Initiating execution of a computer program from an encrypted version of a computer program
First Claim
1. A computer program product embodied on a tangible computer readable medium for controlling a computer to execute a computer program within said computer memory, said computer program product comprising:
- (a) a loader program; and
(b) an encrypted version of said computer program;
wherein said loader program is operable to;
(i) read said encrypted version of said computer program stored in a program store;
(ii) decrypt said encrypted version of said computer program to form said computer program in an executable form;
(iii) load said computer program directly into said computer memory; and
(iv) trigger execution of said computer program as loaded into said computer memory by said loader program;
wherein said computer program that is decrypted, loaded, and executed includes a malware scanning computer program;
wherein said malware scanning computer program is operable such that once executed, said malware scanning computer program scans said loader program for malware;
wherein, if said loader program is detected as being infected with said malware, then said malware scanning computer program is operable to repair said loader program or replace said loader program with a clean copy of said loader program;
wherein said malware scanning computer program is operable to scan for said malware including one or more of a computer virus, a worm, a Trojan, a banned computer file, a banned word and a banned image.
11 Assignments
0 Petitions
Accused Products
Abstract
When a user commands execution of a computer program to commence, a loader program 2 is first started. This loader program 2 reads an encrypted version of the computer program 6 and decrypts it using a public key. This generates an executable version of the computer program 9 which is written directly to the computer memory 8. When the loader program 2 has decrypted the whole of the computer program 9 it starts execution of the computer program 9 it has written into the computer memory 8 and terminates itself or is terminated by the computer program it started. The computer program 9 written into the computer memory 8 will be written into its own memory space and will have its own execution thread. The encryption used may be public key/private key encryption.
99 Citations
27 Claims
-
1. A computer program product embodied on a tangible computer readable medium for controlling a computer to execute a computer program within said computer memory, said computer program product comprising:
-
(a) a loader program; and (b) an encrypted version of said computer program;
wherein said loader program is operable to;(i) read said encrypted version of said computer program stored in a program store; (ii) decrypt said encrypted version of said computer program to form said computer program in an executable form; (iii) load said computer program directly into said computer memory; and (iv) trigger execution of said computer program as loaded into said computer memory by said loader program; wherein said computer program that is decrypted, loaded, and executed includes a malware scanning computer program; wherein said malware scanning computer program is operable such that once executed, said malware scanning computer program scans said loader program for malware; wherein, if said loader program is detected as being infected with said malware, then said malware scanning computer program is operable to repair said loader program or replace said loader program with a clean copy of said loader program; wherein said malware scanning computer program is operable to scan for said malware including one or more of a computer virus, a worm, a Trojan, a banned computer file, a banned word and a banned image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 25, 26, 27)
-
-
9. A method of executing of a computer program embodied on a tangible computer readable medium, within a computer memory, said method comprising tile steps of:
-
(a) executing a loader program, said loader program operating to; (i) read an encrypted version of said computer program stored in a program store; (ii.) decrypt said encrypted version of said computer program to form said computer program in an executable form; (iii) load said computer program directly into said computer memory; and (iv) trigger execution of said computer program; and (b) executing said computer program, as loaded into said computer memory by said loader program; wherein said computer program that is decrypted, loaded, and executed includes a malware scanning computer program; wherein said malware scanning computer program is operable such that once executed, said malware scanning computer program scans said loader program for malware; wherein, if said loader program is detected as being infected with said malware, then said malware scanning computer program is operable to repair said loader program or replace said loader program with a dean copy of said loader program; wherein said malware scanning computer program is operable to scan for said malware including one or more of a computer virus, a worm, a Trojan, a banned computer file, a banned word and a banned image. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. Apparatus for executing a computer program embodied on a tangible computer readable medium, within a computer memory, said apparatus comprising:
-
(a) loader program logic; and (b) a program store operable to store an encrypted version of said computer program; wherein said loader program logic is operable to; (i) read said encrypted version of said computer program stored in said program store; (ii) decrypt said encrypted version of said computer program to form said computer program in an executable form; (iii) load said computer program directly into said computer memory; and (iv) trigger execution of said computer program as loaded into said computer memory by said loader program; wherein said computer program that is decrypted, loaded, and executed includes a malware scanning computer program; wherein said malware scanning computer program is operable such that once executed, said malware scanning computer program scans said loader program for malware; wherein if said loader program is detected as belong infected with said malware, then said malware scanning computer program is operable to repair said loader program or replace said loader program with a clean copy of said loader program; wherein said malware scanning computer program is operable to scan for said malware including one or more of a computer virus, a worm, a Trojan, a banned computer file, a banned word and a brained image. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification