Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files
Patent
1997-11-13
2000-08-01
Stamber, Eric W.
Data processing: financial, business practice, management, or co
Business processing using cryptography
Usage protection of distributed data files
705 51, G06F 944
Patent
active
060980540
ABSTRACT:
A system and method for enforcing configuration parameters and detecting tampering of configuration files used by a software application. An enforced configuration packet (ECP) file generator generates an enforced configuration packet (ECP) file from a configuration parameter description file containing a set of configuration parameters. The ECP file includes a set of enforced configuration packets, which each include one of the configuration parameters from the ECP description file and a corresponding configuration parameter fingerprint unique to that particular configuration parameter. At startup of the software application, an ECP file reader validates the ECP file and each of the enforced configuration packets contained in the ECP file. Validation is achieved by regenerating the configuration parameter fingerprint of each configuration parameter and comparing the regenerated fingerprint to the fingerprint contained in the enforced configuration packet. If any of the fingerprints in the enforced configuration packets do not match their regenerated fingerprint, the ECP file reader indicates that the configuration parameter fingerprint is not valid. If all of the configuration parameter fingerprints match up to their regenerated fingerprints, and the ECP file itself is determined to be valid, the configuration parameters encoded in the ECP file are used by the software application to set up its configuration.
REFERENCES:
patent: 4981370 (1991-01-01), Dziewit et al.
patent: 5031214 (1991-07-01), Dziewit et al.
patent: 5058162 (1991-10-01), Santon et al.
patent: 5163091 (1992-11-01), Dziewit et al.
patent: 5191613 (1993-03-01), Dziewit et al.
patent: 5327563 (1994-07-01), Singh
patent: 5375206 (1994-12-01), Hunter et al.
patent: 5745879 (1998-04-01), Wyman
patent: 5758068 (1998-05-01), Brandt et al.
patent: 5758069 (1998-05-01), Olsen
patent: 6012033 (2000-01-01), Vanden Berge
patent: 6023766 (2000-02-01), Yamamura
Bruce Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, Second Edition, 483, Oct. 1995.
GLOBEtrotter Software, Inc., FLEXlm Reference Manual: Version 5.1, Nov. 1996.
GLOBEtrotter Software, Inc., FLEXlm Programmer's Manual: Version 5.1, Nov. 1996.
Bruce Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, Second Edition, 563-65, Oct. 1995.
GLOBEtrotter Software, Inc., FLEXlm Reference Manual: Version 6.0, Oct. 1997.
Garcia Julio Cesar
McCollom William Girard
Smith Darren Drew
Hewlett--Packard Company
Pender Michael
Stamber Eric W.
LandOfFree
Method of securing software configuration parameters with digita does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method of securing software configuration parameters with digita, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of securing software configuration parameters with digita will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-673403