Maintaining Code Integrity in a Central Software Development System
First Claim
1. A method of maintaining code integrity in a central software development system, comprising:
- converting modified free source code received by the system to program code; and
selectively signing the program code using an encryption key associated with one or more devices for which the program code is designed.
1 Assignment
0 Petitions
Accused Products
Abstract
A central software development system comprises a code processor and a code authenticator. The code processor converts modified free source code received by the system to program code such as executable code or bytecode. The code authenticator selectively signs the program code using an encryption key associated with one or more devices for which the program code is designed, e.g., a computer or mobile phone. The central system may also include a code scanner. The code scanner verifies the modified free source code, e.g., by scanning the modified free source code or intermediate code generated by the code processor for impermissible code patterns. The code authenticator signs the program code if the modified free source code is verified. The impermissible code patterns may correspond to at least one of proprietary, malicious or virulent code sequences.
32 Citations
23 Claims
-
1. A method of maintaining code integrity in a central software development system, comprising:
-
converting modified free source code received by the system to program code; and selectively signing the program code using an encryption key associated with one or more devices for which the program code is designed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A central software development system, comprising:
-
a code processor configured to convert modified free source code received by the system to program code; and a code authenticator configured to selectively sign the program code using an encryption key associated with one or more devices for which the program code is designed. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product for maintaining code integrity in a central software development system, comprising:
-
computer readable program code for converting modified free source code received by the system to program code; and computer readable program code for selectively signing the program code using an encryption key associated with one or more devices for which the program code is designed. - View Dependent Claims (20, 21, 22, 23)
-
Specification