`
`Symantec 1002
`IPR of U.S. Pat. No. 7,757,298
`
`
`
`U.S. Patent
`
`Dec. 8, 1998
`
`Sheet 1 0f5
`
`5,848,418
`
`FIG. 1
`
`7&7
`
`12
`
`14
`
`
`
`1 1
`
`18
`
`
`
`15
`
`__
`|__|
`
`20
`
`1 1
`
`IE
`
`
`
`8E -
`
`--I
`
`22
`
`24
`
`26
`
`28
`
`FIG, 6
`
`600
`
`/
`
`TFi|eProperties = record
`Size: Longlnt; ———-""502
`Date_Time: TDateTime;/ 504
`Mode: string;
`505
`
`Co|or_Code: TCo|or;
`608
`
`Fi|e_Name: string;
`610
`Fiie_Signature: string——611
`Fi|e_Suffix: string;
`612
`Reason: string;——514
`
`Rea|_Type: integer;
`515
`C|aimed_Type: integersmg
`Resu|t_Type: integer? 520
`
`type
`
`end;
`
`OOOOO2
`
`000002
`
`
`
`U.S. Patent
`
`Dec. 8, 1998
`
`Sheet 2 0f5
`
`5,848,418
`
`300
`
`FIG. 2
`
`START
`
`202
`
`FOR EACH DISK
`
`FOR EACH FILE
`
`CHECK FILES
`
`GRAPHICS
`
`FILE?
`
`HANDLE GRAPHICS
`
`HANDLE TEXT
`
`END
`
`000003
`
`000003
`
`
`
`U.S. Patent
`
`Dec. 8, 1998
`
`Sheet 3 0f5
`
`5,848,418
`
`FIG. 3
`
`300
`
`9
`
`302
`
`
`
`
`
`CHECK TO SEE IF WE KNOW WHAT TYPE OF FILE
`THIS IS BY CHECKING THE FILE SIGNATURE. IS IT
`AN EXE, LIB, OR GRAPHICS FILE THAT THE
`LIBRARY HAS A PROBLEM WITH?
`
`
`
`
`
`SIGNATURE
`STILL UNKNOWN?
`
`YES
`
`304
`
`NO
`
`303
`
`RUN THE FILENAME THROUGH
`THE GRAPHICS FILE INFO CODE
`
`
`
`306
`
`SET REAL TYPE TO
`NOT GRAPHICS
`
`316
`
`COMPARE THE SUFFIX (CLAIMED TYPE)
`TO THE CURRENT REAL TYPE?
`
`SUFFIX (CLAIMED TYPE)
`I = REAL TYPE
`
`318
`
`NO
`
`320
`
`
`
`SET CLAIM TYPE
`
`TO BE UNKNOWN
`
`SET CLAIM TYPE
`
`OOOOO4
`
`000004
`
`
`
`U.S. Patent
`
`Dec. 8, 1998
`
`Sheet 4 0f5
`
`5,848,418
`
`FIG. 4
`
`1/00
`
`
`
`SUFFIX
`CLAIM = REAL?
`
`404
`
`CLAIM = NOT
`GRAPHICS
`
`YES
`
`
`
`
`
`
`
`CODE = BLUE
`
`CODE = YELLOW
`
`ADD RECORD T0
`
`SCREEN
`
`OOOOO5
`
`
`
`CODE = YELLOW
`
`CODE = RED
`
`000005
`
`
`
`U.S. Patent
`
`Dec. 8, 1998
`
`Sheet 5 0f5
`
`5,848,418
`
`FIG. 5
`
`9
`
`500
`
`/
`
`502
`
`504
`
`50
`
`6
`
`
`
`
`
`
`
`READ EITHER:
`
`2048 BYTES
`
`8192 BYTES
`
`THE ENTIRE FILE
`
`CLOSE THE FILE
`
`508
`
`FOR EACH WORD IN THE DICTIONARY AND
`
`THE WORD IS NOT IN THE CURRENT BUFFER
`
`
`
`WORD IN
`
`DICTIONARY?
`
`SET FLAG THAT WE FOUND THE WORD
`
`514
`
`WAS WORD
`FOUND?
`
`NO
`
`ADD WORD TO LIST
`
`518
`
`RETURN STATUS OF FOUND WORD
`
`0
`
`000006
`
`000006
`
`
`
`5,848,418
`
`1
`ELECTRONIC FILE ANALYZER AND
`SELECTOR
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`
`The present invention relates to an apparatus and method
`for reviewing electronic documents. More particularly, the
`present invention relates to an apparatus and method for
`locating and analyzing electronic documents that contain
`graphic images or objectionable language and presenting a
`list of such files to a user for review and destruction or some
`other action.
`
`2. Description of the Related Art
`The widespread use of personal computers (PC’s),
`coupled with easy access to computer networks such as the
`Internet and electronic bulletin board systems (BBS’s), has
`provided unprecedented access to adult subject matter for
`children. This adult subject matter consists of pornographic
`literature and photographs, descriptions of violent activities,
`and potential illegal activities, not to mention the use of
`offensive language. This material can be stored in electronic
`files that are easily copied from one computer system to
`another. The electronic files can contain graphic images
`(graphics type files) and text information (text type files).
`Some text documents, such as those written on word
`processors, can contain both text, graphic images, and audio
`clips.
`There are software products available to prevent children
`from accessing portions of the Internet known to contain
`offensive material. Software products such as Net Nanny or
`other channel blockers and screeners, perform a guardian
`function by restricting children from accessing certain areas
`of the Internet known to harbor adult subject matter.
`Unfortunately, not all adult subject matter is limited to the
`Internet. The subject matter is also available on many
`electronic bulletin boards. In addition, children can gain
`access to adult subject matter by using their friend’s PC’s
`that are not equipped with Net Nanny or similar software
`protections. Once downloaded to their friend’s PC,
`the
`offensive material can be copied onto floppy disks and
`transferred to the home PC,
`thereby circumventing Net
`Nanny. Aside from the problems with children, many cor-
`porations also have a similar unfilled need to find files with
`language that may expose the company to lawsuits for
`sexual harassment or illegal activity. There is, therefore, a
`need for an apparatus and method that identifies those files
`containing pre-selected objectionable subject matter on a PC
`or network system. It is an object of the present invention to
`remedy the problems inherent in the related art.
`
`SUMMARY OF THE INVENTION
`
`The present invention overcomes the disadvantages and
`limitations of the related art by providing an apparatus and
`method for finding objectionable material contained within
`electronic files, either on a PC or on a network.
`is
`The apparatus consists of a computer system that
`provided with a microprocessor (or computer), a video
`display, a buffer memory, and at least one electronic file
`storage device capable of storing electronic files. Each of the
`electronic files is stored according to an operating system
`which incorporates a file name, a file name suffix, a mode,
`a time-stamp, and a file size. The method includes provisions
`for a real type property, a claimed type property, and a result
`type property for each electronic file. All of the electronic
`files are located on each of the storage devices.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`The method of the present invention checks each file to
`determine the file’s real type property. This is accomplished
`by reading all or a portion of the file to determine the file’s
`signature. If the file signature is present, then it is compared
`to a library of known file signatures. If the file signature
`found is not among the library of known signatures, then the
`file is sent through a graphics filter to determine if the file is
`a graphics type of file or an audio clip, otherwise, the real
`property is set to unknown. Next, the file name suffix is
`checked against a library of file suffixes. If the file’s suffix
`is among the list of suffixes, the claimed property is set to
`that suffix type. Otherwise,
`the claimed type is set
`to
`unknown. Graphics files and audio clips are automatically
`designated as questionable, prompting review by the user.
`Graphics files can include video and or movies. Text files
`have additional processing, including searches for words or
`terms related to topics that are inappropriate or potentially
`dangerous for certain users such as children. The checking
`process also looks for files that are disguised, such as a file
`with an executable suffix (.exe) which in reality is a graphics
`file that should have had a graphics suffix (like .gif). Finally,
`the checking process also looks for files that are hidden so
`that they are not listed in response to a directory command.
`A listing of all suspicious, questionable, or graphics files
`are presented to the user. Reasons as to why the file was
`flagged are also presented. Once all of the flagged files are
`listed, the user is free to review or destroy the identified files.
`
`DESCRIPTION OF THE DRAWINGS
`
`For a more complete understanding of the present inven-
`tion and the advantages thereof, reference should be made to
`the following Detailed Description taken in connection with
`the accompanying drawings in which:
`FIG. 1 illustrates a computer system with which the
`preferred embodiment of the present invention is imple-
`mented;
`FIG. 2 is a flowchart diagram of the overall process that
`is the preferred embodiment of the present invention for
`finding objectionable material in electronic files;
`FIG. 3 is a flowchart diagram of a portion of the preferred
`embodiment of the present invention for finding objection-
`able material in electronic files;
`FIG. 4 is a flowchart diagram of a portion of the preferred
`embodiment of the present invention for finding objection-
`able material in electronic files;
`FIG. 5 is a flowchart diagram of a portion of the preferred
`embodiment of the present invention for finding objection-
`able material in electronic files; and
`FIG. 6 is example computer code of a record that contains
`information about an electronic file that is utilized by an
`alternate embodiment of the present invention.
`
`DESCRIPTION OF THE PREFERRED
`EMBODIMENTS
`
`The apparatus of the preferred embodiment is shown in
`FIG. 1. The preferred apparatus is a personal computer (PC)
`in the form of a computer system 10 that has a data bus 11
`to which are connected a variety of devices, namely: micro-
`processor (computer) 14, display monitor 12, modem 16,
`mouse 18, keyboard 20, floppy disk drives 22 and 24, one or
`more hard disk drives 26, and CD-ROM drive 28. The bus
`11 contains a set of data lines, a set of address lines and a set
`of control lines. These various lines are used to transfer data
`
`from one device to another. For example, data in the form of
`an electronic file can be read from hard disk drive 26 and
`
`000007
`
`000007
`
`
`
`5,848,418
`
`4
`3
`contains text only or if the file contains a graphics image or
`written to the microprocessor 14 for processing. Similarly,
`audio clip. If the file checked in step 208 is a graphics file
`output from the microprocessor 14 can be written to floppy
`or audio clip, the file will be handled in step 210. If the file
`drive 22 via the data bus 11. Additional input/output devices
`checked in step 208 contains text (as well as graphic images
`may be attached to the computer system 10,
`including
`and audit} (311135), then the the is handled in Step 212 35 3 teXt
`tablets, touch screens, light pens, joysticks, trackballs, and 5
`111e-,1t W111 be 1111f1e15tbb‘1 by these 5k111e‘1 111 the art that a11
`similar devices. Personal computer architecture and compo-
`a11‘11e/V1‘1ee e11p 111e111‘1111g 111e,V1eS and AV1 5 111ay be found
`nents are further explained in U.S. Pat. No. 5,572,207 by
`In the Eatétg t(titant.t:1r.aS a graptititf mltagefi etthflr tneepeétdettlttzil
`Harding, which is specifically incorporated herein by refer-
`or 6”? ‘°:
`C Wtt In a text
`.6’ H t e 0 0V.Vmg
`etal e
`ence for all purposes. Alternate embodiments of computer
`description, the term audio clip may be substituted for the
`.
`.
`.
`.
`system 10 may include mainframe computers, or networks 10
`term graphics image as both types of files are searched for
`,
`t
`1
`d .
`.
`.1
`.
`1
`t
`of PC s that share a common file server or other storage
`nown in
`e ar .
`lion emportalneouts y an in an simi ar or equiva en manner
`media (not Shown).
`FIG. 3 is a flowchart of a Sub_pr0CeSS for Checking
`‘The overall method 200 of finding objectionable material
`electronic files. Specifically, the steps shown in FIG. 3 are
`W1t11111 a ee111p11te1 System 10 15 S11eW11 111 F1G' 2'
`Referring t0 FIG 2, first,
`in Step 202,
`the number Of 15 encompassed by step 206 of FIG. 2. In the process of
`storage devices is determined. As described before, storage
`locating files (step 204 of FIG, 2), the size of the file, its
`deViCeS may C0r1SiSt Of floppy diSl< driVeS 22 arld 24 (if they
`time-stamp, its file name, file suffix and mode are read and
`have disks loaded) and other storage devices such hard disk
`placed into the file size property 602, the date time property
`drive 26 and CD-ROM drive 28. Alternate storage devices,
`604 the file name property 610, the file suffix property 612,
`such as random access memory (RAM), tape drives, and 20 and the mode property 606, respectively. This information is
`compressed “zip” drives may also be included in the process
`typically available via the computer system 10 operating
`of the present invention so long as they can be properly
`system. In step 302, the file’s signature is read.Although file
`C0r1r1eCted t0 and utilized by COII1p1lter system 10.
`signatures are not mandatory, it is customary within the art
`In step 204, for each storage device located in step 202, 25 to reserve a. series of bytes at the beginning of an electronic
`all of the electronic files stored on the storage device are
`file for designating the proprietary format of the file. This
`located, The process of the present invention provides a
`allows other software programs and the operating system to
`record of information for each of the electronic files found
`recognize electronic files as “belonging” to the particular
`in step 204. Example code of this record, utilizing the Object
`software program—thus the designation “signature.” The
`Pascal programming language, is shown in FIG, 6, It will be 30 file signature is normally placed in the first series of bytes in
`understood by those skilled in the art that other program-
`the file that 1S Called the “header.” Aside fr0II1 the file
`mjng languages, such as C and C++ among others, could be
`signature, additional. bytes Of a file may be read in order tO
`used equally well to program computer system
`Referring
`find graphics files hidden near the end Of text documents.
`to FIG. 6, the record 600 contains a variety of file properties.
`The file signature, if one is found, is loaded into the file
`The name of the property, and a brief description of the
`record’s file signature property 611. In step 302, the file
`property, is given in the table below:
`signature property 611 is checked against a list or library of
`
`Property
`
`Description
`
`Size 602
`Date Time 604
`
`Mode 606
`Color Code 608
`
`File Name 610
`
`File Signature 611
`
`File Suflix 612
`
`Reason 614
`
`Real Type 616
`
`Claimed Type 618
`
`Result Type 620
`
`Tie number of bytes taken up by the file on the storage device.
`Indicates the time stamp (i.e. the date and time) when the file was created or
`last modified).
`Tie mode of file storage (e.g., hidden, archive, etc.).
`Tie color code is itself a record containing integer values for the amount of
`red, yellow, and blue that are used to color an icon that is presented to the
`user. The color of the icon is used to indicate the type of file found.
`Tie name associated with the electronic file. This name is the one obtained
`directly from the operating system such as Microsoft Windows, OS2, UNIX,
`or the Macintosh OS.
`Tie file signature is typically contained within the “header” portion of the file,
`i.e., the first few bytes. Many proprietary file formats place a characteristic
`series of bytes at the beginning of a formatted file that designates the file as
`being created by the particular software program and conforming that format.
`Tie file suflix is typically the three character designation that is appended to
`File Name 610. Typical file suflixes are “.exe” for executable programs,
`“.3at” for batch files, “.doc” for word processor documents, and “.giF’ for
`graphics files.
`Tiis string variable contains an explanation of why the file was selected for
`presentation to the user.
`Tiis variable contains a code designating the actual type of file found by
`analyzing the contents of the file such as the File Signature 611.
`Tiis variable contains a code designating the claimed type of file found by
`examining the File Suflix 612.
`Tiis variable contains a code designating the presentation category for the
`fi e, i.e., this code specifies whether or not the file information will be
`presented to the user and under which category.
`
`Referring again to FIG. 2, step 206, all, or at least a 65 known file signatures. In step 304 it is determined whether
`portion of, the contents of each file is analyzed. Next, in step
`the file signature is not among the list of known file
`208,adecision is made whether or not the contents of the file
`signatures. If the answer in step 304 is no (i.e.,
`the file
`
`000008
`
`000008
`
`
`
`5,848,418
`
`5
`
`signature is among those known), then the real type property
`616 of the file is set to “not graphics” in step 306. As with
`all property settings, it will be understood by those skilled in
`the art that the actual setting can be in the form of a character
`array (or string) or a unique boolean, integer or real value
`specifically designated for that purpose. If the file signature
`is still unknown (i.e., the file signature was not among the
`library of known file signatures), then either the first 132
`8-byte characters or the entire file (whichever is less) is read
`into a buffer memory. The contents of the buffer memory are
`sent through a graphics file filter in step 308. The graphics
`file filter determines, if possible, the correct file signature of
`the file assuming the file is a graphics file. In step 310, it is
`determined whether or not the correct file signature has been
`determined in step 308. If the filter finds a known graphics
`type, then the file’s real type property 616 is set to graphics
`in step 314. Otherwise, the file’s real type property 616 is set
`to unknown in step 312.
`Referring still to FIG. 3, in step 316, the file suffix of the
`file name is read into the file suffix property 612 of the file
`properties record 600. The file suffix is typically the last
`three characters of the file name that come after the final “.”
`
`character. Typical file name suffixes include, but are not
`limited to: “.exe,” “.dll,” “.bat,” “.tif,” “.gif,” “.pcx,”
`“.bmp,” “.jpg,” “.com,” “.doc,” “.htm,” and “.wpd”. The file
`suffix is used as a handy way to differentiate between
`different files and different file formats. In step 316, the file
`suffix property 612 is compared to the real type property 616
`in order to determine if the file signature does not correlate
`to the file suffix. This determination is made in step 318. If
`the answer in step 318 is no, i.e. the file suffix property 612
`is equivalent to the real type property 616, then the claimed
`type property 618 is set equivalent to the real type property
`616 in step 320. If the answer to step 318 is yes, then the file
`suffix 612 is compared to a library or list of known file
`suffixes in step 322. The library of known suffixes contains
`an exhaustive list of suffixes as well as the file type normally
`associated with that suffix (e.g., ile type in the library of
`suffixes for the matching suffix. If, in step 324, no match was
`found in the library of suffixes,
`then the claimed type
`property 618 is set to unknown.
`Additional processing is illustrated in FIG. 4. In step 402,
`the claimed type property 618 is compared to the real type
`property 616. If the real type property 616 is not equivalent
`to the claimed type property 618 then a determination is
`made in step 404 to see whether or not the claimed type
`property 618 is set to not graphics. If the answer in step 404
`is no, then the result type property 620 is set to questionable
`and the color code property 608 is set to yellow in step 406.
`If the answer in step 404 is yes,
`i.e.,
`the claimed type
`property 618 is set to not graphics, then the result type
`property 620 is set to suspicious and the color code property
`608 is set to red.
`
`Still referring to FIG. 4, if the answer to step 402 is yes,
`i.e., the claim type property 618 is equivalent to the real type
`property 616, then a check is made to determine if the file
`is a hidden file in step 410. If the file is a hidden file then the
`result property 620 is set to questionable and the color code
`property 608 is set to yellow in step 412. Otherwise, the
`color code property 608 is set to blue and the result property
`620 is set to okay. All of the files are listed onto display 12
`and are sorted in order of severity, with the suspicious files
`listed first, the questionable files listed next, and the okay
`files listed last. For each file listed, the reason why the file
`is either suspicious or questionable is provided by setting the
`reason property 614 to one of the reasons in the following
`list:
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`“This file type cannot be identified.”;
`“This claims to be, and is a picture.”;
`“This hidden file contains a picture.”;
`“This file claims to be one thing (by its name) but is
`something else.”;
`“This file is labeled as a program but is really a picture.”;
`“This file is labeled as a picture but is really a program.”;
`“This text file contains words that match your criteria.”;
`“This picture is labeled as one type but is really another.”;
`“This file appears to contain an audio clip.”;
`“This hidden file contains an audio clip.”; and
`“This file claims to be one thing (by its name) but is an
`audio clip.”
`The handling of a text document (text file) according to
`step 212 of FIG. 2 is more fully illustrated in FIG. 5. Text
`documents, as mentioned before, can contain text, graphics
`and audio clips. In the preferred embodiment of the present
`invention, the user is presented with the option of perform-
`ing an exhaustive search of all text files in order to find any
`and all graphic images and audio clips that may be embed-
`ded within a large text document. As an alternative to the
`exhaustive search, the user, in the preferred embodiment of
`the present invention, is able to select a cursory search where
`only a portion of each text file is searched for graphic
`images, audio clips and offensive text. In the preferred
`embodiment of the present
`invention, switches are also
`provided to search or not search for the following categories
`of potentially objectionable material in text files:
`Sexually Explicit (material containing graphic descrip-
`tions of sexual
`intercourse or sexually related
`activities);
`Computer Hacking (words or terms that are likely to
`appear in material that discusses unauthorized access to
`other computers, over networks or telephone lines);
`Drugs/Substance abuse (words or terms that are likely to
`appear in material that discusses use of illicit drugs and
`other dangerous substances);
`Physically harmful (words or terms that are likely to
`appear in material that discusses actions that may be
`harmful
`to children or to others such as guns, or
`instructions on how to make explosives); and
`Potentially Illegal (words or terms that are likely to appear
`in material that discusses actions that may be against
`local, state, or federal laws).
`Referring now to FIG. 5, the text file is processed in the
`following manner. In step 502, the file is first opened for
`reading.
`In the preferred embodiment of the present
`invention, the file is opened so that other programs can open
`and share the contents of the file. In step 504, either the first
`132 8-byte characters are read, or the entire file is read into
`the buffer memory. If the file is less than 132 characters long,
`then the entire file is read. Only when a cursory search is
`requested and the file is in less than 132 characters long are
`all of the characters read. If the user has designated that an
`exhaustive search be conducted, the entire file is loaded into
`the buffer memory. Once loaded into the buffer memory, the
`file is closed in step 504 to allow processing by other
`software programs.
`Step 508 of FIG. 5 comprises a loop wherein all words
`contained in the document are compared to the words or
`terms in a text dictionary. The text dictionary is actually a
`series of dictionaries, one for each type of objectionable
`subject matter (e.g., sexually explicit, hacking, etc.). Every
`word that is contained within the buffer memory is compared
`
`000009
`
`000009
`
`
`
`5,848,418
`
`7
`to each of the words or terms in the various dictionaries. The
`user can select which dictionaries will be referred to via the
`
`switches provided for selecting or de-selecting the particular
`subject matter. If a word in the text file matches one in a
`dictionary, then the result of step 510 will be yes and a flag
`will be set
`in step 512 indicating that the file contains
`objectionable material. If the answer to step 510 is no, then
`the next word in the text file is selected for similar com-
`
`parison according to step 508.
`Once all of the words and terms in the text file have been
`
`10
`
`compared to each of the selected dictionaries according to
`step 508, then the determination in step 514 is performed. If
`the answer in step 514 was no (i.e., no objectionable words,
`graphic images, or audio clips were found) then the result
`type property 620 is set to okay. If the answer to step 514
`was yes (i.e., either objectionable words, a graphic image, or
`an audio clip were found) then the result type property 620
`is set to questionable or suspicious, depending upon the type
`of word or embedded graphic or audio clip was found.
`Once all of the files have been reviewed, a list of the
`various files are presented on the display 12 for the user’s
`review and, if necessary, destruction or some other action.
`The files are ordered by their result type property 620 and a
`color icon is displayed according to the color code property
`608 in order to aid the user in distinguishing harmful files
`from innocuous ones. In the preferred embodiment of the
`present invention, along with the file’s file name property
`610, the file size 602, the date time property 604, the mode
`606, the reason property 614, and the color code in icon form
`for the particular result type property 620 is also presented
`to the user. The user is given the option of printing the list
`of files to a standard printer (not shown).
`Of course, many modifications and adaptions to the
`present
`invention could be made to advantage without
`departing from the spirit of the invention. Further, some
`features -discussion is intended to be merely illustrative of
`the invention. Numerous alternative embodiments may be
`devised by those having ordinary skill in the art without
`departing from the spirit and scope of the following claims.
`What is claimed is:
`
`in a
`1. A process for searching objectional material
`computer system having a computer, a display, a buffer
`memory, and at
`least one electronic file storage device
`capable of storing electronic files, said electronic files hav-
`ing a file name, a file suffix, and a file signature and a record
`array having a real type property, a claimed type property,
`and a result type property for each of said electronic files,
`comprising the steps of:
`a) locating said electronic files on each of said storage
`devices,
`b) checking each of said electronic files on each of said
`storage devices to determine said real type property of
`said file,
`c) if said file checked in step b) is a graphics type file, then
`identifying said file as a graphics file,
`d) if said file checked in step b) is not a graphics type file
`then interrogating said file to determine if said file
`contains objectionable material,
`e) if said file interrogated in step d) contains objectionable
`material, then identifying said file as a text file con-
`taining objectionable material, and
`f) presenting an itemized list of said text files containing
`objectionable material and said graphics files to a user
`so that said user may select
`files for review or
`destruction,
`g) determining said file signature of said electronic file,
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`8
`
`h) comparing said file signature to a list of predetermined
`file signatures, and
`i) if said file signature is contained within said list of
`predetermined file signatures than setting said real type
`property of said file to non-graphics,
`comparing a file suffix of said file to said real type
`property of said file, and
`k) if said file suffix is equivalent to said real type property
`of said file then setting said claimed type property of
`said file to said real type property of said file,
`1) if said real type property of said file is equivalent to said
`claimed type property of said file then examining said
`file to determine if said file is a hidden file,
`
`m) if said file is a hidden file, then setting said result type
`property of said file to questionable.
`2. A process for searching for objectionable material in a
`computer system having a computer, a display, a buffer
`memory, and at
`least one electronic file storage device
`capable of storing electronic files, said electronic files hav-
`ing a file name, a file suffix, and a file signature and a record
`array having a real type property, a claimed type property,
`and a result type property for each of said electronic files,
`comprising the steps of:
`a) locating said electronic files on each of said storage
`devices,
`b) checking each of said electronic files on each of said
`storage devices to determine said real type property of
`said file,
`c) if said file checked in step b) is a graphics type file, then
`identifying said file as a graphics file,
`d) if said file checked in step b) is not a graphics type file
`then interrogating said file to determine if said file
`contains objectionable material,
`e) if said file interrogated in step d) contains objectionable
`material, then identifying said file as a text file con-
`taining objectionable material, and
`f) presenting an itemized list of said text files containing
`objectionable material and said graphics files to a user
`so that said user may select
`files for review or
`destruction,
`g) determining said file signature of said electronic file,
`h) comparing said file signature to a list of predetermined
`file signatures, and
`i) if said file signature is contained within said list of
`predetermined file signatures than setting said real type
`property of said file to non-graphics
`comparing a file suffix of said file to said real type
`property of said file, and
`k) if said file suffix is equivalent to said real type property
`of said file then setting said claimed type property of
`said file to said real type property of said file,
`1) if said real type property of said file is equivalent to said
`claimed type property of said file then examining said
`file to determine if said file is a hidden file,
`m) if said file is not a hidden file, then setting said result
`type property of said file to okay.
`in a
`3. A process for searching objectional material
`computer system having a computer, a display, a buffer
`memory, and at
`least one electronic file storage device
`capable of storing electronic files, said electronic files hav-
`ing a file name, a file suffix, and a file signature and a record
`array having a real type property, a claimed type property,
`and a result type property for each of said electronic files,
`comprising the steps of:
`
`000010
`
`000010
`
`
`
`9
`
`10
`
`5,848,418
`
`a) locating said electronic files on each of said storage
`devices,
`b) checking each of said electronic files on each of said
`storage devices to determine said real type property of
`said file,
`c) if said file checked in step b) is a graphics type file, then
`identifying said file as a graphics file,
`d) if said file checked in step b) is not a graphics type file
`then interrogating said file to determine if said file
`contains objectionable material,
`e) if said file interrogated in step d) contains objectionable
`material, then identifying said file as a text file con-
`taining objectionable material, and
`f) presenting an itemized list of said text files containing
`objectionable material and said graphics files to a user
`so that said user may select
`files for review or
`destruction,
`g) determining said file signature of said electronic file,
`h) comparing said file signature to a list of predetermined
`file signatures, and
`i) if said file signature is contained within said list of
`predetermined file signatures than setting said real type
`property of said file to non-graphics,
`comparing a file suffix of said file to said real type
`property of said file, and
`k) if said file suffix is not equivalent to said real type
`property of said file then comparing said file suffix to a
`predetermined list of file suffixes,
`1) if said file suffix is not contained within said pre-
`determined list of file suffixes then setting said claimed
`type property of said file to unknown,
`m) if said real type property of said file is equivalent to
`said claimed type property of said file then examining
`said file to determine if said file is a hidden file,
`n) if said file is a hidden file, then setting said result type
`property of said file to questionable.
`4. A process for searching for objectionable material in a
`computer system having a computer, a display, a buffer
`memory, and at
`least one electronic file storage device
`capable of storing electronic files, said electronic files hav-
`ing a file name, a file suffix, and a file signature and a record
`array having a real type property, a claimed type property,
`and a result type property for each of said electronic files,
`comprising the steps of:
`a) locating said electronic files on each of said storage
`devices,
`b) checking each of said electronic files on each of said
`storage devices to determine said real type property of
`said file,
`c) if said file checked in step b) is a graphics type file, then
`identifying said file as a graphics file,
`d) if said file checked in step b) is not a graphics type file
`then interrogating said file to determine if said file
`contains objectionable material,
`e) if said file interrogated in step d) contains objectionable
`material, then identifying said file as a text file con-
`taining objectionable material, and
`f) presenting an itemized list of said text files co