, and to install said associated data to said New Technology File Structure logical volume as said Alternate Data Stream file. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for secure installation and operation of software, said method comprising:
-
employing a computer-readable medium including a New Technology File Structure logical volume; employing an installer; writing a Primary Data Stream file to said New Technology File Structure logical volume of said computer-readable medium from said installer; associating data with said Primary Data Stream file; and writing said associated data to said New Technology File Structure logical volume of said computer-readable medium as an Alternate Data Stream file from said installer; creating a Primary Data Stream directory chain; writing said Primary Data Stream directory chain to said New Technology File Structure logical volume from said installer; writing said Primary Data Stream file to said Primary Data Stream directory chain in said New Technology File Structure logical volume from said installer; associating said data with said Primary Data Stream directory chain or said Primary Data Stream file by creating and closing said Alternate Data Stream file; and installing said associated data to said New Technology File Structure logical volume as said Alternate Data Stream file from said installer.
-
Specification