System and method for secure authentication of external...

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S194000

Reexamination Certificate

active

06978375

ABSTRACT:
An external module loads into an entity's memory and is transformed by two functions. These are namely, the STOMP function and the UNSTOMP function. One or both of these functions is based on the actual code that is found in a legitimate version of the external module. The STOMP-UNSTOMP pair produces an external module that works differently if even a single byte of code in the external module has been changed by an attacker. The STOMP transforms the external module and makes it temporarily unusable whilst conversely, the UNSTOMP repairs the damage and makes it workable again. Thus, if the module is not authentic, the pairing between the STOMP and UNSTOMP is broken. Therefore, a patched module from a hacker remains unusable since the STOMP and UNSTOMP transformations do not produce a working external module. Because of the STOMP and UNSTOMP technique, an application is secure because if an external module is free from tampering then the application executes normally. In the event that an illicitly patched external module is loaded then the application fails. In either case, no audio, video or information content is illegally copied because of the disablement of the external module by the STOMP-UNSTOMP procedure.

REFERENCES:
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4272810 (1981-06-01), Gates et al.
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4424414 (1984-01-01), Hellman et al.
patent: 4463387 (1984-07-01), Hashimoto et al.
patent: 4528643 (1985-07-01), Freeny, Jr.
patent: 4731840 (1988-03-01), Mniszewski et al.
patent: 4757534 (1988-07-01), Matyas et al.
patent: 4782529 (1988-11-01), Shima
patent: 4803725 (1989-02-01), Horne et al.
patent: 4809327 (1989-02-01), Shima
patent: 4825306 (1989-04-01), Robers
patent: 4868687 (1989-09-01), Penn et al.
patent: 4868877 (1989-09-01), Fischer
patent: 4878246 (1989-10-01), Pastor et al.
patent: 4879747 (1989-11-01), Leighton et al.
patent: 4905163 (1990-02-01), Garber et al.
patent: 4926479 (1990-05-01), Goldwasser et al.
patent: 4944006 (1990-07-01), Citta et al.
patent: 4972472 (1990-11-01), Brown et al.
patent: 4995082 (1991-02-01), Schnorr
patent: 5005200 (1991-04-01), Fischer
patent: 5130792 (1992-07-01), Tindell et al.
patent: 5159634 (1992-10-01), Reeds, III
patent: 5214702 (1993-05-01), Fischer
patent: 5220604 (1993-06-01), Gasser et al.
patent: 5224163 (1993-06-01), Gasser et al.
patent: 5224166 (1993-06-01), Hartman, Jr.
patent: 5260788 (1993-11-01), Takano et al.
patent: 5261002 (1993-11-01), Perlman et al.
patent: 5276901 (1994-01-01), Howell et al.
patent: 5315658 (1994-05-01), Micali
patent: 5319705 (1994-06-01), Halter et al.
patent: 5343527 (1994-08-01), Moore
patent: 5347580 (1994-09-01), Molva et al.
patent: 5355302 (1994-10-01), Martin et al.
patent: 5369705 (1994-11-01), Bird et al.
patent: 5371794 (1994-12-01), Diffie et al.
patent: 5412717 (1995-05-01), Fischer
patent: 5420927 (1995-05-01), Micali
patent: 5497421 (1996-03-01), Kaufman et al.
patent: 5509071 (1996-04-01), Petrie, Jr. et al.
patent: 5519778 (1996-05-01), Leighton et al.
patent: 5537475 (1996-07-01), Micali
patent: 5557541 (1996-09-01), Schulhof et al.
patent: 5581479 (1996-12-01), McLaughlin et al.
patent: 5588060 (1996-12-01), Aziz
patent: 5592664 (1997-01-01), Starkey
patent: 5604804 (1997-02-01), Micali
patent: 5606617 (1997-02-01), Brands
patent: 5636139 (1997-06-01), McLaughlin et al.
patent: 5666420 (1997-09-01), Micali
patent: 5673316 (1997-09-01), Auerbach et al.
patent: 5675734 (1997-10-01), Hair
patent: 5710887 (1998-01-01), Chelliah et al.
patent: 5796841 (1998-08-01), Cordery et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5974549 (1999-10-01), Golan
patent: 5978482 (1999-11-01), Dwork et al.
patent: 6480959 (2002-11-01), Granger et al.
patent: 6698016 (2004-02-01), Ghizzoni
patent: 0704785 (1996-04-01), None
patent: WO 96/41445 (1996-12-01), None
patent: WO 97/43717 (1997-11-01), None
patent: WO 98/13970 (1998-04-01), None
patent: WO 98/39878 (1998-09-01), None
J. Linn, “Privacy Enhancement for Internet Electron Mail: Part I: Message Encryption and Authentication Procedures,” RFC 1421, Feb. 1993, pp. 1-37.
S. Kent, “Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management,” RFC 1422, Feb. 1993, pp. 1-28.
D. Balenson, “Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers,” RFC 1423, Feb. 1993, pp. 1-13.
B. Kaliski, “Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services,” RFC 1424, Feb. 1993, pp. 1-8.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for secure authentication of external... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for secure authentication of external..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for secure authentication of external... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3491619

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.