Virus immune computer system and method
First Claim
1. A method for preventing hacker code from infecting an application program, the method requiring decryption of the application program prior to running the application program on a computer, the computer comprising a non-transitory computer storage medium;
- random access memory;
a central processing unit; and
an operating system, the operating system stored in the non-transitory computer storage medium of the computer, the method comprising the steps of;
providing a storage device comprising a non-transitory computer storage medium, said storage device being a separate unit from components necessary to operate the computer;
storing a symmetric private key on the storage device, the symmetric private key being symmetric in that it is usable for encryption and decryption of the application program stored in the random access memory of the computer;
using the symmetric private key to produce an encrypted application program upon first installation of the application program on the computer, the encrypted application program comprising encrypted operational instructions needed to run the application program, such that after such first installation, the encrypted application program is the only installed version of the application program on the computer;
upon receiving a command to run the application program, loading the encrypted application program into the random access memory of the computer;
requiring the central processing unit to decrypt, using the symmetric private key, that part of the encrypted application program needed implement the command to run the application program;
precluding the computer from running any part of the application program that has not been first encrypted with the symmetric private key; and
,requiring the central processing unit to decrypt, on the fly, only those follow-on parts of the encrypted application program needed to perform functions called for during operation of the application program.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus prevents hacker code from infecting an application program by requiring decryption of the application program prior to running the application program on a computer. The method includes steps of: providing a storage device that is a separate unit from components necessary to operate the computer; storing a symmetric private key on the storage device; using the symmetric private key to produce an encrypted application program upon first installation; thereafter decrypting that part of the encrypted application program needed implement a command to run the application program; precluding the computer from running any part of the application program that has not been first encrypted with the symmetric private key; and, decrypting, on the fly, only those follow-on parts of the encrypted application program needed to perform functions called for during operation of the application program.
33 Citations
10 Claims
-
1. A method for preventing hacker code from infecting an application program, the method requiring decryption of the application program prior to running the application program on a computer, the computer comprising a non-transitory computer storage medium;
- random access memory;
a central processing unit; and
an operating system, the operating system stored in the non-transitory computer storage medium of the computer, the method comprising the steps of;providing a storage device comprising a non-transitory computer storage medium, said storage device being a separate unit from components necessary to operate the computer; storing a symmetric private key on the storage device, the symmetric private key being symmetric in that it is usable for encryption and decryption of the application program stored in the random access memory of the computer; using the symmetric private key to produce an encrypted application program upon first installation of the application program on the computer, the encrypted application program comprising encrypted operational instructions needed to run the application program, such that after such first installation, the encrypted application program is the only installed version of the application program on the computer; upon receiving a command to run the application program, loading the encrypted application program into the random access memory of the computer; requiring the central processing unit to decrypt, using the symmetric private key, that part of the encrypted application program needed implement the command to run the application program; precluding the computer from running any part of the application program that has not been first encrypted with the symmetric private key; and
,requiring the central processing unit to decrypt, on the fly, only those follow-on parts of the encrypted application program needed to perform functions called for during operation of the application program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
- random access memory;
Specification