×

Methods, apparatus and articles of manufacture for computer file integrity and baseline maintenance

  • US 8,266,113 B2
  • Filed: 04/01/2003
  • Issued: 09/11/2012
  • Est. Priority Date: 04/01/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of ensuring file integrity on a computer system in a networked environment that includes a plurality of computing components to be secured comprising:

  • hashing a file and obtaining a first hash code for said file;

    storing on said system a second hash code wherein said second hash code corresponds with a baseline integrity condition;

    comparing said first hash code for said file to said stored second hash code, wherein said stored second hash code securely preexists on said system, said stored second hash code being stored in a secure area;

    maintaining the integrity of the computer system by requesting a copy of said file from a server if said comparison is false by sending with said request a notification that the request seeks a replacement for the file and a hash code identifying the file, wherein the hash code identifying the file corresponds with the second hash code;

    receiving said copy of said file from said server;

    hashing said copy of said file and obtaining a third hash code for said copy of said file;

    comparing said third hash code for said copy of said file to said stored second hash code;

    and, installing said copy of said file if said second comparison is true to return said computer system to an integrity condition corresponding to a baseline wherein said second hash code corresponds with said file;

    wherein said second hash code is static for said integrity condition;

    wherein at least a plurality of computers on said network are secured by an integrity condition corresponding to said baseline; and

    wherein the method identifies the integrity condition of a plurality of computers on the network through the comparison with said second hash code to determine whether the files on said plurality of computing components to be secured are secure.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×