×

Computer software authentication, protection, and security system

  • US 6,006,328 A
  • Filed: 07/12/1996
  • Issued: 12/21/1999
  • Est. Priority Date: 07/14/1995
  • Status: Expired due to Term
First Claim
Patent Images

1. A computer system having software having input routines with enhanced security features for entry of ID-Data comprising:

  • a processor; and

    a memory, wherein said software stored in said memory when executed by said processor comprises;

    anti-spy techniques within said input routines which prevent or hamper eavesdropping;

    detect tampering of said software which, upon detection of tampering, either disallow the subsequent entry of ID-Data into said input routines, or which invalidate said ID-Data in order to disallow current and subsequent access to that which said ID-Data would have otherwise allowed; and

    further comprising at least one of the following code contained in said software;

    code to automatically scan memory of said software one or more times before or during execution of said software to detect tampering;

    code to store or communicate details of detected tampering for later examination, said details including all or part of said tampered software, or other information available to said tampered software from said computer system; and

    code to prevent, or detect and subsequently prevent tracing, or misleading code debuggers and the execution of tracing by utilizing debugger trap facilities for the normal operation of said security-enhanced software, or monitoring system timers or timing-sensitive instructions or monitoring CPU stack contents or monitoring system buffers to detect the activity of code debuggers, or disabling facilities such as, the keyboard, serial ports, printer ports, mouse, screen or system interrupts in order to hamper code debuggers, or testing that the disabled status is still true of said facilities to detect code debuggers, or utilizing system interrupts which would ordinarily be used by code debuggers for the custom purposes of said security-enhanced software, or utilizing CPU instruction caches together with self-modifying code to mislead code debuggers, or scanning or interrogating the operating system or executable-load-process to detect code debugger instructions or environments, characterized in that the program optionally includes a process or multiple processes which are resident or child processes of said security-enhanced software which execute during system interrupts of after the parent process has terminated in order to hamper tracing.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×