System and method for generating trusted, architecture specific,

Electrical computers and digital processing systems: multicomput – Computer-to-computer data routing – Least weight routing

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

395701, G06F 1563, G06F 945

Patent

active

060675756

ABSTRACT:
A distributed computer system has a program compiling computer and a program executing computer. The program compiling computer is operated by a compiling party and includes a compiler that, when the digital signature of the originating party of an architecture neutral program has been verified, (A) compiles the architecture neutral program code of the architecture neutral program into architecture specific program code in the architecture specific language identified by the compile to information in the architecture neutral program, and (B) appends to the architecture specific program code a digital signature of the compiling party to generate an architecture specific program. The program executing computer is operated by an executing party and includes an architecture specific program executer that executes the architecture specific program code of the architecture specific program when the digital signature of the originating party of the architecture neutral program has been verified, the digital signature of the compiling party of the architecture specific program has been verified, and the compiling party has been determined to be a member of a defined set of trusted compiling parties.

REFERENCES:
patent: 5224160 (1993-06-01), Paulini et al.
patent: 5343527 (1994-08-01), Moore
patent: 5359659 (1994-10-01), Rosenthal
patent: 5421006 (1995-05-01), Jablon et al.
patent: 5432937 (1995-07-01), Tevanian et al.
patent: 5475753 (1995-12-01), Barbara et al.
patent: 5479509 (1995-12-01), Ugon
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5724425 (1998-03-01), Chang et al.
Sun Microsystems, The Java Language Environment : A White Paper, pp. 1-86, Oct., 1995.
Mohay G. et al., "Calss-computer architecture for secure systems", Sixteenth Australian Computer Conference. ACSC-16, Brisbane, QLD., Australia, Feb. 1993, (pp. 1-5).
Van Hoff A., "Java and Internet programming", Dr. Dobb's Journal, Aug. 1995, USA, vol. 20, No. 8, pp. 56, 58, 60-61, 101-102, XP000570180 ISSN 1044-789X.
van Hoff, Arthur; java and Internet Programming: Dr. Dobb's Journal on CD-ROM; pp. 1-8, Aug., 1995.
Schneier, Bruce; Untangling Public-Key Cryptography; Dr. Dobb's Journal on CD-ROM; pp. 1-13, May 1992.
Stallings, William; SHA: The Secure Hash Algorithm; Dr. Dobb's Journal on CD-ROM; pp. 1-3, Apr., 1994.
Schneier, Bruce; One-Way Hash Functions; Dr. Dobb's Journal on CD-ROM; pp. 1-9, Sep., 1991.
Stallings, William; Make it real (using authentication in network security; LAN Magazine v8 n9 p105(6)), Sep., 1993.
Davida et al; Defending Systems Against Viruses through Cryptographic Authentication; IEEE; pp. 312-318, Jul.,1989.
Gosling et al; The Java language Environment: A White Paper, May 1995.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for generating trusted, architecture specific, does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for generating trusted, architecture specific,, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for generating trusted, architecture specific, will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1844188

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.