On-machine communication verification
First Claim
1. In a computing device, a method of efficiently establishing a secure communication used to receiving information from one or more modules on the computing device by utilizing a shared memory in determining a transport address used to the secure communication, the method including acts of:
- generating random data used to identify a transport address of a listener, the transport address used to verify that a connector resides on a computing device;
storing the random data in a secured shared memory accessible by at least the listener and the connector, but inaccessible to modules outside the computing device to maintain the security thereof;
listening for communication activity at the transport address identified by the random data; and
receiving at the transport address information for establishing communication with the connector.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides for validating that one or more modules reside on the same machine. When a second module wishes to establish communication with a first module, a shared memory that is accessible by the modules—but inaccessible by modules outside the machine—is used to store random data. The first module listens on a transport address corresponding to the random data for communication activity. The second module retrieves the random data from the shared memory, and then uses this data for determining the appropriate transport address to send information to when establishing the communication with the first module.
-
Citations
40 Claims
-
1. In a computing device, a method of efficiently establishing a secure communication used to receiving information from one or more modules on the computing device by utilizing a shared memory in determining a transport address used to the secure communication, the method including acts of:
-
generating random data used to identify a transport address of a listener, the transport address used to verify that a connector resides on a computing device;
storing the random data in a secured shared memory accessible by at least the listener and the connector, but inaccessible to modules outside the computing device to maintain the security thereof;
listening for communication activity at the transport address identified by the random data; and
receiving at the transport address information for establishing communication with the connector. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. In a computing device, a method of efficiently establishing a secure communication for transferring information to a module on the computing device by utilizing a shared memory in determining a transport address used to the secure communication, the method including acts of:
-
accessing a secured shared memory accessible by at least a listener and a connector on a computing device, the secured shared-memory inaccessible to modules outside the computing device to maintain the security thereof;
retrieving from the shared memory random data used to identify a transport address of the listener, the transport address used to verify that the connector resides on the computing device; and
sending to the transport address information for establishing communication with the listener. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. In a computing device, a method of efficiently establishing a secure communication between two or more modules by utilizing a shared memory to verify that at least one of the two or more modules resides on the computing device, the method including a step for:
establishing communication between a connector and a listener of a computing device to transfer information to a transport address of the listener, which is used to verify that the connector resides on the computing device, wherein the transport address corresponds to random data maintained in a secure shared memory accessible to at least the listener and connector, but inaccessible to modules outside the computing device. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
31. In a computing device, a computer program product for implementing a method of efficiently establishing a secure communication between two or more modules by utilizing a shared memory to verify that at least one of the two or more modules resides on the computing device, the computer program product comprising one or more computer readable media having stored thereon computer executable instructions that, when executed by a processor, can cause the messaging system to perform the following:
-
generate random data used to identify a transport address of a listener, the transport address used to verify that a connector resides on a computing device;
store the random data in a secured shared memory accessible by at least the listener and the connector, but inaccessible to modules outside the computing device to maintain the security thereof;
listen for communication activity at the transport address identified by the random data;
retrieve the random data from the shared memory to identify the transport address for sending information to the listener;
send the information to the transport address for establishing communication with the listener; and
receive at the transport address information via a transport protocol for establishing communication with the connector. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification