Secure access to software modules

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 25, H04L 900

Patent

active

060000325

ABSTRACT:
Apparatus and method for obtaining a security value (50) that enables a calling module (7) to achieve secure access to a called module (5) within a digital computer (1). A distributive invertible function f is selected. f may be the cyclic redundancy check function modulo p, where p is a prime number. A desired residual value r associated with the application of f and a desired size of the security value (50) are also selected. Space is allocated within the called module (5) for storing the security value (50). A portion of the called module (5) is designated as a test block (51). f is applied to a numerical representation of test block (51) to generate a first challenge value CV1. f is applied to a numerical value of the security value (50) and a number representative of the location of the security value (50) within the called module (5) to calculate a second challenge value CV2. n is the number of bits from the beginning of the security value (50) to the end of the called module (5). CV1 and CV2 are typically calculated by called module (5). Calling module (7) then calculates the security value (50) based upon CV1 and CV2, and using f. Called module (5) uses this calculated value of the security value (50) in function f. If this application of f provides the desired residual value r, then it is known that calling module (7) had proper access to called module (5). At this point, one or more functions accessible by called module (5) may be activated. Access codes may be coded within residual value r itself.

REFERENCES:
patent: 4766537 (1988-08-01), Zolnowsky
patent: 4888798 (1989-12-01), Earnest
patent: 5103476 (1992-04-01), Waite et al.
patent: 5182770 (1993-01-01), Medveczky et al.
patent: 5432851 (1995-07-01), Scheidt et al.
McNamara, John E., Technical Aspects of Data Communication, 2.sup.nd Ed. 1982, Digital Equipment Corporation, U.S.A., pp. 110-122.
Ore, Oystein, Number Theory and Its History, 1976, Gudrun Ore, U.S.A., pp. 124-129.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure access to software modules does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure access to software modules, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure access to software modules will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-836729

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.