×

Source authentication of a software product

  • US 10,558,816 B2
  • Filed: 04/03/2018
  • Issued: 02/11/2020
  • Est. Priority Date: 07/17/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • preventing, by one or more processors, installation of unauthorized source code based on a generated compound key, wherein preventing installation of unauthorized source code comprises;

    generating, by a key generator, a compound key comprising at least one source file, a hash function run on the at least one source file, and a file size of the at least one source file;

    in response to determining a source type during the build process, injecting, by one or more processors, a generated value based on the compound key into each file of a built set of files;

    validating, by a key validation tool, the generated value against the compound key by comparing the compound key and the generated value to determine the generated value is equivalent to the compound key before loading the built set of files into a central repository;

    in response to determining the compound key and the generated value match producing, by one or more processors, a final product, wherein the final product comprises;

    the key validation tool and the generated compound key and installing source code associated with the generated compound key;

    in response to determining the compound key and the generated value do not match, uninstalling source code associated with the generated compound key;

    determining, by one or more processors, whether there is a difference between the compound key and the generated value;

    in response to determining that there is not a difference between the compound key and the value, loading the final product to a repository; and

    dynamically updating the compound key in response to a modification of a source file in the built set of files.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×