Method for interposing a security function in a computer program
First Claim
Patent Images
1. A method of protecting a developer'"'"'s software without requiring a source code modification on the part of the developer comprising the steps of:
- interposing by the developer a security layer furnished by another in front of standard library files being utilized for writing a software program, which security layer incorporates a header, said header including a statement which is placed as the first statement of said software program, creating a path to a standard library file through a security file which is the security function in library form already compiled into said software program to implement security for said software program each time a call is made to said standard library file, wherebysaid security layer automatically reroutes standard library calls through said security layer to the standard library file.
1 Assignment
0 Petitions
Accused Products
Abstract
A developer writing a software program provides security for the program being prepared by interposing a special security layer in front of the standard library being utilized for writing the program. A security header and security file are incorporated in the software which automatically reroutes standard library calls through the special security layer prior to putting the calls through to the standard library files.
33 Citations
7 Claims
-
1. A method of protecting a developer'"'"'s software without requiring a source code modification on the part of the developer comprising the steps of:
-
interposing by the developer a security layer furnished by another in front of standard library files being utilized for writing a software program, which security layer incorporates a header, said header including a statement which is placed as the first statement of said software program, creating a path to a standard library file through a security file which is the security function in library form already compiled into said software program to implement security for said software program each time a call is made to said standard library file, whereby said security layer automatically reroutes standard library calls through said security layer to the standard library file. - View Dependent Claims (2)
-
-
3. A method of protecting a developer'"'"'s software which includes a plurality of standard library files, without requiring a source code modification, comprising:
-
interposing a security header file in said developer'"'"'s software, said header file defining a path for each call to one of said standard library files; interposing a security file in each path which provides a security function in a library of said software, said security function controlling operation of said software program by verifying authorization of said program execution; and passing control to said library files following verification of said authorization. - View Dependent Claims (4, 5)
-
-
6. A method of protecting software that includes a plurality of standard library files, each standard library file including a plurality of standard library functions, the method comprising the steps of:
-
providing a security file including a library of security functions; incorporating a statement referring to a header, the header including a reference to a security function included in the security file, the security function corresponding to a standard library function, into the software; incorporating the header referred to by the statement into the software; creating a path to a standard library function through the corresponding security function determined in tile header; verifying, with the security function, authorization of program execution; and
,passing control of execution of the software to the standard library function following verification of the authorization. - View Dependent Claims (7)
-
Specification