×

Detection of suspect software objects and signatures after failed authentication

  • US 6,742,121 B1
  • Filed: 09/02/1999
  • Issued: 05/25/2004
  • Est. Priority Date: 02/24/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for analyzing a failed software object authentication to determine whether a downloaded software object or a signature for the software object is suspect, comprising the steps of:

  • extracting a transmitted software object signature value s from a message m(s) carrying the signature value;

    calculating an object signature value s′

    from the software object, said software object being transmitted separately from said message m(s);

    extracting from the software object a value v of a signature transformation function f(s);

    generating a signature value s″

    by applying the inverse f(s)

    1
    of said signature transformation function f(s) to the extracted value v;

    comparing said signature value s″

    to at least one of said transmitted software object signature value s and said calculated object signature value s′

    ;

    designating said signature value in message m(s) as suspect if s″

    =s′

    ;

    designating said software object as suspect if s″

    =s; and

    reporting back to a network access controller whether (1) the signature is suspect;

    (2) the software object is suspect;

    or (3) the signature and software object are suspect.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×