Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2002-01-14
2009-02-24
Moise, Emmanuel L. (Department: 2437)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S164000, C713S165000, C713S194000
Reexamination Certificate
active
07496757
ABSTRACT:
A software security system is arranged to verify the authenticity of each element of a Java Virtual Machine installation. A digital signature is attached to each file of the JVM installation. A loader (20) verifies the digital signature of the JVM DLL (30). The JVM DLL 30 then verifies the digital signature of each other DLL and configuration file to be loaded (40, 50, 60, 70), and only loads those files which have successfully verified digital signatures. In this way the security of the JVM is enhanced, a user has greater confidence that the Java applications will function correctly, and the detection of incorrect or damaged JVM installations is improved.
REFERENCES:
patent: 5421006 (1995-05-01), Jablon et al.
patent: 5757914 (1998-05-01), McManis
patent: 5915085 (1999-06-01), Koved
patent: 5916308 (1999-06-01), Duncan et al.
patent: 5970145 (1999-10-01), McManis
patent: 5970252 (1999-10-01), Buxton et al.
patent: 5991774 (1999-11-01), Tate et al.
patent: 6070239 (2000-05-01), McManis
patent: 6078909 (2000-06-01), Knutson
patent: 6151703 (2000-11-01), Crelier
patent: 6157721 (2000-12-01), Shear et al.
patent: 6546487 (2003-04-01), McManis
patent: 6651186 (2003-11-01), Schwabe
patent: 6802006 (2004-10-01), Bodrov
patent: 6865742 (2005-03-01), Khare et al.
patent: 2004/0139342 (2004-07-01), Aho et al.
patent: 2005/0251682 (2005-11-01), Collins et al.
patent: 2006/0064576 (2006-03-01), Chen
patent: 2007/0143629 (2007-06-01), Hardjono et al.
patent: 2007/0198841 (2007-08-01), Lundblade et al.
Menezes et al., Handbook of Applied Cryptography, 1997, CRC Press, pp. 543-550.
Fong et al., “Proof Linking: An Architecture for Modular Verification of Dynamically-Linked Mobile Code”, 1998, ACM.
Koved et al., “The Evolution of Java Security”, 1998, IBM.
Microsoft Computer Dictionary, 4thed., Microsoft Press, 1999, p. 242.
Microsoft Press Computer Dictionary, 3rd ed., 1997, Microsoft Press, p. 287.
Microsoft Computer Dictionary, 5th ed., 2002, Microsoft Press, p. 93.
W.A. Arbaugh, D.J. Farber, J.M. Smith, “A secure and reliable bootstrap architecture,” Security and Privacy, IEEE Symposium on, vol. 0, No. 0, pp. 0065, 1997 IEEE Symposium on Security and Privacy, 1997.
Abbott Paul Harry
Koved Lawrence
Nadalin Anthony Joseph
Pistoia Marco
Harrington & Smith PC
International Business Machines - Corporation
Moise Emmanuel L.
Williams Jeffery
LandOfFree
Software verification system, method and computer program... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Software verification system, method and computer program..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Software verification system, method and computer program... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4136801