SOURCE AUTHENTICATION OF A SOFTWARE PRODUCT
First Claim
Patent Images
1. A method for authenticating source code, the method comprising:
- receiving, by one or more processors, at least one source file;
generating, by a key generator, a compound key, wherein the compound key comprises a set of keys generated from the at least one source file;
building, by one or more processors, a set of files, based on a source code from the at least one source file;
generating, by the key generator, a value associated with each file of the set of files; and
comparing, by a key validation tool, the compound key and the value to determine if said compound key is equivalent to said value.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention provide systems and methods for authenticating the source code of a software end product. The method includes generating a compound key, which is composed of a set of unique keys generated from a source file. A set of files are separately build based on a received source code, and a key generated and embedded into the files at the time of the build. A validation tool is used to compare the values of the generated compound key to the values of the embedded key to determine if the values match.
-
Citations
20 Claims
-
1. A method for authenticating source code, the method comprising:
-
receiving, by one or more processors, at least one source file; generating, by a key generator, a compound key, wherein the compound key comprises a set of keys generated from the at least one source file; building, by one or more processors, a set of files, based on a source code from the at least one source file; generating, by the key generator, a value associated with each file of the set of files; and comparing, by a key validation tool, the compound key and the value to determine if said compound key is equivalent to said value. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for authenticating source code, the computer program product comprising:
-
a computer readable storage medium and program instructions stored on the computer readable storage medium, the program instructions comprising; program instructions to receive at least one source file; program instructions to generate a compound key, wherein the compound key comprises a set of keys generated from the at least one source file; program instructions to build a set of files, based on a source code from the at least one source file; program instructions to generate a value associated with each file of the set of files; and program instructions to compare the compound key and the value to determine if said compound key is equivalent to said value. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for authenticating source code, the system comprising:
-
one or more computer processors; one or more computer readable storage media; program instructions stored on the one or more computer readable storage media for execution by at least one of the one or more processors, the program instructions comprising; program instructions to receive at least one source file; program instructions to generate a compound key, wherein the compound key comprises a set of keys generated from the at least one source file; program instructions to build a set of files, based on a source code from the at least one source file; program instructions to generate a value associated with each file of the set of files; and program instructions to compare the compound key and the value to determine if said compound key is equivalent to said value. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification