throbber
000001
`
`Symantec 1002
`IPR of U.S. Pat. No. 7,757,298
`
`

`
`U.S. Patent
`
`Dec. 8, 1998
`
`Sheet 1 0f5
`
`5,848,418
`
`FIG. 1
`
`7&7
`
`12
`
`14
`
`
`
`1 1
`
`18
`
`
`
`15
`
`__
`|__|
`
`20
`
`1 1
`
`IE
`
`
`
`8E -
`
`--I
`
`22
`
`24
`
`26
`
`28
`
`FIG, 6
`
`600
`
`/
`
`TFi|eProperties = record
`Size: Longlnt; ———-""502
`Date_Time: TDateTime;/ 504
`Mode: string;
`505
`
`Co|or_Code: TCo|or;
`608
`
`Fi|e_Name: string;
`610
`Fiie_Signature: string——611
`Fi|e_Suffix: string;
`612
`Reason: string;——514
`
`Rea|_Type: integer;
`515
`C|aimed_Type: integersmg
`Resu|t_Type: integer? 520
`
`type
`
`end;
`
`OOOOO2
`
`000002
`
`

`
`U.S. Patent
`
`Dec. 8, 1998
`
`Sheet 2 0f5
`
`5,848,418
`
`300
`
`FIG. 2
`
`START
`
`202
`
`FOR EACH DISK
`
`FOR EACH FILE
`
`CHECK FILES
`
`GRAPHICS
`
`FILE?
`
`HANDLE GRAPHICS
`
`HANDLE TEXT
`
`END
`
`000003
`
`000003
`
`

`
`U.S. Patent
`
`Dec. 8, 1998
`
`Sheet 3 0f5
`
`5,848,418
`
`FIG. 3
`
`300
`
`9
`
`302
`
`
`
`
`
`CHECK TO SEE IF WE KNOW WHAT TYPE OF FILE
`THIS IS BY CHECKING THE FILE SIGNATURE. IS IT
`AN EXE, LIB, OR GRAPHICS FILE THAT THE
`LIBRARY HAS A PROBLEM WITH?
`
`
`
`
`
`SIGNATURE
`STILL UNKNOWN?
`
`YES
`
`304
`
`NO
`
`303
`
`RUN THE FILENAME THROUGH
`THE GRAPHICS FILE INFO CODE
`
`
`
`306
`
`SET REAL TYPE TO
`NOT GRAPHICS
`
`316
`
`COMPARE THE SUFFIX (CLAIMED TYPE)
`TO THE CURRENT REAL TYPE?
`
`SUFFIX (CLAIMED TYPE)
`I = REAL TYPE
`
`318
`
`NO
`
`320
`
`
`
`SET CLAIM TYPE
`
`TO BE UNKNOWN
`
`SET CLAIM TYPE
`
`OOOOO4
`
`000004
`
`

`
`U.S. Patent
`
`Dec. 8, 1998
`
`Sheet 4 0f5
`
`5,848,418
`
`FIG. 4
`
`1/00
`
`
`
`SUFFIX
`CLAIM = REAL?
`
`404
`
`CLAIM = NOT
`GRAPHICS
`
`YES
`
`
`
`
`
`
`
`CODE = BLUE
`
`CODE = YELLOW
`
`ADD RECORD T0
`
`SCREEN
`
`OOOOO5
`
`
`
`CODE = YELLOW
`
`CODE = RED
`
`000005
`
`

`
`U.S. Patent
`
`Dec. 8, 1998
`
`Sheet 5 0f5
`
`5,848,418
`
`FIG. 5
`
`9
`
`500
`
`/
`
`502
`
`504
`
`50
`
`6
`
`
`
`
`
`
`
`READ EITHER:
`
`2048 BYTES
`
`8192 BYTES
`
`THE ENTIRE FILE
`
`CLOSE THE FILE
`
`508
`
`FOR EACH WORD IN THE DICTIONARY AND
`
`THE WORD IS NOT IN THE CURRENT BUFFER
`
`
`
`WORD IN
`
`DICTIONARY?
`
`SET FLAG THAT WE FOUND THE WORD
`
`514
`
`WAS WORD
`FOUND?
`
`NO
`
`ADD WORD TO LIST
`
`518
`
`RETURN STATUS OF FOUND WORD
`
`0
`
`000006
`
`000006
`
`

`
`5,848,418
`
`1
`ELECTRONIC FILE ANALYZER AND
`SELECTOR
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`
`The present invention relates to an apparatus and method
`for reviewing electronic documents. More particularly, the
`present invention relates to an apparatus and method for
`locating and analyzing electronic documents that contain
`graphic images or objectionable language and presenting a
`list of such files to a user for review and destruction or some
`other action.
`
`2. Description of the Related Art
`The widespread use of personal computers (PC’s),
`coupled with easy access to computer networks such as the
`Internet and electronic bulletin board systems (BBS’s), has
`provided unprecedented access to adult subject matter for
`children. This adult subject matter consists of pornographic
`literature and photographs, descriptions of violent activities,
`and potential illegal activities, not to mention the use of
`offensive language. This material can be stored in electronic
`files that are easily copied from one computer system to
`another. The electronic files can contain graphic images
`(graphics type files) and text information (text type files).
`Some text documents, such as those written on word
`processors, can contain both text, graphic images, and audio
`clips.
`There are software products available to prevent children
`from accessing portions of the Internet known to contain
`offensive material. Software products such as Net Nanny or
`other channel blockers and screeners, perform a guardian
`function by restricting children from accessing certain areas
`of the Internet known to harbor adult subject matter.
`Unfortunately, not all adult subject matter is limited to the
`Internet. The subject matter is also available on many
`electronic bulletin boards. In addition, children can gain
`access to adult subject matter by using their friend’s PC’s
`that are not equipped with Net Nanny or similar software
`protections. Once downloaded to their friend’s PC,
`the
`offensive material can be copied onto floppy disks and
`transferred to the home PC,
`thereby circumventing Net
`Nanny. Aside from the problems with children, many cor-
`porations also have a similar unfilled need to find files with
`language that may expose the company to lawsuits for
`sexual harassment or illegal activity. There is, therefore, a
`need for an apparatus and method that identifies those files
`containing pre-selected objectionable subject matter on a PC
`or network system. It is an object of the present invention to
`remedy the problems inherent in the related art.
`
`SUMMARY OF THE INVENTION
`
`The present invention overcomes the disadvantages and
`limitations of the related art by providing an apparatus and
`method for finding objectionable material contained within
`electronic files, either on a PC or on a network.
`is
`The apparatus consists of a computer system that
`provided with a microprocessor (or computer), a video
`display, a buffer memory, and at least one electronic file
`storage device capable of storing electronic files. Each of the
`electronic files is stored according to an operating system
`which incorporates a file name, a file name suffix, a mode,
`a time-stamp, and a file size. The method includes provisions
`for a real type property, a claimed type property, and a result
`type property for each electronic file. All of the electronic
`files are located on each of the storage devices.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`The method of the present invention checks each file to
`determine the file’s real type property. This is accomplished
`by reading all or a portion of the file to determine the file’s
`signature. If the file signature is present, then it is compared
`to a library of known file signatures. If the file signature
`found is not among the library of known signatures, then the
`file is sent through a graphics filter to determine if the file is
`a graphics type of file or an audio clip, otherwise, the real
`property is set to unknown. Next, the file name suffix is
`checked against a library of file suffixes. If the file’s suffix
`is among the list of suffixes, the claimed property is set to
`that suffix type. Otherwise,
`the claimed type is set
`to
`unknown. Graphics files and audio clips are automatically
`designated as questionable, prompting review by the user.
`Graphics files can include video and or movies. Text files
`have additional processing, including searches for words or
`terms related to topics that are inappropriate or potentially
`dangerous for certain users such as children. The checking
`process also looks for files that are disguised, such as a file
`with an executable suffix (.exe) which in reality is a graphics
`file that should have had a graphics suffix (like .gif). Finally,
`the checking process also looks for files that are hidden so
`that they are not listed in response to a directory command.
`A listing of all suspicious, questionable, or graphics files
`are presented to the user. Reasons as to why the file was
`flagged are also presented. Once all of the flagged files are
`listed, the user is free to review or destroy the identified files.
`
`DESCRIPTION OF THE DRAWINGS
`
`For a more complete understanding of the present inven-
`tion and the advantages thereof, reference should be made to
`the following Detailed Description taken in connection with
`the accompanying drawings in which:
`FIG. 1 illustrates a computer system with which the
`preferred embodiment of the present invention is imple-
`mented;
`FIG. 2 is a flowchart diagram of the overall process that
`is the preferred embodiment of the present invention for
`finding objectionable material in electronic files;
`FIG. 3 is a flowchart diagram of a portion of the preferred
`embodiment of the present invention for finding objection-
`able material in electronic files;
`FIG. 4 is a flowchart diagram of a portion of the preferred
`embodiment of the present invention for finding objection-
`able material in electronic files;
`FIG. 5 is a flowchart diagram of a portion of the preferred
`embodiment of the present invention for finding objection-
`able material in electronic files; and
`FIG. 6 is example computer code of a record that contains
`information about an electronic file that is utilized by an
`alternate embodiment of the present invention.
`
`DESCRIPTION OF THE PREFERRED
`EMBODIMENTS
`
`The apparatus of the preferred embodiment is shown in
`FIG. 1. The preferred apparatus is a personal computer (PC)
`in the form of a computer system 10 that has a data bus 11
`to which are connected a variety of devices, namely: micro-
`processor (computer) 14, display monitor 12, modem 16,
`mouse 18, keyboard 20, floppy disk drives 22 and 24, one or
`more hard disk drives 26, and CD-ROM drive 28. The bus
`11 contains a set of data lines, a set of address lines and a set
`of control lines. These various lines are used to transfer data
`
`from one device to another. For example, data in the form of
`an electronic file can be read from hard disk drive 26 and
`
`000007
`
`000007
`
`

`
`5,848,418
`
`4
`3
`contains text only or if the file contains a graphics image or
`written to the microprocessor 14 for processing. Similarly,
`audio clip. If the file checked in step 208 is a graphics file
`output from the microprocessor 14 can be written to floppy
`or audio clip, the file will be handled in step 210. If the file
`drive 22 via the data bus 11. Additional input/output devices
`checked in step 208 contains text (as well as graphic images
`may be attached to the computer system 10,
`including
`and audit} (311135), then the the is handled in Step 212 35 3 teXt
`tablets, touch screens, light pens, joysticks, trackballs, and 5
`111e-,1t W111 be 1111f1e15tbb‘1 by these 5k111e‘1 111 the art that a11
`similar devices. Personal computer architecture and compo-
`a11‘11e/V1‘1ee e11p 111e111‘1111g 111e,V1eS and AV1 5 111ay be found
`nents are further explained in U.S. Pat. No. 5,572,207 by
`In the Eatétg t(titant.t:1r.aS a graptititf mltagefi etthflr tneepeétdettlttzil
`Harding, which is specifically incorporated herein by refer-
`or 6”? ‘°:
`C Wtt In a text
`.6’ H t e 0 0V.Vmg
`etal e
`ence for all purposes. Alternate embodiments of computer
`description, the term audio clip may be substituted for the
`.
`.
`.
`.
`system 10 may include mainframe computers, or networks 10
`term graphics image as both types of files are searched for
`,
`t
`1
`d .
`.
`.1
`.
`1
`t
`of PC s that share a common file server or other storage
`nown in
`e ar .
`lion emportalneouts y an in an simi ar or equiva en manner
`media (not Shown).
`FIG. 3 is a flowchart of a Sub_pr0CeSS for Checking
`‘The overall method 200 of finding objectionable material
`electronic files. Specifically, the steps shown in FIG. 3 are
`W1t11111 a ee111p11te1 System 10 15 S11eW11 111 F1G' 2'
`Referring t0 FIG 2, first,
`in Step 202,
`the number Of 15 encompassed by step 206 of FIG. 2. In the process of
`storage devices is determined. As described before, storage
`locating files (step 204 of FIG, 2), the size of the file, its
`deViCeS may C0r1SiSt Of floppy diSl< driVeS 22 arld 24 (if they
`time-stamp, its file name, file suffix and mode are read and
`have disks loaded) and other storage devices such hard disk
`placed into the file size property 602, the date time property
`drive 26 and CD-ROM drive 28. Alternate storage devices,
`604 the file name property 610, the file suffix property 612,
`such as random access memory (RAM), tape drives, and 20 and the mode property 606, respectively. This information is
`compressed “zip” drives may also be included in the process
`typically available via the computer system 10 operating
`of the present invention so long as they can be properly
`system. In step 302, the file’s signature is read.Although file
`C0r1r1eCted t0 and utilized by COII1p1lter system 10.
`signatures are not mandatory, it is customary within the art
`In step 204, for each storage device located in step 202, 25 to reserve a. series of bytes at the beginning of an electronic
`all of the electronic files stored on the storage device are
`file for designating the proprietary format of the file. This
`located, The process of the present invention provides a
`allows other software programs and the operating system to
`record of information for each of the electronic files found
`recognize electronic files as “belonging” to the particular
`in step 204. Example code of this record, utilizing the Object
`software program—thus the designation “signature.” The
`Pascal programming language, is shown in FIG, 6, It will be 30 file signature is normally placed in the first series of bytes in
`understood by those skilled in the art that other program-
`the file that 1S Called the “header.” Aside fr0II1 the file
`mjng languages, such as C and C++ among others, could be
`signature, additional. bytes Of a file may be read in order tO
`used equally well to program computer system
`Referring
`find graphics files hidden near the end Of text documents.
`to FIG. 6, the record 600 contains a variety of file properties.
`The file signature, if one is found, is loaded into the file
`The name of the property, and a brief description of the
`record’s file signature property 611. In step 302, the file
`property, is given in the table below:
`signature property 611 is checked against a list or library of
`
`Property
`
`Description
`
`Size 602
`Date Time 604
`
`Mode 606
`Color Code 608
`
`File Name 610
`
`File Signature 611
`
`File Suflix 612
`
`Reason 614
`
`Real Type 616
`
`Claimed Type 618
`
`Result Type 620
`
`Tie number of bytes taken up by the file on the storage device.
`Indicates the time stamp (i.e. the date and time) when the file was created or
`last modified).
`Tie mode of file storage (e.g., hidden, archive, etc.).
`Tie color code is itself a record containing integer values for the amount of
`red, yellow, and blue that are used to color an icon that is presented to the
`user. The color of the icon is used to indicate the type of file found.
`Tie name associated with the electronic file. This name is the one obtained
`directly from the operating system such as Microsoft Windows, OS2, UNIX,
`or the Macintosh OS.
`Tie file signature is typically contained within the “header” portion of the file,
`i.e., the first few bytes. Many proprietary file formats place a characteristic
`series of bytes at the beginning of a formatted file that designates the file as
`being created by the particular software program and conforming that format.
`Tie file suflix is typically the three character designation that is appended to
`File Name 610. Typical file suflixes are “.exe” for executable programs,
`“.3at” for batch files, “.doc” for word processor documents, and “.giF’ for
`graphics files.
`Tiis string variable contains an explanation of why the file was selected for
`presentation to the user.
`Tiis variable contains a code designating the actual type of file found by
`analyzing the contents of the file such as the File Signature 611.
`Tiis variable contains a code designating the claimed type of file found by
`examining the File Suflix 612.
`Tiis variable contains a code designating the presentation category for the
`fi e, i.e., this code specifies whether or not the file information will be
`presented to the user and under which category.
`
`Referring again to FIG. 2, step 206, all, or at least a 65 known file signatures. In step 304 it is determined whether
`portion of, the contents of each file is analyzed. Next, in step
`the file signature is not among the list of known file
`208,adecision is made whether or not the contents of the file
`signatures. If the answer in step 304 is no (i.e.,
`the file
`
`000008
`
`000008
`
`

`
`5,848,418
`
`5
`
`signature is among those known), then the real type property
`616 of the file is set to “not graphics” in step 306. As with
`all property settings, it will be understood by those skilled in
`the art that the actual setting can be in the form of a character
`array (or string) or a unique boolean, integer or real value
`specifically designated for that purpose. If the file signature
`is still unknown (i.e., the file signature was not among the
`library of known file signatures), then either the first 132
`8-byte characters or the entire file (whichever is less) is read
`into a buffer memory. The contents of the buffer memory are
`sent through a graphics file filter in step 308. The graphics
`file filter determines, if possible, the correct file signature of
`the file assuming the file is a graphics file. In step 310, it is
`determined whether or not the correct file signature has been
`determined in step 308. If the filter finds a known graphics
`type, then the file’s real type property 616 is set to graphics
`in step 314. Otherwise, the file’s real type property 616 is set
`to unknown in step 312.
`Referring still to FIG. 3, in step 316, the file suffix of the
`file name is read into the file suffix property 612 of the file
`properties record 600. The file suffix is typically the last
`three characters of the file name that come after the final “.”
`
`character. Typical file name suffixes include, but are not
`limited to: “.exe,” “.dll,” “.bat,” “.tif,” “.gif,” “.pcx,”
`“.bmp,” “.jpg,” “.com,” “.doc,” “.htm,” and “.wpd”. The file
`suffix is used as a handy way to differentiate between
`different files and different file formats. In step 316, the file
`suffix property 612 is compared to the real type property 616
`in order to determine if the file signature does not correlate
`to the file suffix. This determination is made in step 318. If
`the answer in step 318 is no, i.e. the file suffix property 612
`is equivalent to the real type property 616, then the claimed
`type property 618 is set equivalent to the real type property
`616 in step 320. If the answer to step 318 is yes, then the file
`suffix 612 is compared to a library or list of known file
`suffixes in step 322. The library of known suffixes contains
`an exhaustive list of suffixes as well as the file type normally
`associated with that suffix (e.g., ile type in the library of
`suffixes for the matching suffix. If, in step 324, no match was
`found in the library of suffixes,
`then the claimed type
`property 618 is set to unknown.
`Additional processing is illustrated in FIG. 4. In step 402,
`the claimed type property 618 is compared to the real type
`property 616. If the real type property 616 is not equivalent
`to the claimed type property 618 then a determination is
`made in step 404 to see whether or not the claimed type
`property 618 is set to not graphics. If the answer in step 404
`is no, then the result type property 620 is set to questionable
`and the color code property 608 is set to yellow in step 406.
`If the answer in step 404 is yes,
`i.e.,
`the claimed type
`property 618 is set to not graphics, then the result type
`property 620 is set to suspicious and the color code property
`608 is set to red.
`
`Still referring to FIG. 4, if the answer to step 402 is yes,
`i.e., the claim type property 618 is equivalent to the real type
`property 616, then a check is made to determine if the file
`is a hidden file in step 410. If the file is a hidden file then the
`result property 620 is set to questionable and the color code
`property 608 is set to yellow in step 412. Otherwise, the
`color code property 608 is set to blue and the result property
`620 is set to okay. All of the files are listed onto display 12
`and are sorted in order of severity, with the suspicious files
`listed first, the questionable files listed next, and the okay
`files listed last. For each file listed, the reason why the file
`is either suspicious or questionable is provided by setting the
`reason property 614 to one of the reasons in the following
`list:
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`“This file type cannot be identified.”;
`“This claims to be, and is a picture.”;
`“This hidden file contains a picture.”;
`“This file claims to be one thing (by its name) but is
`something else.”;
`“This file is labeled as a program but is really a picture.”;
`“This file is labeled as a picture but is really a program.”;
`“This text file contains words that match your criteria.”;
`“This picture is labeled as one type but is really another.”;
`“This file appears to contain an audio clip.”;
`“This hidden file contains an audio clip.”; and
`“This file claims to be one thing (by its name) but is an
`audio clip.”
`The handling of a text document (text file) according to
`step 212 of FIG. 2 is more fully illustrated in FIG. 5. Text
`documents, as mentioned before, can contain text, graphics
`and audio clips. In the preferred embodiment of the present
`invention, the user is presented with the option of perform-
`ing an exhaustive search of all text files in order to find any
`and all graphic images and audio clips that may be embed-
`ded within a large text document. As an alternative to the
`exhaustive search, the user, in the preferred embodiment of
`the present invention, is able to select a cursory search where
`only a portion of each text file is searched for graphic
`images, audio clips and offensive text. In the preferred
`embodiment of the present
`invention, switches are also
`provided to search or not search for the following categories
`of potentially objectionable material in text files:
`Sexually Explicit (material containing graphic descrip-
`tions of sexual
`intercourse or sexually related
`activities);
`Computer Hacking (words or terms that are likely to
`appear in material that discusses unauthorized access to
`other computers, over networks or telephone lines);
`Drugs/Substance abuse (words or terms that are likely to
`appear in material that discusses use of illicit drugs and
`other dangerous substances);
`Physically harmful (words or terms that are likely to
`appear in material that discusses actions that may be
`harmful
`to children or to others such as guns, or
`instructions on how to make explosives); and
`Potentially Illegal (words or terms that are likely to appear
`in material that discusses actions that may be against
`local, state, or federal laws).
`Referring now to FIG. 5, the text file is processed in the
`following manner. In step 502, the file is first opened for
`reading.
`In the preferred embodiment of the present
`invention, the file is opened so that other programs can open
`and share the contents of the file. In step 504, either the first
`132 8-byte characters are read, or the entire file is read into
`the buffer memory. If the file is less than 132 characters long,
`then the entire file is read. Only when a cursory search is
`requested and the file is in less than 132 characters long are
`all of the characters read. If the user has designated that an
`exhaustive search be conducted, the entire file is loaded into
`the buffer memory. Once loaded into the buffer memory, the
`file is closed in step 504 to allow processing by other
`software programs.
`Step 508 of FIG. 5 comprises a loop wherein all words
`contained in the document are compared to the words or
`terms in a text dictionary. The text dictionary is actually a
`series of dictionaries, one for each type of objectionable
`subject matter (e.g., sexually explicit, hacking, etc.). Every
`word that is contained within the buffer memory is compared
`
`000009
`
`000009
`
`

`
`5,848,418
`
`7
`to each of the words or terms in the various dictionaries. The
`user can select which dictionaries will be referred to via the
`
`switches provided for selecting or de-selecting the particular
`subject matter. If a word in the text file matches one in a
`dictionary, then the result of step 510 will be yes and a flag
`will be set
`in step 512 indicating that the file contains
`objectionable material. If the answer to step 510 is no, then
`the next word in the text file is selected for similar com-
`
`parison according to step 508.
`Once all of the words and terms in the text file have been
`
`10
`
`compared to each of the selected dictionaries according to
`step 508, then the determination in step 514 is performed. If
`the answer in step 514 was no (i.e., no objectionable words,
`graphic images, or audio clips were found) then the result
`type property 620 is set to okay. If the answer to step 514
`was yes (i.e., either objectionable words, a graphic image, or
`an audio clip were found) then the result type property 620
`is set to questionable or suspicious, depending upon the type
`of word or embedded graphic or audio clip was found.
`Once all of the files have been reviewed, a list of the
`various files are presented on the display 12 for the user’s
`review and, if necessary, destruction or some other action.
`The files are ordered by their result type property 620 and a
`color icon is displayed according to the color code property
`608 in order to aid the user in distinguishing harmful files
`from innocuous ones. In the preferred embodiment of the
`present invention, along with the file’s file name property
`610, the file size 602, the date time property 604, the mode
`606, the reason property 614, and the color code in icon form
`for the particular result type property 620 is also presented
`to the user. The user is given the option of printing the list
`of files to a standard printer (not shown).
`Of course, many modifications and adaptions to the
`present
`invention could be made to advantage without
`departing from the spirit of the invention. Further, some
`features -discussion is intended to be merely illustrative of
`the invention. Numerous alternative embodiments may be
`devised by those having ordinary skill in the art without
`departing from the spirit and scope of the following claims.
`What is claimed is:
`
`in a
`1. A process for searching objectional material
`computer system having a computer, a display, a buffer
`memory, and at
`least one electronic file storage device
`capable of storing electronic files, said electronic files hav-
`ing a file name, a file suffix, and a file signature and a record
`array having a real type property, a claimed type property,
`and a result type property for each of said electronic files,
`comprising the steps of:
`a) locating said electronic files on each of said storage
`devices,
`b) checking each of said electronic files on each of said
`storage devices to determine said real type property of
`said file,
`c) if said file checked in step b) is a graphics type file, then
`identifying said file as a graphics file,
`d) if said file checked in step b) is not a graphics type file
`then interrogating said file to determine if said file
`contains objectionable material,
`e) if said file interrogated in step d) contains objectionable
`material, then identifying said file as a text file con-
`taining objectionable material, and
`f) presenting an itemized list of said text files containing
`objectionable material and said graphics files to a user
`so that said user may select
`files for review or
`destruction,
`g) determining said file signature of said electronic file,
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`8
`
`h) comparing said file signature to a list of predetermined
`file signatures, and
`i) if said file signature is contained within said list of
`predetermined file signatures than setting said real type
`property of said file to non-graphics,
`comparing a file suffix of said file to said real type
`property of said file, and
`k) if said file suffix is equivalent to said real type property
`of said file then setting said claimed type property of
`said file to said real type property of said file,
`1) if said real type property of said file is equivalent to said
`claimed type property of said file then examining said
`file to determine if said file is a hidden file,
`
`m) if said file is a hidden file, then setting said result type
`property of said file to questionable.
`2. A process for searching for objectionable material in a
`computer system having a computer, a display, a buffer
`memory, and at
`least one electronic file storage device
`capable of storing electronic files, said electronic files hav-
`ing a file name, a file suffix, and a file signature and a record
`array having a real type property, a claimed type property,
`and a result type property for each of said electronic files,
`comprising the steps of:
`a) locating said electronic files on each of said storage
`devices,
`b) checking each of said electronic files on each of said
`storage devices to determine said real type property of
`said file,
`c) if said file checked in step b) is a graphics type file, then
`identifying said file as a graphics file,
`d) if said file checked in step b) is not a graphics type file
`then interrogating said file to determine if said file
`contains objectionable material,
`e) if said file interrogated in step d) contains objectionable
`material, then identifying said file as a text file con-
`taining objectionable material, and
`f) presenting an itemized list of said text files containing
`objectionable material and said graphics files to a user
`so that said user may select
`files for review or
`destruction,
`g) determining said file signature of said electronic file,
`h) comparing said file signature to a list of predetermined
`file signatures, and
`i) if said file signature is contained within said list of
`predetermined file signatures than setting said real type
`property of said file to non-graphics
`comparing a file suffix of said file to said real type
`property of said file, and
`k) if said file suffix is equivalent to said real type property
`of said file then setting said claimed type property of
`said file to said real type property of said file,
`1) if said real type property of said file is equivalent to said
`claimed type property of said file then examining said
`file to determine if said file is a hidden file,
`m) if said file is not a hidden file, then setting said result
`type property of said file to okay.
`in a
`3. A process for searching objectional material
`computer system having a computer, a display, a buffer
`memory, and at
`least one electronic file storage device
`capable of storing electronic files, said electronic files hav-
`ing a file name, a file suffix, and a file signature and a record
`array having a real type property, a claimed type property,
`and a result type property for each of said electronic files,
`comprising the steps of:
`
`000010
`
`000010
`
`

`
`9
`
`10
`
`5,848,418
`
`a) locating said electronic files on each of said storage
`devices,
`b) checking each of said electronic files on each of said
`storage devices to determine said real type property of
`said file,
`c) if said file checked in step b) is a graphics type file, then
`identifying said file as a graphics file,
`d) if said file checked in step b) is not a graphics type file
`then interrogating said file to determine if said file
`contains objectionable material,
`e) if said file interrogated in step d) contains objectionable
`material, then identifying said file as a text file con-
`taining objectionable material, and
`f) presenting an itemized list of said text files containing
`objectionable material and said graphics files to a user
`so that said user may select
`files for review or
`destruction,
`g) determining said file signature of said electronic file,
`h) comparing said file signature to a list of predetermined
`file signatures, and
`i) if said file signature is contained within said list of
`predetermined file signatures than setting said real type
`property of said file to non-graphics,
`comparing a file suffix of said file to said real type
`property of said file, and
`k) if said file suffix is not equivalent to said real type
`property of said file then comparing said file suffix to a
`predetermined list of file suffixes,
`1) if said file suffix is not contained within said pre-
`determined list of file suffixes then setting said claimed
`type property of said file to unknown,
`m) if said real type property of said file is equivalent to
`said claimed type property of said file then examining
`said file to determine if said file is a hidden file,
`n) if said file is a hidden file, then setting said result type
`property of said file to questionable.
`4. A process for searching for objectionable material in a
`computer system having a computer, a display, a buffer
`memory, and at
`least one electronic file storage device
`capable of storing electronic files, said electronic files hav-
`ing a file name, a file suffix, and a file signature and a record
`array having a real type property, a claimed type property,
`and a result type property for each of said electronic files,
`comprising the steps of:
`a) locating said electronic files on each of said storage
`devices,
`b) checking each of said electronic files on each of said
`storage devices to determine said real type property of
`said file,
`c) if said file checked in step b) is a graphics type file, then
`identifying said file as a graphics file,
`d) if said file checked in step b) is not a graphics type file
`then interrogating said file to determine if said file
`contains objectionable material,
`e) if said file interrogated in step d) contains objectionable
`material, then identifying said file as a text file con-
`taining objectionable material, and
`f) presenting an itemized list of said text files co

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket