×

Virus immune computer system and method

  • US 10,614,254 B2
  • Filed: 12/12/2017
  • Issued: 04/07/2020
  • Est. Priority Date: 12/12/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method for preventing hacker code from infecting an application program, the method requiring decryption of the application program prior to running the application program on a computer, the computer comprising a non-transitory computer storage medium;

  • random access memory;

    a central processing unit; and

    an operating system, the operating system stored in the non-transitory computer storage medium of the computer, the method comprising the steps of;

    providing a storage device comprising a non-transitory computer storage medium, said storage device being a separate unit from components necessary to operate the computer;

    storing a symmetric private key on the storage device, the symmetric private key being symmetric in that it is usable for encryption and decryption of the application program stored in the random access memory of the computer;

    using the symmetric private key to produce an encrypted application program upon first installation of the application program on the computer, the encrypted application program comprising encrypted operational instructions needed to run the application program, such that after such first installation, the encrypted application program is the only installed version of the application program on the computer;

    upon receiving a command to run the application program, loading the encrypted application program into the random access memory of the computer;

    requiring the central processing unit to decrypt, using the symmetric private key, that part of the encrypted application program needed implement the command to run the application program;

    precluding the computer from running any part of the application program that has not been first encrypted with the symmetric private key; and

    ,requiring the central processing unit to decrypt, on the fly, only those follow-on parts of the encrypted application program needed to perform functions called for during operation of the application program.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×