Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Patent
1996-07-12
1999-12-21
Beausoliel, Jr., Robert W.
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
G06F 1214
Patent
active
060063289
ABSTRACT:
A software-based computer security enhancing process and graphical software-authenticity method, and a method to apply aspects of the two are disclosed. The process provides protection against certain attacks on executable software by persons or other software used on the computer. Software using this process is protected against eavesdropping (the monitoring of software, applications, the operating system, disks, keyboard, or other devices to record (steal) identification, authentication or sensitive data such as passwords, User-ID's, credit-card numbers and expiry dates, bank account and PIN numbers, smart-card data, biometric information (for example: the data comprising a retina or fingerprint scan), or encryption keys), local and remote tampering (altering software to remove, disable, or compromise security features of the altered software) examination (viewing the executable program, usually with the intent of devising security attacks upon it), tracing (observing the operating of an executable program step-by-step), and spoofing (substituting counterfeit software to emulate the interface of authentic software in order to subvert security) by rogues (eg: Trojan Horses, Hackers, Viruses, Terminate-and-stay-resident programs, co-resident software, multi-threaded operating system processes, Worms, Spoof programs, key-press password capturers, macro recorders, sniffers, and other software or subversions). Aspects include executable encryption, obfuscation, anti-tracing, anti-tamper & self-verification, runtime self-monitoring, and audiovisual authentication (math, encryption, and graphics based method permitting users to immediately recognise the authenticity and integrity of software). FIG. 5 in the specification depicts the many components and their interaction.
REFERENCES:
patent: 4918653 (1990-04-01), Johri et al.
patent: 4945468 (1990-07-01), Carson et al.
patent: 5343527 (1994-08-01), Moore
patent: 5488664 (1996-01-01), Shamir
patent: 5521722 (1996-05-01), Colvill et al.
patent: 5530752 (1996-06-01), Rubin
patent: 5590199 (1996-12-01), Krajewski, Jr. et al.
patent: 5606609 (1997-02-01), Houser et al.
patent: 5613012 (1997-03-01), Hoffman et al.
patent: 5664099 (1997-09-01), Ozzie et al.
Albert Philip H.
Beausoliel, Jr. Robert W.
Drake Christopher N.
Elmore Stephen C.
Kanzake, Ph.D. Kim
LandOfFree
Computer software authentication, protection, and security syste does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Computer software authentication, protection, and security syste, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer software authentication, protection, and security syste will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-516889