Method of protecting the integrity of a computer program

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S189000, C713S193000, C713S194000

Reexamination Certificate

active

10175343

ABSTRACT:
A method of protecting the integrity of a computer program running on a computer device includes a procedure of detecting whether or not an unauthorized modification of the address space of the program has occurred and terminating program execution if an authorized modification is detected and continuing program execution if no such modification has been detected. A communication method between at least two communication parties of a computing device includes the step of generating at each of the communication parties for every communication sequence at runtime a private key and a public key for a digital signature, making available the public key to the other communication parties and performing the communication between the communication parties using a digital signature based on the private and public keys. Both methods provide improved protection against possible violations of integrity and authenticity by malicious programs on a local computer system.

REFERENCES:
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4310720 (1982-01-01), Check, Jr.
patent: 4328542 (1982-05-01), Anastas et al.
patent: 4494114 (1985-01-01), Kaish
patent: 4609777 (1986-09-01), Cargile
patent: 5343527 (1994-08-01), Moore
patent: 5673315 (1997-09-01), Wolf
patent: 6149522 (2000-11-01), Alcorn et al.
European Search Report from EU 02006935.7 dated Nov. 14, 2002.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of protecting the integrity of a computer program does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of protecting the integrity of a computer program, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of protecting the integrity of a computer program will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3833245

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.