Internet security system
First Claim
1. A method of preventing unauthorized personnel access to a computer file used to perform a function on the computer comprising:
- selecting a file;
inserting a key into the contents of the file; and
, encrypting the file after the key has been inserted using an encryption key.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of preventing internet hacking of web sites. Operating system component files are encrypted by first selecting a secret key which is randomly inserted into the contents of the source file. The file is then encrypted using a second, separate key. When the encrypted OS file is subsequently requested by the operating system, it is decrypted and the decrypted file searched for the second key. If the second key is found, the file is considered valid and is processed by the operating system. If the second key is not found, the file is considered invalid and is not processed.
11 Citations
20 Claims
-
1. A method of preventing unauthorized personnel access to a computer file used to perform a function on the computer comprising:
-
selecting a file;
inserting a key into the contents of the file; and
,encrypting the file after the key has been inserted using an encryption key. - View Dependent Claims (2, 3, 4, 6)
-
-
5. The method of claim 5 further including storing a copy of the file after it is encrypted using the second key and replacing the original file with the stored copy thereof if the first said key cannot be found after the file is decrypted, the replaced copy of the file then being used to perform the desired function.
-
7. A method of preventing an unauthorized person access to an operating system (OS) file of a computer, comprising:
-
selecting an operating file;
inserting a first key into the contents of the file and then encrypting the resulting file using a second key;
subsequently decrypting the file using the second key and examining the decrypted file for the first key;
validating the decrypted file for use by the computer if the first key is found in the decrypted file;
but,rejecting the decrypted file for use by the computer if the first key is not found, because failure to find the first key is an indication the computer has been hacked. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of preventing a hacked computer file from being run on a computer thereby to prevent damage caused by hacking, comprising:
-
selecting an program file run by the computer;
randomly inserting a first key into the contents of the file;
encrypting the resulting file using a second, separate key;
decrypting the encrypted file prior to its subsequent use, the file being decrypted using the second key and the decrypted file now being examined for the first key embedded therein; and
,validating the decrypted file for use by the computer if the first key is found in the decrypted file, but rejecting the decrypted file for use by the computer if the first key is not found because failure to find the first key in the decrypted file is evidence the file has been hacked. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification