×

Hybrid encryption method and system for protecting reusable software components

  • US 5,343,527 A
  • Filed: 10/27/1993
  • Issued: 08/30/1994
  • Est. Priority Date: 10/27/1993
  • Status: Expired due to Term
First Claim
Patent Images

1. In a network of computers comprising at least one computer, the method for reusing software components that maintains the integrity and authenticity of the software components, said method comprising:

  • generating an software component record using the following substeps;

    (a) encrypting a plaintext representation of a software component into a encrypted software component with a first cryptographic algorithm using first key;

    (b) hashing the encrypted software component to generate a first hash digest;

    (c) encrypting the first hash digest and the first key using a second cryptographic algorithm with a second key, wherein said second cryptographic algorithm is of a public key type and said second key is the private key associated with at least one public key, said software component record consisting of the encrypted software component, the encrypted hash digest, and the encrypted first key;

    storing the software component record in a reuse library;

    retrieving the software component record from the reuse library;

    generating the plaintext representation of the software component using the following substeps;

    (a) obtaining a public key associated with the second key from a public key directory;

    (b) decrypting the encrypted hash digest and the encrypted first key into the decrypted first key and the decrypted first hash digest using the public key and the second cryptographic algorithm;

    (c) hashing the encrypted software component to generate a second hash digest;

    (d) comparing the second hash digest with the decrypted first hash digest, and if not identical indicating that the software component is corrupted, if identical indicating that the software is not corrupted;

    (e) decrypting the encrypted software component into the plaintext representation using the decrypted first key and the first encryption algorithm.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×