×

By-pass and tampering protection for application wrappers

  • US 20050108516A1
  • Filed: 04/16/2004
  • Published: 05/19/2005
  • Est. Priority Date: 04/17/2003
  • Status: Abandoned Application
First Claim
Patent Images

1. A computer system including an operating system and software applications, the system comprising:

  • a central processing unit;

    means for storing and retrieving programs and data connected with said central processing unit;

    an operating system stored in said means for storing and retrieving programs and data;

    a plurality of software applications stored in said means for storing and retrieving programs and data;

    a plurality of application threads, wherein each of said threads is associated with a single one of said software applications;

    a plurality of bypass protocols that interface with said software applications, wherein each of said bypass protocols is associated with a single one of said software applications;

    a bypass driver that interfaces with said bypass protocols, wherein the specific state of trust of each of said application threads of said software applications associated with said bypass protocols is obtained by said bypass driver from said bypass protocols;

    a thread trust datastore that interfaces with said bypass driver, wherein the state of trust of said software applications is communicated from said bypass driver to said thread trust datastore and stored in memory; and

    a system service dispatch tap that interfaces with said operating system, wherein invocations of services from said operating system by said software applications are intercepted by said system service dispatch tap, the state of trust of said software application is obtained from said thread trust datastore, and said invocation of service is routed in said operating system based upon said state of trust.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×