Binding a protected application program to shell code
First Claim
1. A method of binding a security code shell module to an application, comprising the steps of:
- a. creating a resource, performed by the shell module;
b. attempting to access the resource performed by the application; and
c. if the access is not successful, terminating the application.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for binding a protected application to a shell module. The shell module is appended to the application. The shell module executes prior to the execution of the application, and first creates a resource. After the shell module finishes execution, the application tries to access the created resource. If the access is successful, the application is allowed to proceed. Otherwise, the application terminates. The inability of the application to access the resource is an indication that the shell module never actually created the resource. This suggests that the shell module never executed; the shell module may have been either removed or functionally disconnected from the application. This further implies that the security functionality of the shell module has not executed. The application is therefore not permitted to execute, since the shell'"'"'s security checks have probably not been performed.
15 Citations
25 Claims
-
1. A method of binding a security code shell module to an application, comprising the steps of:
-
a. creating a resource, performed by the shell module;
b. attempting to access the resource performed by the application; and
c. if the access is not successful, terminating the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer program product comprising a computer useable medium having computer program logic recorded thereon, which, when executed on a computer, binds a security code shell module to an application, said computer program logic comprising:
-
first computer program logic, in the shell module, that causes the computer to create a resource;
second computer program logic, in the application, that causes the computer to attempt to access the resource; and
third computer program logic that causes the computer to terminate the application if the access is not successful. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification