×

Secure access to software modules

  • US 6,000,032 A
  • Filed: 07/15/1997
  • Issued: 12/07/1999
  • Est. Priority Date: 07/15/1997
  • Status: Expired due to Term
First Claim
Patent Images

1. A computer-implemented method for enabling a calling module to achieve secure access to a called module within a digital computer, said method comprising the steps of:

  • selecting a desired size of S;

    selecting a distributive invertible function f;

    selecting a desired residual value r associated with the application of f;

    allocating a space within the called module for storing S;

    designating a portion of the called module as a test block TB;

    causing the called module to apply f to a numerical representation N of the TB, to calculate a first challenge value CV1;

    causing the called module to apply f to a numerical value of S and to a number n representative of the location of S within the called module, to calculate a second challenge value CV2;

    causing the calling module to calculate S based upon CV1 and CV2, and using f;

    having the calling module pass the calculated S to the called module;

    having the called module apply f to a number representative of the contents and location of the calculated S and the contents of TB, resulting in the calculation of a test residual value R; and

    when R=r, having the called module declare that the calling module has proper authority to access the called module.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×