Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-03-29
2005-03-29
Song, Hosuk (Department: 2135)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S168000, C713S169000
Reexamination Certificate
active
06874087
ABSTRACT:
Method, system and computer program product are provided for monitoring integrity of at least one of an executable module and an associated protected service provider (PSP) module, wherein the PSP module provides a protected service function to the executable module. A symbiont module is provided for checking integrity of at least one of the PSP module and the executable module, wherein the symbiont module comprises a separate module from the PSP module. The PSP module includes code for cross-checking integrity of the symbiont module, wherein the symbiont module checking and the PSP module cross-checking together monitor integrity of at least one of the executable module and the PSP module. Further, the protected service function can be divided into at least a first component and a second component, with the first component being implemented within the PSP module and the second component being implemented within the symbiont module.
REFERENCES:
patent: 5398196 (1995-03-01), Chambers
patent: 5421006 (1995-05-01), Jablon et al.
patent: 5440723 (1995-08-01), Arnold et al.
patent: 5572590 (1996-11-01), Chess
patent: 5696822 (1997-12-01), Nachenberg
patent: 5765030 (1998-06-01), Nachenberg et al.
patent: 5826013 (1998-10-01), Nachenberg
patent: 5991399 (1999-11-01), Graunke et al.
patent: 6105137 (2000-08-01), Graunke et al.
patent: 6363486 (2002-03-01), Knapton, III
patent: 6421779 (2002-07-01), Kuroda et al.
patent: 2000-293370 (2000-10-01), None
Aucsmith et al., “Protecting Software from Reverse Engineering and Modification,” Nikkei Electronics, Jan. 5, 1998, pp. 209-220.
Kamoshida, et al., “On Constructing Tamper Resistant Software,” Technical Report of IEICE, Dec. 19, 1997, pp. 69-78.
IBM Technical Disclosure Bulletin, “Mean to Protect System From Virus”, vol. 37, No. 8, Aug. 1994, pp. 659-660.
IBM Technical Disclosure Bulletin, “System For Detecting Undesired Alteration of Software”, vol. 32, No. 11, Apr. 1990, pp. 48-50.
IBM Technical Disclosure Bulletin, “Automated ProgramAnalysis for Computer Virus Detection”, vol. 34, No. 2, Jul. 1991, pp. 415-416.
IBM Technical Disclosure Bulletin, “Trojan Horse and Virus Detection Using Real-Time Auditing”, vol. 34, No. 7B, Dec. 1991, pp. 78-81.
Fetkovich John Edward
Wilhelm, Jr. George William
Heslin Rothenberg Farley & & Mesiti P.C.
International Business Machines - Corporation
Radigan, Esq. Kevin P.
Song Hosuk
Steinberg, Esq. William H.
LandOfFree
Integrity checking an executable module and associated... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Integrity checking an executable module and associated..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Integrity checking an executable module and associated... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3418545