Computer file integrity verification

Electrical computers and digital processing systems: support – Computer program modification detection by cryptography

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

713176, 713189, 380 25, 714758, G06F 900

Patent

active

061227382

ABSTRACT:
System and method for verifying the integrity of contents within a computer file. A security value S is stored within the file. A verification function f is applied against the entire contents of the file including S, where f is a function of S. Results R of the applying step are compared against a preselected value r, where r is not stored within the file. When R equals r, a determination is made that the file has not been modified. f is typically a distributive invertible function such as the Cyclic Redundancy Check (CRC) function known as modulo p, where p is a prime number and is one bit greater than the length of S. Typically, the value of r is zero. Before executing the verification function f, a check generating program is first executed. This check generating program is executed by a computer that is remote from the file, further enhancing the security of the system.

REFERENCES:
patent: 4766537 (1988-08-01), Zolnowsky
patent: 4888798 (1989-12-01), Earnest
patent: 5050212 (1991-09-01), Dyson
patent: 5103476 (1992-04-01), Waite et al.
patent: 5182770 (1993-01-01), Medveczky et al.
patent: 5432851 (1995-07-01), Scheidt et al.
patent: 5530757 (1996-06-01), Krawczyk
patent: 5548532 (1996-08-01), Menand et al.
patent: 5606609 (1997-02-01), Houser et al.
patent: 5625693 (1997-04-01), Rohatgi et al.
patent: 5661848 (1997-08-01), Bonke et al.
patent: 5799088 (1998-08-01), Raike
patent: 5802080 (1998-09-01), Westby
patent: 5832207 (1998-11-01), Little et al.
patent: 5854759 (1998-12-01), Kaliski, Jr. et al.
patent: 6000032 (1999-12-01), Millard
patent: 6014767 (2000-01-01), Glaise
patent: 6048090 (2000-04-01), Zook
McNamara, John E., Technical Aspects of Data Communication, 2.sup.nd Ed. 1982, Digital Equipment Corporation, U.S.A., pp. 110-122.
Ore, Oystein, Number Theory and Its History, 1976, Gudrun Ore, U.S.A., pp. 124-129.
Schneier, Bruce, Applied Cryprography, 2.sup.nd Ed. 1996, Bruce Schneier, U.S.A., pp. 436-441.
Nair, et al., A Symbol Based Algorithm for Hardware Implementation of Cyclic Redundancy Check, IEEE, 1997.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Computer file integrity verification does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Computer file integrity verification, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer file integrity verification will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1084206

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.