Method of securing software configuration parameters with digita

Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

705 51, G06F 944

Patent

active

060980540

ABSTRACT:
A system and method for enforcing configuration parameters and detecting tampering of configuration files used by a software application. An enforced configuration packet (ECP) file generator generates an enforced configuration packet (ECP) file from a configuration parameter description file containing a set of configuration parameters. The ECP file includes a set of enforced configuration packets, which each include one of the configuration parameters from the ECP description file and a corresponding configuration parameter fingerprint unique to that particular configuration parameter. At startup of the software application, an ECP file reader validates the ECP file and each of the enforced configuration packets contained in the ECP file. Validation is achieved by regenerating the configuration parameter fingerprint of each configuration parameter and comparing the regenerated fingerprint to the fingerprint contained in the enforced configuration packet. If any of the fingerprints in the enforced configuration packets do not match their regenerated fingerprint, the ECP file reader indicates that the configuration parameter fingerprint is not valid. If all of the configuration parameter fingerprints match up to their regenerated fingerprints, and the ECP file itself is determined to be valid, the configuration parameters encoded in the ECP file are used by the software application to set up its configuration.

REFERENCES:
patent: 4981370 (1991-01-01), Dziewit et al.
patent: 5031214 (1991-07-01), Dziewit et al.
patent: 5058162 (1991-10-01), Santon et al.
patent: 5163091 (1992-11-01), Dziewit et al.
patent: 5191613 (1993-03-01), Dziewit et al.
patent: 5327563 (1994-07-01), Singh
patent: 5375206 (1994-12-01), Hunter et al.
patent: 5745879 (1998-04-01), Wyman
patent: 5758068 (1998-05-01), Brandt et al.
patent: 5758069 (1998-05-01), Olsen
patent: 6012033 (2000-01-01), Vanden Berge
patent: 6023766 (2000-02-01), Yamamura
Bruce Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, Second Edition, 483, Oct. 1995.
GLOBEtrotter Software, Inc., FLEXlm Reference Manual: Version 5.1, Nov. 1996.
GLOBEtrotter Software, Inc., FLEXlm Programmer's Manual: Version 5.1, Nov. 1996.
Bruce Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, Second Edition, 563-65, Oct. 1995.
GLOBEtrotter Software, Inc., FLEXlm Reference Manual: Version 6.0, Oct. 1997.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of securing software configuration parameters with digita does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of securing software configuration parameters with digita, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of securing software configuration parameters with digita will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-673403

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.