Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Patent
1998-01-22
2000-09-19
De Cady, Albert
Electrical computers and digital processing systems: support
Computer program modification detection by cryptography
713176, 713189, 380 25, 714758, G06F 900
Patent
active
061227382
ABSTRACT:
System and method for verifying the integrity of contents within a computer file. A security value S is stored within the file. A verification function f is applied against the entire contents of the file including S, where f is a function of S. Results R of the applying step are compared against a preselected value r, where r is not stored within the file. When R equals r, a determination is made that the file has not been modified. f is typically a distributive invertible function such as the Cyclic Redundancy Check (CRC) function known as modulo p, where p is a prime number and is one bit greater than the length of S. Typically, the value of r is zero. Before executing the verification function f, a check generating program is first executed. This check generating program is executed by a computer that is remote from the file, further enhancing the security of the system.
REFERENCES:
patent: 4766537 (1988-08-01), Zolnowsky
patent: 4888798 (1989-12-01), Earnest
patent: 5050212 (1991-09-01), Dyson
patent: 5103476 (1992-04-01), Waite et al.
patent: 5182770 (1993-01-01), Medveczky et al.
patent: 5432851 (1995-07-01), Scheidt et al.
patent: 5530757 (1996-06-01), Krawczyk
patent: 5548532 (1996-08-01), Menand et al.
patent: 5606609 (1997-02-01), Houser et al.
patent: 5625693 (1997-04-01), Rohatgi et al.
patent: 5661848 (1997-08-01), Bonke et al.
patent: 5799088 (1998-08-01), Raike
patent: 5802080 (1998-09-01), Westby
patent: 5832207 (1998-11-01), Little et al.
patent: 5854759 (1998-12-01), Kaliski, Jr. et al.
patent: 6000032 (1999-12-01), Millard
patent: 6014767 (2000-01-01), Glaise
patent: 6048090 (2000-04-01), Zook
McNamara, John E., Technical Aspects of Data Communication, 2.sup.nd Ed. 1982, Digital Equipment Corporation, U.S.A., pp. 110-122.
Ore, Oystein, Number Theory and Its History, 1976, Gudrun Ore, U.S.A., pp. 124-129.
Schneier, Bruce, Applied Cryprography, 2.sup.nd Ed. 1996, Bruce Schneier, U.S.A., pp. 436-441.
Nair, et al., A Symbol Based Algorithm for Hardware Implementation of Cyclic Redundancy Check, IEEE, 1997.
Cady Albert De
Lamarre Guy
Symantec Corporation
LandOfFree
Computer file integrity verification does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Computer file integrity verification, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer file integrity verification will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1084206