data on a master is read into a master image file, and the master image file is manipulated to include a benchmark comprising tracking and verification information tied to at least a portion of the master image file. Thus, a copied-to storage media as copied from the master image file also includes such benchmark, a data alteration of the master image file causes a mis-match with regard to the benchmark in such master image file, and a data alteration of the copied-to storage media also causes a mis-match with regard to the benchmark in such storage media as copied from such master image file. The benchmark may include a part identifier and a security identifier.

Patent
   RE44969
Priority
Feb 11 2000
Filed
Apr 06 2006
Issued
Jun 24 2014
Expiry
Jun 05 2020
Assg.orig
Entity
Large
0
46
all paid
21. A computer-readable storage medium having data stored thereon, the data comprising:
an identifier for verifying a computing device comprising a master storage medium;
data copied from the master storage medium of the verified computing device;
a computer-readable data structure comprising a first field containing a benchmark comprising tracking and verification information tied to at least a portion of the data structure, copied from the master storage medium, wherein the benchmark is not contained in the master storage medium, wherein the first field appears in a normally inaccessible area in the computer-readable storage medium; and
a part identifier which identifies a master image file;
whereby wherein the benchmark is usable to detect a data alteration of the data structure causes a mis-match with regard to the benchmark in such first field copied from the master storage medium.
0. 37. An apparatus for copying data from a master storage medium of a computing device to a copied-to storage medium, the apparatus comprising:
means for verifying the computing device based on an identifier of the computing device;
means for reading the data on the master storage medium of the verified computing device into a master image file;
means for creating a benchmark comprising tracking and verification information tied to at least a portion of the master image file, wherein the benchmark is not contained in the master storage medium;
means for writing the benchmark into the master image file, wherein a part identifier that identifies the master image file is inserted into the benchmark; and
means for writing the master image file, including the benchmark, to the copied-to storage medium, wherein said means for writing the master image file is configured to write the benchmark into an area of the copied-to storage medium which is a normally inaccessible area of the copied-to storage medium;
wherein the benchmark is usable to detect a data alteration of the master image file or a data alteration of the copied-to storage medium.
1. A method of copying data from a master storage medium (“master”) for copying such data of a computing device to a copied-to storage medium, media the method comprising: media medium, the method comprising:
verifying the computing device based on an identifier of the computing device;
reading the data on the master storage medium of the verified computing device into a master image file;
manipulating the master image file to include creating a benchmark comprising tracking and verification information tied to at least a portion of the master image file, wherein the benchmark is not contained in the master storage medium;
writing the benchmark into the master image file, wherein a part identifier that identifies the master image file is included in the benchmark; and
whereby a copied-to storage media as copied from writing the master image file also includes such, including the benchmark, to the copied-to storage medium, wherein writing the master image file to the copied-to storage medium comprises inserting the benchmark into an area of the copied-to storage medium which is a normally inaccessible area of the copied-to storage medium;
whereby wherein the benchmark is usable to detect a data alteration of the master image file causes a mis-match with regard to the benchmark in such master image file, and whereby or a data alteration of the copied-to storage media also causes a mis-match with regard to the benchmark in such storage media as copied from such master image file medium.
0. 55. A computer system for copying data from a master storage medium of a computing device to a copied-to storage medium, the system comprising:
a module for verifying the computing device based on an identifier of the computing device;
a module for copying the data from the master storage medium of the verified computing device into a master image file stored on the system and writing to the master image file a benchmark that includes tracking and verification information derived at least partly from the master image file, wherein the benchmark is not contained in the master storage medium;
a module for checking for alteration of the master image file from the master using the benchmark;
a module for producing a production copy of the master image file and benchmark onto the copied-to storage medium, wherein the copied-to storage medium comprises a part identifier which identifies the master image file in the benchmark, wherein the copied-to storage medium comprises the benchmark in a normally inaccessible area of the copied-to storage medium; and
a module for comparing the master image file and benchmark with the production copy, wherein data alteration causes a mis-match between the benchmarks of the master image file and the production copy.
2. The method of claim 1 wherein the master storage medium has a file directory thereon, wherein reading the data comprises:
accessing the file directory on the master storage medium;
ascertaining file information from the file directory; and
reading the data on the master storage medium into a master image file based on such file information.
3. The method of claim 2 wherein the file directory is a DOS file allocation table (FAT).
4. The method of claim 1 comprising wherein the reading comprises:
reading all of the data on the master storage medium into the master image file,;
such wherein the master image file thereby containing a master image of the master and being contains all of the data on the master storage medium available to create a copied image of the master storage medium on the copied-to storage media medium.
0. 5. The method of claim 1 wherein manipulating the master image file to include a benchmark comprises inserting a part identifier into the master image file which identifies such master image file.
0. 6. The method of claim 5 comprising inserting the part identifier into an area of the master image file such that the part identifier appears in a normally inaccessible area in a copied-to storage media as copied from the master image file.
7. The method of claim 6 comprising wherein the inserting the part identifier into an area of the master image file such that comprises inserting the part identifier appears in dead space in a of the copied-to storage media medium as copied from the master image file, the dead space not normally being accessible by an operating system of a computer having the copied-to storage media mounted thereto, but accessible by a utility application running on such computer.
8. The method of claim 5 comprising inserting 1 wherein the part identifier is a 10-byte part identifier.
9. The method of claim 5 1 further comprising inserting a byte count of the part identifier into the master image file adjacent the part identifier.
10. The method of claim 5 1 further comprising storing the inserted part identifier in an image data file separate from the master image file.
11. The method of claim 10 further comprising:
calculating a checksum of the entire master image file, including the benchmark; and
storing the checksum in the image data file, whereby wherein the stored checksum is available for later reference to ensure that the master image file has not become corrupted.
12. The method of claim 1 wherein manipulating the master image file to include a the writing the benchmark comprises inserting a security identifier into the master image file, where the security identifier is tied to the data in such master image file.
13. The method of claim 12 comprising wherein the inserting the security identifier into an area of the master image file such that comprises inserting the security identifier appears in a normally inaccessible area in a of the copied-to storage media as copied from the master image file medium.
14. The method of claim 13 comprising wherein the inserting the security identifier into an area of the master image file such that comprises inserting the part security identifier appears in dead space in a of the copied-to storage media medium as copied from the master image file, the dead space not normally being accessible by an operating system of a computer having the copied-to storage media medium mounted thereto, but accessible by a utility application running on such computer.
15. The method of claim 12 comprising wherein the inserting a the security identifier produced by comprises:
calculating a checksum of each byte of at least a portion of the master image file; and
encrypting the calculated checksum by way of an encrypting algorithm.
16. The method of claim 15 comprising calculating a checksum of each byte of wherein the at least a portion of the master image file including comprises a file directory thereof.
17. The method of claim 16 wherein the file directory is a DOS file allocation table (FAT).
18. The method of claim 15 comprising encrypting the calculated checksum by way of an wherein the encrypting algorithm that produces an encrypted value having a pre-determined length.
19. The method of claim 12 further comprising inserting a byte count of the security identifier into the master image file adjacent the security identifier.
20. The method of claim 1 further comprising:
calculating a checksum of the entire master image file, including the benchmark; and
storing the checksum in an image data file separate from the master image file, whereby wherein the stored checksum is available for later reference to ensure that the master image file has not become corrupted.
22. The computer-readable storage medium of claim 21 having stored thereon a computer-readable data structure comprising a first field containing a benchmark comprising tracking and verification information tied to at least a portion of the data structure, whereby wherein a copied-to storage media as comprising the data copied from the data structure computer-readable medium also includes such benchmark, whereby wherein the benchmark is usable to detect a data alteration of the data structure causes a mis-match with regard to the benchmark in such first field, and whereby a data alteration of the data structure also causes a mis-match with regard to the benchmark in such storage media as copied from such data structure of the copied-to storage medium.
0. 23. The computer-readable medium of claim 21 wherein the benchmark includes a part identifier.
24. The computer-readable storage medium of claim 23 21 wherein the benchmark includes a 10-byte part identifier.
25. The computer-readable storage medium of claim 23 21 wherein the benchmark further includes a byte count of the part identifier.
0. 26. The computer-readable medium of claim 21 wherein the first field appears in a normally inaccessible area in a copied-to storage media as copied from the data structure.
27. The computer-readable storage medium of claim 26 21 wherein the first field appears in dead space in a of the copied-to storage media as copied from the data structure medium, the dead space not normally being accessible by an operating system of a computer having the copied-to storage media medium mounted thereto, but accessible by a utility application running on such computer.
28. The computer-readable storage medium of claim 21 wherein the first field appears in a normally inaccessible area in the data structure of the copied-to storage medium.
29. The computer-readable storage medium of claim 28 wherein the first field appears in dead space in the data structure of the copied-to storage medium, the dead space not normally being accessible by an operating system of a computer, but accessible by a utility application running on such computer.
30. The computer-readable storage medium of claim 21 wherein the benchmark includes a security identifier tied to the data in the data structure of the copied-to storage medium.
31. The computer-readable storage medium of claim 30 wherein the security identifier comprises a checksum of each byte of at least a portion of the data structure of the copied-to storage medium.
32. The computer-readable storage medium of claim 31 wherein the security identifier comprises a checksum of each byte of at least a portion of the data structure, the checksum being is encrypted by way of an encrypting algorithm.
33. The computer-readable storage medium of claim 32 wherein the checksum is encrypted by way of an encrypting algorithm that produces an encrypted value having a predetermined length.
34. The computer-readable storage medium of claim 30 further comprising a second field containing a file directory, wherein the security identifier comprises a checksum of each byte of at least a portion of the data structure of the copied-to storage medium including the file directory.
35. The computer-readable storage medium of claim 34 wherein the file directory is a DOS file allocation table (FAT).
36. The computer-readable storage medium of claim 30 wherein the benchmark further includes a byte count of the security identifier.
0. 38. The apparatus of claim 37 wherein the master storage medium has a file directory thereon, wherein said means for reading the data comprises:
means for accessing the file directory on the master storage medium;
means for ascertaining file information from the file directory; and
means reading, the data on the master storage medium into a master image file based on such file information.
0. 39. The apparatus of claim 38 wherein the file directory is a DOS file allocation table (FAT).
0. 40. The apparatus of claim 37 wherein said means for reading the data is a means for reading all of the data on the master into the master image file, wherein the master image file contains all of the data on the master storage medium available to create a copied image of the master storage medium on the copied-to storage medium.
0. 41. The apparatus of claim 37 wherein said means for inserting the part identifier is configured to insert the part identifier into dead space of the copied-to storage medium as copied from the master image file, the dead space not normally being accessible by an operating system of a computer having the copied-to storage media mounted thereto, but accessible by a utility application running on such computer.
0. 42. The apparatus of claim 37 wherein the part identifier is a 10-byte part identifier.
0. 43. The apparatus of claim 37 further comprising means for inserting a byte count of the part identifier into the master image file adjacent the part identifier.
0. 44. The apparatus of claim 37 further comprising means for storing the inserted part identifier in an image data file separate from the master image file.
0. 45. The apparatus of claim 44 further comprising:
means for calculating a checksum of the entire master image file including the benchmark; and
means for storing the checksum in the image data file, wherein the stored checksum is available for later reference to ensure that the master image file has not become corrupted.
0. 46. The apparatus of claim 37 wherein said means for writing the benchmark is configured to write a security identifier into the master image file, where the security identifier is tied to the data in such master image file.
0. 47. The apparatus of claim 46 wherein said means for writing the benchmark is configured to write the security identifier in a normally inaccessible area of the copied-to storage medium as copied from the master image file.
0. 48. The apparatus of claim 47 wherein said means for writing the benchmark is configured to write the security identifier into a dead space of the copied-to storage medium as copied from the master image file, the dead space not normally being accessible by an operating system of a computer having the copied-to storage medium mounted thereto, but accessible by a utility application running on such computer.
0. 49. The apparatus of claim 46 wherein said means for writing the benchmark comprises:
means for calculating a checksum of each byte of at least a portion of the master image file; and
means for encrypting the calculated checksum by way of an encrypting algorithm.
0. 50. The apparatus of claim 46 wherein said security identifier is produced by:
calculating a checksum of each byte of at least a portion of the master image file including a file directory thereof; and
encrypting the calculated checksum by way of an encrypting algorithm.
0. 51. The apparatus of claim 50 wherein the file directory is a DOS file allocation table (FAT).
0. 52. The apparatus of claim 49 wherein the encrypting algorithm produces an encrypted value having a pre-determined length.
0. 53. The apparatus of claim 46 wherein the master image file includes a byte count of the security identifier adjacent the security identifier.
0. 54. The apparatus of claim 37 further comprising:
means for calculating a checksum of the entire master image file, including the benchmark; and
means for storing the checksum in an image data file separate from the master image file, wherein the stored checksum is available for later reference to ensure that the master image file has not become corrupted.
0. 56. The system of claim 55 further comprising a drive for receiving a master storage media containing the master.
0. 57. The system of claim 55 further comprising a first drive for receiving a master storage media containing the master and a second drive for receiving copied-to media for receiving the production copy.

This application claims the benefit of U.S. Provisional Application No. 60/181,727, filed Feb. 11, 2000 and entitled “Storage Media with Benchmark Representative of Data Originally Stored Thereon”, hereby incorporated by reference. This application is related to U.S. application Ser. No. 09/587,509, filed concurrently and entitled “Storage Media with Benchmark Representative of Data Originally Stored Thereon”, hereby incorporated by reference.

The present invention relates to a benchmark placed on a storage media. More particularly, the present invention relates to such a benchmark that is indicative of the data originally stored on the storage media, whereby changes therefrom may be detected.

Storage media, and in particular re-writeable storage media, is at times shipped from a storage media manufacturer/distributor with pre-determined data already stored thereon. For example, the data may be one or more software programs, one or more data structures, one or more data files, and/or the like. Likewise, the re-writeable storage media may be a magnetic or optical in nature, and may be a tape, a disk, or the like. Moreover, the storage media may be read-only, write-only, read-write, or the like, as appropriate.

Once the storage media is shipped with the already-stored data, though, such storage media is quite obviously out of the hands of the manufacturer/distributor, who is then powerless to prevent anyone from making changes to the stored data on the storage media. Accordingly, it is oftentimes useful after shipment of the storage media to determine whether the data on the storage media has changed as compared with the originally shipped data. In addition, during production of the storage media with the data thereon based on a master version, it is useful at various points during the production process to confirm that the data on the storage media has not changed as compared with the data copied from the master.

Accordingly, a need exists for a benchmark that is placed on the storage media and that is closely tied to the master. Thus, reference may be made to the benchmark at various times to determine whether the data on the storage media has changed as compared with the data copied from the master.

The present invention satisfies the aforementioned need by providing, among other things, a method of controlling use of copying software on a computer, wherein the computer includes a hardware ID (“HWID”). In the method, a hard-coded identifier is accessed from within the copying software when the copying software is launched, and the HWID of the computer is also accessed. The HWID is compared with the hard-coded identifier, and a copying function proceeds only if the HWID and the hard-coded identifier match.

The present invention also provides a method of copying data from a master storage media (“master”) for copying such data to a copied-to storage media. In the method, the data on the master is read into a master image file, and the master image file is manipulated to include a benchmark comprising tracking and verification information tied to at least a portion of the master image file. Thus, a copied-to storage media as copied from the master image file also includes such benchmark, a data alteration of the master image file causes a mis-match with regard to the benchmark in such master image file, and a data alteration of the copied-to storage media also causes a mis-match with regard to the benchmark in such storage media as copied from such master image file.

To verify the master image file, an image data file with a data structure corresponding to the master image file is accessed, where the corresponding data structure includes a checksum corresponding to the master image file. The checksum from the corresponding data structure in the image data file is accessed and employed to verify that the accessed master image file is not corrupted.

To copy the master image file to a copied-to storage media, a part identifier is accessed from the master image file, and an image data file with a data structure corresponding to the master image file is accessed, where the corresponding data structure includes a part identifier corresponding to the master image file. The part identifier from the corresponding data structure in the image data file is accessed and compared with the master image file part identifier; and copying proceeds only if the master image file part identifier matches the image data file part identifier.

In addition, a checksum of at least a portion of the master image file is performed to produce a produced checksum. A checksum from the master image file is accessed and compared with the produced checksum, and the copy proceeds only if the master image file checksum matches the produced checksum.

To compare the master image file to a copied-to storage media copied from the master image file, a part identifier is accessed from the storage media, and an image data file with a data structure corresponding to the master image file is accessed, where the corresponding data structure includes a part identifier corresponding to the master image file. The part identifier from the corresponding data structure in the image data file is accessed and compared with the storage media part identifier, and the compare proceeds only if the storage media part identifier matches the image data file part identifier.

In addition, a checksum of at least a portion of the storage media is performed to produce a produced checksum. A checksum from the storage media is accessed and compared with the produced checksum, and the compare proceeds only if the storage media checksum matches the produced checksum.

The invention prevents any unauthorized file image content from being copied to a production disk during the production thereof. In addition, the invention prevents the copying of an image to a production disk if such image was modified after the creation thereof. Further, the invention provides a method and mechanism to determine whether the data on a production disk has been accessed by a computer operating system or otherwise modified; thus for example allowing returned disks to be re-sold as new.

The foregoing summary as well as the following detailed description of the present invention will be better understood when read in conjunction with the appended drawings. For the purpose of the illustrating the invention, there are shown in the drawings embodiments which are presently preferred. As should be understood, however, the invention is not limited to the precise arrangements and instrumentalities shown. In the drawings:

FIG. 1 is a block diagram showing a particular system for producing a benchmark on storage media in accordance with one embodiment of the present invention;

FIG. 2 is a flow chart showing steps performed during controlling of access to a master computer in accordance with one embodiment of the present invention;

FIG. 3 is a block diagram showing the structure of a master image/image file created in accordance with one embodiment of the present invention;

FIG. 4 is a flow chart showing steps performed during copying of a master to the master image/image file of FIG. 3 in accordance with one embodiment of the present invention;

FIG. 5 is a block diagram showing a data structure corresponding to the master image/image file of FIG. 3 in an image data file as created in accordance with one embodiment of the present invention;

FIG. 6 is a flow chart showing steps performed during production of a production copy of storage media from the image file in accordance with one embodiment of the present invention; and

FIG. 7 is a flow chart showing steps performed during a comparison check of the production copy of storage media in accordance with one embodiment of the present invention.

Referring now to FIG. 1, in producing a storage media 10 having data thereon based on a master 12, it is to be understood that four basic operations take place: (1) a master 12 of the data to be stored on the storage media is obtained from an appropriate source and is accessed through a master computer 14 having relatively secure master copying software thereon; (2) an image file is made from the contents of the master 12 by way of the master computer 14; (3) the image file is copied to the copied-to storage media 10 by way of a production computer 16; and (4) the image file is compared to the copied-to storage media 10 by way of a comparison computer 18. Each operation will be addressed herein, in turn.

Each computer 14, 16, 18 may be any appropriate type of computer without departing from the spirit and scope of the present invention. Typically, each such computer 14, 16, 18 would have a display, one or more data input devices (keyboard, mouse, etc.), a processor, memory, and the like. Of course, one or more such elements may not be necessary, depending on circumstances, and therefore may be removed. Each computer 14, 16, 18 should of course have an appropriate storage media drive for reading from and/or writing to a storage media 10 and/or a master 12, as may be appropriate.

In the case of the production computer 16 and the comparison computer 18, the process of inserting the storage media 10 into and removing the storage media 10 from the respective drives (arrows 1 and 2 in FIG. 1) may be automated by use of appropriate apparatus such as for example a robotic device (not shown), especially in the case of a more than minimal volume operation. Moreover, such apparatus may also move the storage media 10 between the computers 16, 18 and the drives thereof, as appropriate. Any appropriate automation apparatus may be employed without departing from the spirit and scope of the present invention. Since the details of such automation apparatus are known to the relevant public, further details are not provided herein except as stated below.

As seen, each computer 14, 16, 18 may be networked together as is necessary to share information, as will be discussed in more detail below. Thus, each computer 14, 16, 18 can access the information on the other computers 14, 16, 18, assuming of course that appropriate security access is granted. In addition or in the alternative, information may be accessed by each computer 14, 16, 18 from a network computer or server 20. Of course, any appropriate networking and sharing arrangements may be employed without departing from the spirit and scope of the present invention. In fact, information may even be exchanged between computers by hand (i.e., by portable storage media) if appropriate and/or necessary. Moreover, two or more of the three computers 14, 16, 18 may even be embodied in the form of a single computer.

Preliminarily, it should be ensured that the master 12 originates from a trustworthy source, and is not created by a non-approved entity. Accordingly, the master 12 should be obtained from such trustworthy source in some manner to ensure that the data on such master 12 is in fact from the trustworthy source and in a form that the trustworthy source intended, and also to ensure that the data on such master 12 is itself trustworthy and has not been tampered with. The master 12 may originate from any appropriate source and have any appropriate data thereon without departing from the spirit and scope of the present invention. As but one example, the master 12 may originate from the marketing department of a manufacturer of the storage media 10, whereby the data stored on the master 12 results from cross-promotional arrangements with other manufacturers and/or distributors. As will be explained below, in one embodiment of the present invention, the master 12 is a storage media similar to if not identical with the copied-to storage media 10, although the master may alternatively be a different type without departing from the spirit and scope of the present invention.

Importantly, the entity copying the data from the master 12 by way of the master computer 14 must be trustworthy also. In one embodiment of the present invention, then, the master computer 14 receiving the master 12 for copying purposes is tightly controlled, such master computer 14 includes copying software 22 that copies the data from the master 12, as will be explained in more detail below, and the copying software 22 is tightly tied to such master computer 14. In such embodiment, and referring now to FIG. 2, the master computer 14 includes a hardware ID (“HWID”) or the like that is unique to the master computer 14, such HWID is obtained from the master computer 14 (step 201), the copying software 22 is hard-coded with such HWID (step 203), and such copying software 22 operates only on the master computer 14 having such HWID. For example, if the master computer includes a PENTIUM III processor as produced and/or marketed by INTEL Corporation of Santa Clara, Calif., then the HWID may be the unique ID associated with the PENTIUM III processor (“the PENTIUM III ID”). Of course, any other appropriate identifying indicia from any particular master computer 14 may be employed without departing from the spirit and scope of the present invention. Any appropriate methodologies may be employed to obtain the HWID from the master computer 14 and to hard-code such HWID into the copying software 22 without departing from the spirit and scope of the present invention. Since such methodologies should be known or apparent to the relevant public, further details thereof are not disclosed herein.

In one embodiment of the present invention, when the master computer 14 is directed to launch the copying software 22 by a user or the like, such copying software 22 accesses the HWID hard-coded therein (step 205), accesses the HWID of the master computer (step 207), and compares such accessed HWID with such hard-coded HWID (step 209). The copying software 22 then proceeds only if the accessed and hard-coded HWIDs match (step 211).

In one embodiment of the present invention, and still is referring to FIG. 2, to further enhance security, the copying software 22 requires a correct password from the user thereof. Thus, the copying software is pre-programmed with such password, prompts the user to enter such password (step 213), and proceeds only if the correct password is entered (step 215). Thus, such copying software 22 operates only if such software 22 resides on the correct master computer 14 and only if initiated by a user with the correct password. As a result, a non-authorized entity is severely limited in its ability to copy data onto a storage media 10 from a master 12 in the manner to be detailed below.

Once the copying software 22 has verified that it is on the correct master computer 14 and is being operated by a user with the correct password (as detailed in connection with FIG. 2), such software 22 may then be employed to copy the data from the master 12 for purposes of copying such data to a copied-to storage media 10. In one embodiment of the present invention, such copying software 22 copies the master 12 by creating a master image 24 (FIG. 3) from the master 12, as will be explained in more detail below.

Presumably, the master 12 and the data thereon is in its final form and has been created by a trustworthy entity according to a particular operating system. As such, the data is organized on the master 12 according to the particular operating system, and the master 12 includes referencing features specified by the particular operating system for referencing the data. Here, it is to be assumed that the operating system is a disk operating system such as the MICROSOFT DISK OPERATING SYSTEM (DOS) produced and/or marketed by MICROSOFT Corporation of Redmond, Wash., or the like. Of course, other operating systems can be employed without departing from the spirit and scope of the present invention.

The master 12 is of course properly inserted into an appropriate drive in the master computer 14 such that the master computer 14 can access the data on such master 12. In one embodiment of the present invention, and referring now to FIG. 4, the copying software 22 creates such master image 24 (FIG. 3) in the following manner. Preliminarily, such copying software 22 as operating on the master computer 14 accesses the master 12 in the drive thereof, and in particular accesses a file directory on the master 12 (step 401), such as a DOS file allocation table (FAT). Based on such FAT, and as should be appreciate, the copying software 22 can ascertain file information such as what data/files are located on the master 12, where such data/files are located on the master 12, the size of each file, age information about each file, and other file information (step 403).

Based on such file information from the FAT, the copying software 22 then reads all the data on the master 12 into a single image file which constitutes the master image 24 (step 405). Such image file/master image 24 may be stored at least preliminarily in an appropriate memory on the master computer 14, or may be preliminarily stored elsewhere. Preferably, such image file/master image 24 contains not only all the files on the master 12, but each FAT from the master 12 (if there is more than one such FAT), all partition information from the master 12, all boot information from the master 12, all directory entries from the master 12, etc. That is, the image file/master image 24 as created from the master 12 contains the entirety of the information stored on the master 12, whether such information derives from a file, a file management structure, a storage media management structure, or the like. Creating such an image 24 from such master 12 is known or should be apparent to the relevant public, and therefore need not be described herein in any detail.

As may be appreciated, then, by copying the entirety of the master 12 into the single image file/master image 24, such master image 24 may then be employed at a later time to create a copied image of the master 12 on a copied-to storage media 10. Moreover, the copied image on the copied-to storage media 10 causes the copied-to storage media 10 to behave as if it were the master 12. Thus, if the master 12 includes disk information that such master is a 100 megabyte magnetic disk, the copied-to storage media 10 will behave as if it were a 100 megabyte storage disk, even if such copied-to storage media 10 is in fact a 250 megabyte storage disc, for example.

Once the master image 12 is created from the master, such master image 12 is preferably manipulated to include the aforementioned benchmark. In one embodiment of the present invention, such benchmark comprises certain tracking and verification information. Thus, each copied-to storage media 10 as copied from the master image 24 also includes such tracking and verification information/benchmark. Preferably, the tracking and verification information/benchmark is tied to the master image 24/image file or a portion thereof. Accordingly, and importantly, alteration of the image file will cause a mis-match with regard to the tracking and verification information/benchmark in such image file, as will be explained below. Likewise, and also importantly, alteration of the copied-to storage media 10 will also cause a mis-match with regard to the tracking and verification information/benchmark in such storage media 10 as copied from such image file/master image 24.

In one embodiment of the present invention, and as seen in FIG. 3, the tracking and verification information/benchmark includes a part identifier such as a part number or model number. As may be appreciated, such part identifier may be assigned on a random or pre-determined basis, and can be employed to label the image file/master image 24 with an identifier. Such part identifier may take any particular form without departing from the spirit and scope of the present invention. For example, such part identifier may be a 10-digit number, a 20-character alphanumeric, etc. As will be appreciated, the part identifier identifies the master image 24, but may also be employed to verify data on a copied-to storage media 10 when copied from such master image 24.

Preferably, the copying software 22 obtains the part identifier from an appropriate source (step 407) and writes the obtained part identifier into an area of the master image 24/image file (step 409) such that the part identifier appears in an inaccessible area when the image file is copied to the storage media 10. That is, according to the architecture of any particular disk operating system, certain physical space on a corresponding storage media is inaccessible by way of such disk operating system, or more simply is “dead”. For example, in the aforementioned MICROSOFT DOS disk operating system, at least with regard to the IOMEGA ZIP disk and drive as produced and/or marketed by IOMEGA Corporation of Roy, Utah, logical block 0 of the storage media contains boot information, logical block 32 contains the FAT, and logical blocks 1-31 are expected to be blank.

Since such logical blocks 1-31 are expected to be blank, such disk operating system provides no capability to access such logical blocks 1-31, or put another way such logical blocks 1-31 on such storage media are inaccessible by way of such disk operating system. Although inaccessible by the disk operating system, an appropriate utility application may of course be employed to direct the drive receiving the storage media 10 to write information to/read information from such otherwise inaccessible logical blocks 1-31 and perhaps other dead space. Such utility application is known or should be apparent to the relevant public, and therefore need not be described herein in any detail. Preferably, such utility is not normally available to the general public such that the general public cannot normally access such dead space. Thus, the general public cannot normally alter or otherwise compromise data stored in the dead space on the storage media 10.

In one embodiment of the present invention, the part identifier is a 10-byte identifier and is written into the master image 24 to appear in the copied-to storage media in dead space as such. For example, in connection with the aforementioned IOMEGA ZIP disk, such 10-byte identifier may be written to appear in logical block 1. For verification, a 1-byte byte count or the like of the 10-byte identifier may also be written into the master image 24 to appear in such logical block 1 (step 411). For example, the 1-byte checksum and the 10-byte identifier may be written into the master image 24 to appear in that order in logical block 1 of the storage media 24 at the beginning thereof. Of course, the part identifier and the verifying checksum may be written to appear in other areas of dead space, and other forms of verification may be employed, all without departing from the spirit and scope of the present invention. In one embodiment of the present invention, the copying software also stores the part identifier in a separate file 26 (FIG. 5) for later reference (step 413), as will be discussed in more detail below.

In one embodiment of the present invention, the tracking and verification information/benchmark also includes an encrypted security identifier closely tied to the data in the master image 24/image file, such as for example an encrypted checksum of at least a portion of the data in such master image 24/image file. Thus, alteration of such data will result in a mis-match with regard to the encrypted security identifier. In one embodiment of the present invention, the copying software 22 on the master computer 14 develops the encrypted security identifier based on the entire FAT and also based on the part identifier as such items appear in the master image 24/image file. Notably, basing such identifier on the FAT is particularly useful since practically any alteration to the data on the copied-to storage media 10 will result in a change in the FAT thereof, thus resulting in the aforementioned mis-match. Of course, such encrypted security identifier may be based on other elements as they appear in the master image 24/image file without departing from the spirit and scope of the present invention.

In one embodiment of the present invention, the copying software 22 produces the encrypted security identifier by calculating the checksum of each byte in the FAT and in the part identifier (step 415), and then encrypting such checksum by way of any appropriate encrypting algorithm (step 417). Thus, if the FAT or the part identifier changes, the encrypted checksum will no longer match, as will be discussed in more detail below. The encrypting algorithm employed may be a one-way or two-way encrypting algorithm, and may produce an encrypted value having a pre-determined length, such as 100 bytes. Of course, other methods of producing an encrypted security identifier tied to the data in the image file may be employed without departing from the spirit and scope of the present invention.

The copying software 22 then writes the resulting 100-byte encrypted checksum into the aforementioned dead space in the same manner as the part identifier (step 419). For example, such 100-byte encrypted number security identifier may be written into the master image 24 to appear in logical block 1 with the 10 byte part identifier. For additional security, the copying software 22 may also write a 1-byte byte count of the 100-byte encrypted checksum to appear in the logical block 1 (step 421). In one embodiment of the present invention, such 1-byte byte count is written immediately after the 10-byte part identifier, and is immediately followed by the 100-byte encrypted checksum. Of course, other methods of writing the encrypted checksum and related indicia into the dead space may be employed without departing from the spirit and scope of the present invention.

Although it should be apparent to the relevant public, it is nevertheless noted that writing information into the dead space of the copied-to storage media 10 in actuality means writing such information into the corresponding master image 24/image file in an appropriate location thereof such that such information is appropriately copied into the dead space when the master image 24/image file is copied to the copied-to storage media 10. It should also be apparent but again is nevertheless noted that any software that reads from/writes to such dead space, such as the software discussed below, must include or have access to an appropriate utility application in order that such software can in fact direct the drive receiving the copied-to storage media to read from/write to such dead space as appropriate. Further, it should be noted that since such information is not indexed in the FAT of the master image 24/image file or of the copied-to storage media 10, such information must be written into the dead space in a pre-determined location known to each entity that is to access such information.

The encrypted checksum disclosed above is never stored anywhere other than in the master image 24/image file and on the copied-to storage media 10. Instead, such encrypted checksum is re-derived at appropriate times and is then compared with the stored value in the master image 24/image file or on the copied-to storage media to verify that the FAT and the part identifier on the copied-to storage media 10 have not been changed as compared with the FAT and the part identifier in the master image 24/image file produced by copying software 22 on the master computer 14. As should be appreciated, the FAT on the copied-to storage media 10 will change if, for example, a file is added to or deleted from such media 10, a file is altered in size, location, or date of last access, or the like. To summarize, then, any significant change to the data on the copied-to storage media 10 will result in a change to the FAT thereof and will therefore result in a mis-match with regard to the originally derived encrypted checksum.

As it stands, the master image 24/image file produced by the copying software 22 on the master computer 14 includes the entirety of the data on the master 12, and also includes the part identifier and the encrypted checksum stored in dead space. In one embodiment of the present invention, the copying software in addition calculates a second checksum of the entire master image 24/image file, including the part identifier and the encrypted checksum (step 423), and then stores the second checksum in the above-mentioned separate file 26 for later reference (step 425) to ensure that the master image 24/image file has not become corrupted. In such one embodiment, for example, the separate file 26 is an image data file 26 that includes a data structure corresponding to the image file, where the data structure includes an image name as given to the image file, the second checksum, and the part identifier, among other things. Of course, other information may be stored in the image data file without departing from the spirit and scope of the present invention. Moreover, the image data file 26 may have information regarding additional image files, where each image file has a corresponding data structure with such information stored therein. Alternatively, the aforementioned data structure in the image data file may instead be stored in the master image 24/image file, perhaps in the dead space thereof, perhaps obviating the need for such image data file 26.

Now that a master image 24/image file based on the master 12 is present in its finalized form, a production copy of the master 12/master image 24 may be made on a copied-to storage media 10 by way of the production computer 16, and specifically by production software 28 loaded onto the production computer 16. As should be evident, the production computer 16 and production software 28 must have access to the finalized master image 24/image file. In addition, and as will be explained below, such items should also have access to the image data file 26. Such master image 24/image file and such image data file 26 may be located on and accessible from the master computer 14 or the network server 20, or may be located on and accessible to the production computer 16 itself, although such files may be located elsewhere without departing from the spirit and scope of the present invention.

The production computer 16 may be user-directed to make a production copy of the master image 24/image file on a copied-to storage media 10, or may automatically make such a production copy according to a pre-defined routine. In either case, and referring now to FIG. 6, the copied-to storage media 10 is appropriately mounted to an appropriate media drive coupled to the production computer 16 (step 601), the production software 28 on the production computer 16 accesses the master image 24/image file (step 603), and the production software 28 also accesses the image data file 26 with the data structure corresponding to the master image 24/image file, where the data structure includes the image name as given to the master image 24/image file, the second checksum, and the part identifier, among other things (step 605).

In one embodiment of the present invention, after accessing the master image 24/image file and the image data file 26, the production software 28 on the production computer 16 accesses the second checksum from the corresponding data structure in the image data file 26 (step 607), and employs such accessed second checksum to verify that the accessed master image 24/image file is not corrupted. In particular, the production software 28 performs a checksum of the entire accessed master image 24 image file including the part identifier and the encrypted checksum to obtain a performed checksum value (step 609), and compares the performed checksum value with the accessed second checksum to determine whether they match (step 611). If a match is found, the image file is not corrupted, and the production software 28 may proceed (step 613). If a match is not found, the image file is corrupted and the production software 28 does not proceed. Notably, the aforementioned checksum procedure may be performed at any appropriate time without departing from the spirit and scope of the present invention. For example, such procedure is performed each time a master image 24/image file is newly copied to the production computer 16, or each time the master image 24/image file is accessed to make a production copy on a copied-to storage media 10.

Assuming the second checksums compare favorably, the production software 28 next accesses the part identifier as embedded in the dead space in the master image 24/image file (step 615), accesses the part identifier from the corresponding data structure in the image data file 26 (step 617), and compares the master image 24/image file part identifier with the image data file 26 part identifier to determine whether they match (step 619). If a match is found, the image file has not been adulterated, at least with regard to the part-identifier, and the production software 28 may proceed (step 621). If a match is not found, the image file has been adulterated, at least with regard to the part number, and the production software 28 does not proceed. Such adulteration may occur when an unauthorized entity attempts to create a master image 24/image file without benefit of the master computer 14, whereby such unauthorized image file in fact fails to contain a proper part identifier. Of course, such adulteration may also occur under other circumstances.

Assuming the part identifiers compare favorably, the production software 28 next accesses the FAT from the master image 24/image file (step 623), performs a checksum of the FAT and the part identifier (which was previously accessed in step 615) (step 625), and then encrypts such checksum by way of the same encrypting algorithm previously employed by the master computer 14 to produce a production computer encrypted checksum (step 627). The production software 28 then accesses the encrypted checksum as embedded in the dead space in the master image 24/image file (step 629), and compares the image file encrypted checksum with the production computer encrypted checksum to determine whether they match (step 631). If a match is found, the master image 24/image file has not been adulterated, at least in any substantial way such that the FAT or the part identifier would be affected, and the production software 28 may proceed (step 633). If a match is not found, the master image 24/image file has been so adulterated, and the production software 28 does not proceed. Again, such adulteration may occur when an unauthorized entity attempts to create a master image 24/image file without benefit of the master computer 14, whereby such unauthorized master image 24/image file in fact fails to contain a proper encrypted checksum. Of course, such adulteration may also occur under other circumstances.

To summarize, then, prior to producing a producing a production copy on storage media 10 from the master image 24/image file, the production software 28 first verifies the part identifier, which is an unencrypted value, and then verifies the checksum, which is an encrypted value. If either verify fails, such image file is not employed to make the production copy. However, and of course, if both verifies succeed, such image file may then be appropriately employed by the production software 28 on the production computer 16 to produce the production copy on the mounted production (copied-to) storage media (step 635).

As should be appreciated, producing a production copy from a master image 24/image file as is done in step 635 is generally known to the relevant public, and therefore need not be described here in any further detail. It should also be appreciated that any appropriate method for producing such production copy from such master image 24/image file may be employed without departing from the spirit and scope of the present invention. The production copy on the storage media 10 is identical to the master 12 in all respects, except that such production copy has the embedded encrypted checksum and the embedded part identifier in the aforementioned dead space.

Once the production software 28 on the production computer 16 makes the production copy of the master 12 on the storage media 10 from the master image 24/image file, such storage media 10 must be compared with the master image 24/image file to ensure that the production copy is an accurate rendering of the master image 24/image file. In one embodiment of the present invention, such a compare is performed by comparison software 30 on the comparison computer 18 (FIG. 1). As before with regard to the production computer 16, and turning now to FIG. 7, the production copy of the storage media 10 is appropriately mounted to an appropriate drive of the comparison computer 18 (step 701), and the comparison software 30 on the comparison computer 18 has access to the master image 24/image file and the corresponding data structure in the image data file 26. Essentially, the comparison software 30 repeats the steps performed by the production software with regard to the second checksum, the part identifier, and the encrypted checksum before actually performing a compare, except that such functions are performed with regard to the mounted production copy of the storage media 10, and not the master image 24/image file.

In particular, the comparison software 30 on the comparison computer 16 accesses the master image 24/image file (step 703), the comparison software 30 also accesses the image data file 26 with the data structure corresponding to the master image 24/image file (step 705), and the second checksum from the corresponding data structure in the image data file 26 (step 707), and employs such accessed second checksum to verify that the accessed master image 24/image file is not corrupted. In particular, the comparison software 30 performs a checksum of the entire accessed master image 24/image file including the part identifier and the encrypted checksum to obtain a performed checksum value (step 709), and compares the performed checksum value with the accessed second checksum to determine whether they match (step 711). If a match is found, the image tile is not corrupted, and the comparison software 30 may proceed (step 713). If a match is not found, the image file is corrupted and the comparison software 30 does not proceed.

Assuming the second checksums compare favorably, the comparison software 30 next accesses the part identifier as embedded in the dead space in the production copy of the storage media 10 (step 715), accesses the part identifier from the corresponding data structure in the image data file 26 (step 717), and compares the master image 24/image file part identifier with the image data file 26 part identifier to determine whether they match (step 719). If a match is found, the data on the storage media 10 has not been adulterated, at least with regard to the part identifier, and the comparison software 30 may proceed (step 721). If a match is not found, the data on the storage media 10 has been adulterated, at least with regard to the part number, and the comparison software 30 does not proceed.

Assuming the part identifiers compare favorably, the comparison software 30 next accesses the FAT from the production copy of the storage media 10 (step 723), performs a checksum of the FAT and the part identifier (which was previously accessed in step 715) (step 725), and then encrypts such checksum by way of the same encrypting algorithm previously employed by the master computer 14 to produce a production computer encrypted checksum (step 727). The comparison software 30 then accesses the encrypted checksum as embedded in the dead space in the production copy of the storage media 10 (step 729), and compares the production copy encrypted checksum with the comparison computer encrypted checksum to determine whether they match (step 731). If a match is found, the data on the storage media 10 has not been adulterated, at least in any substantial way such that the FAT or the part identifier would be affected, and the comparison software 30 may proceed (step 733). If a match is not found, the data on the storage media has been so adulterated, and the comparison software 30 does not proceed.

To summarize, then prior to comparing the production copy of the storage media 10 with the master image 24/image file, the comparison software 30 first verifies the part identifier of the production copy, which is an unencrypted value, and then verifies the checksum of the production copy, which is an encrypted value. If either verify fails, such production copy is deemed to be corrupted or otherwise improperly made. However, and of course, if both verifies succeed, the comparison software 30 may then compare the production copy of the storage media 10 with the master image 24/image file in detail (step 735).

As should be appreciated, such detailed comparison is generally known to the relevant public, and therefore need not be described here in any further detail. It should also be appreciated that any appropriate method for performing such detailed comparison may be employed without departing from the spirit and scope of the present invention. In general, the detailed comparison by the comparison software 30 on the comparison computer 18 ensures that the production copy of the storage media 10 is a faithful rendition of the master image 24/image file. Assuming the storage media compare succeeds, such storage media is approved for distribution. Otherwise, the storage media is not approved and may be discarded or may be employed for another production copy, assuming the storage media is not physically defective or otherwise unsuitable.

It is to be noted that in performing the various steps detailed above, the copying software 22, production software 28, and comparison software 30 may employ any appropriate methodologies and any appropriate programming, and may be written in any appropriate programming language, all without departing from the spirit and scope of the present invention. Since such methodologies, programming, and languages should be known or apparent to the relevant public, further details thereof are not disclosed herein.

As should now be appreciated, in the present invention, benchmarks are associated with a master image 24/image file and are employed to ensure that such image file is a faithful representative of a master 12, and also to ensure that a production copy of storage media 10 made from the image file is a faithful reproduction of such image file. Thus, an intervening entity cannot manipulate the image file or the production copy without such manipulation being detectable. In addition, if the production copy of the storage media 10 is distributed and returned, the comparison software 30 on the comparison computer 18 or another computer may perform a compare of the returned storage media 10 with the corresponding image file to determine whether the returned storage media 10 has been altered in any manner. Depending on the purpose and result of the determination, then, appropriate action may be taken.

In the foregoing description, it can be seen that the present invention comprises a new and useful benchmark that is placed on an master image 24/image file made from a master 12 and therefore on a production copy of a storage media 10 made from the master image 24/image file. Accordingly, the benchmark is closely tied to such master 12, and reference may be made to the benchmark at various times to determine whether the data in the master image 24/image file and/or on the storage media 10 has changed as compared with the master 12. It should be appreciated that changes could be made to the embodiments described above without departing from the inventive concepts thereof. It should be understood, therefore, that this invention is not limited to the particular embodiments disclosed, but it is intended to cover modifications within the spirit and scope of the present invention as defined by the appended claims.

Adams, Chad, Hales, Ronald F., Short, Robert L., Heiser, Eric Ryon

Patent Priority Assignee Title
Patent Priority Assignee Title
4446519, May 26 1981 CORBAN INTERNATIONAL, LTD , Method and apparatus for providing security for computer software
4757534, Dec 18 1984 International Business Machines Corporation Code protection using cryptography
5212729, Jan 22 1992 Computer data security device and method
5446874, Dec 23 1993 International Business Machines Corp.; International Business Machines Corp Automated benchmarking with self customization
5557674, Nov 18 1994 Kok-Wah, Yeow Absolute static lock of files and directories on magnetic disk storage media in single machine personal microcomputers
5603024, Oct 08 1993 International Business Machines Corporation Lossless distribution of time series data in a relational data base network
5630092, Oct 20 1994 International Business Machines System and method for transferring compressed and uncompressed data between storage systems
5805699, May 20 1996 Fujitsu Limited Software copying system
5832520, Nov 22 1996 Miller, Call, Plauck and Miller Automatic file differencing and updating system
5835953, Oct 13 1994 EMC Corporation Backup system that takes a snapshot of the locations in a mass storage device that has been identified for updating prior to updating
5870759, Oct 09 1996 Oracle International Corporation System for synchronizing data between computers using a before-image of data
5915264, Apr 18 1997 Oracle America, Inc System for providing write notification during data set copy
5943605, Apr 16 1997 THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT Arrangement for controlling extraction of data from a broadband digital stream employing a symbol table for translating symbolic program names to program and channel numbers
5946690, Dec 17 1996 INCA Technology, Inc. NDC consistency reconnect mechanism
5983349, Jul 22 1996 Sony Corporation Changer apparatus, method for locking security protection thereof, method for unlocking executing commands thereon, and computer for sending commands thereto
5991542, Sep 13 1996 Apple Inc Storage volume handling system which utilizes disk images
6148292, Jul 14 1997 Francotyp-Postalia AG & Co. Method for statistics mode reloading and for statistical acquisition according to statistics classes in the storing of a dataset
6223269, Sep 27 1997 EMC IP HOLDING COMPANY LLC Stacked mapped storage system
6260113, Nov 12 1998 HGST NETHERLANDS B V Method and apparatus defining a miss list and producing dial-in hit ratios in a disk storage benchmark
6282654, Aug 29 1997 Sony Corporation Information signal recording/reproducing system, information signal recording device, information signal reproducing device and information signal recording/reproducing process
6330572, Jul 15 1998 Microsoft Technology Licensing, LLC Hierarchical data storage management
6434681, Dec 02 1999 EMC IP HOLDING COMPANY LLC Snapshot copy facility for a data storage system permitting continued host read/write access
6513050, Aug 17 1998 Connected Place Limited Method of producing a checkpoint which describes a box file and a method of generating a difference file defining differences between an updated file and a base file
6535894, Jun 01 2000 Oracle America, Inc Apparatus and method for incremental updating of archive files
6583799, Nov 24 1999 Shutterfly, LLC Image uploading
6629110, Jan 10 2000 MICRO FOCUS LLC Administration of a differential backup system in a client-server environment
6681212, Apr 23 1999 Internet-based automated system and a method for software copyright protection and sales
6718446, Feb 11 2000 Bozak Investments, LLC Storage media with benchmark representative of data originally stored thereon
6772133, Mar 05 1999 Kabushiki Kaisha Toshiba Information recording device and information reproducting device
6782190, Sep 02 1998 MAXELL, LTD Copy protection apparatus and method
6865550, Feb 03 2000 Monument Peak Ventures, LLC System for secure distribution and playback of digital data
6920565, Jun 05 2000 Bozak Investments, LLC Method and system for providing secure digital music duplication
7010144, Jan 13 2000 DIGIMARC CORPORATION AN OREGON CORPORATION Associating data with images in imaging systems
7343495, May 13 1997 Kabushiki Kaisha Toshiba Information recording apparatus, information reproducing apparatus, and information distribution system
20010034737,
20020073067,
20020161860,
20020196940,
20070300222,
EP813194,
EP984346,
EP1035543,
JP11073725,
RE43936, Feb 02 2000 Xylon LLC Method and system for providing secure digital music duplication
WO9955055,
WO3001352,
///////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Nov 28 2000SHORT, ROBERT L Iomega CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0290400225 pdf
Nov 30 2000PETERS, ERIC RYONIomega CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0290400225 pdf
Dec 01 2000ADAMS, CHADIomega CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0290400225 pdf
Dec 01 2000HALES, RONALD F Iomega CorporationASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0290400225 pdf
Apr 06 2006Bozak Investments, LLC(assignment on the face of the patent)
Jun 07 2006Iomega CorporationBozak Investments, LLCASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0205570243 pdf
Jun 23 2015BOZAK INVESTMENTS LLCXylon LLCMERGER SEE DOCUMENT FOR DETAILS 0362500556 pdf
Date Maintenance Fee Events
Sep 24 2015M1553: Payment of Maintenance Fee, 12th Year, Large Entity.


Date Maintenance Schedule
Jun 24 20174 years fee payment window open
Dec 24 20176 months grace period start (w surcharge)
Jun 24 2018patent expiry (for year 4)
Jun 24 20202 years to revive unintentionally abandoned end. (for year 4)
Jun 24 20218 years fee payment window open
Dec 24 20216 months grace period start (w surcharge)
Jun 24 2022patent expiry (for year 8)
Jun 24 20242 years to revive unintentionally abandoned end. (for year 8)
Jun 24 202512 years fee payment window open
Dec 24 20256 months grace period start (w surcharge)
Jun 24 2026patent expiry (for year 12)
Jun 24 20282 years to revive unintentionally abandoned end. (for year 12)