Method and System for Protecting a Computing System
First Claim
Patent Images
1. A method for protecting a computer system application, the method comprising the steps of:
- installing a wrapper program;
embedding the computer system application in the wrapper program;
renaming the computer system application;
renaming the wrapper program to the name previously used by the computer system application;
generating a challenge phrase;
including the challenge phrase in the title bar of the wrapper program when the wrapper program is executed;
prompting the user for a password, wherein the password includes the challenge phrase;
comparing the password to the challenge phrase and launching the computer system application if the challenge phrase is successfully compared.
1 Assignment
0 Petitions
Accused Products
Abstract
The system relates to a method for protecting a computer system application. In one aspect of the method, a wrapper program is installed on a computer system and the computer system application is embedded within the wrapper program. In another aspect, the wrapper program verifies with a user prior to allowing the computer system application to be invoked.
-
Citations
20 Claims
-
1. A method for protecting a computer system application, the method comprising the steps of:
-
installing a wrapper program; embedding the computer system application in the wrapper program; renaming the computer system application; renaming the wrapper program to the name previously used by the computer system application; generating a challenge phrase; including the challenge phrase in the title bar of the wrapper program when the wrapper program is executed; prompting the user for a password, wherein the password includes the challenge phrase; comparing the password to the challenge phrase and launching the computer system application if the challenge phrase is successfully compared.
-
-
2. A method of protecting a computer system application, the method comprising the steps of:
-
wrapping the computer system application with a wrapper application; altering the computer system application so that it can not be launched directly by a user; and configuring the wrapper program to be launched when a user attempts to launch the computer system application whereby the wrapper program verifies the user'"'"'s ability to launch the computer system application prior to launching the computer system application. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for protecting a computer system application, the system comprising:
-
a wrapper program, wherein the wrapper program is configured to embed the computer system application within the wrapper program such that the computer system application can not be launched directly by a user and wherein the wrapper program is configured to verify with a user an attempt to launch the computer system application prior to such launching; and wherein the system is configured to launch the wrapper program when an attempt is made to launch the computer system application. - View Dependent Claims (20)
-
Specification