Virus immune computer system and method
First Claim
1. A method for preventing hacker code from infecting an application program, the method comprising the steps of:
- accessing a computer comprising a second-non-transitory computer storage medium;
a random access memory;
an address bus;
a central processing unit; and
an operating system, the operating system stored in the second-non-transitory computer storage medium of the computer;
providing a security device comprising a first-non-transitory computer storage medium, said security device being a separate unit from components necessary to operate the computer;
storing a symmetric private key on the security device, the symmetric private key being symmetric in that it is usable for encryption and decryption of the application program stored in the random access memory of the computer;
using the symmetric private key to produce an encrypted application program upon first installation of the application program on the computer, the encrypted application program comprising encrypted operational instructions needed to run the application program, such that after such first installation, the encrypted application program is the only installed version of the application program on the computer;
upon receiving a command on the computer to run the application program;
loading the encrypted application program into the random access memory of the computer;
requiring the central processing unit to decrypt, using the symmetric private key, that part of the encrypted application program needed implement the command to run the application program; and
requiring the central processing unit to decrypt, on the fly, only those follow-on parts of the encrypted application program needed to perform functions called for during operation of the application program.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus prevents hacker code from infecting an application program by requiring decryption of the application program prior to running the application program on a computer. The method includes steps of: providing a security device that is a separate unit from components necessary to operate the computer; storing a symmetric private key on the security device; using the device symmetric private key to produce an encrypted application program upon first installation; thereafter decrypting that part of the encrypted application program needed implement a command to run the application program; and, decrypting, on the fly, only those follow-on parts of the encrypted application program needed to perform functions called for during operation of the application program.
-
Citations
11 Claims
-
1. A method for preventing hacker code from infecting an application program, the method comprising the steps of:
-
accessing a computer comprising a second-non-transitory computer storage medium;
a random access memory;
an address bus;
a central processing unit; and
an operating system, the operating system stored in the second-non-transitory computer storage medium of the computer;providing a security device comprising a first-non-transitory computer storage medium, said security device being a separate unit from components necessary to operate the computer; storing a symmetric private key on the security device, the symmetric private key being symmetric in that it is usable for encryption and decryption of the application program stored in the random access memory of the computer; using the symmetric private key to produce an encrypted application program upon first installation of the application program on the computer, the encrypted application program comprising encrypted operational instructions needed to run the application program, such that after such first installation, the encrypted application program is the only installed version of the application program on the computer; upon receiving a command on the computer to run the application program; loading the encrypted application program into the random access memory of the computer; requiring the central processing unit to decrypt, using the symmetric private key, that part of the encrypted application program needed implement the command to run the application program; and requiring the central processing unit to decrypt, on the fly, only those follow-on parts of the encrypted application program needed to perform functions called for during operation of the application program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification