×

Virus immune computer system and method

  • US 10,346,608 B2
  • Filed: 06/14/2018
  • Issued: 07/09/2019
  • Est. Priority Date: 12/12/2017
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer system comprising:

  • a storage device that is a separate unit from components necessary for startup of a computer, the storage device comprising;

    a first-non-transitory computer storage medium, the first-non-transitory computer storage medium storing;

    a device symmetric private key, the device symmetric private key operable to decrypt an encrypted operating system symmetric private key so as to produce a decrypted operating system symmetric private key;

    a computer comprising a central processing unit, an address bus, and a second-non-transitory computer storage medium on which is stored the encrypted operating system symmetric private key and a security program that is operable to;

    retrieve the device symmetric private key from the storage device;

    decrypt the encrypted operating system symmetric private key with the device symmetric private key to produce the decrypted operating system symmetric private key;

    preclude the computer from storing the device symmetric private key or the decrypted operating system symmetric private key in any non-transitory computer storage medium;

    require the computer, upon first installation of an application program on the computer, to use the decrypted operating system symmetric private key to encrypt the application program such that the encrypted application program is the only installed version of the application program on any non-transitory computer readable memory accessible by the computer;

    enable the computer, each time a command is given to startup the application program, to use the decrypted operating system symmetric private key to decrypt a first portion of the encrypted application program needed implement the command, and to store what was decrypted in a random access memory accessible by the computer;

    require the computer to use the decrypted operating system symmetric private key to subsequently decrypt any second portion of the encrypted application program that is needed during operation of the first portion and to store what was subsequently decrypted in the random access memory accessible by the computer; and

    prevent access to the device symmetric private key after the device symmetric private key is first accessed to produce the decrypted operating system symmetric private key, unless express authorization is first obtained.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×