Nested strong loader apparatus and method
First Claim
1. A method to limit software module integration, comprising:
- receiving a first filler module having a first unique property;
dynamically loading the first filler module into a base module using the first loader after the first unique property is verified by the first loader, wherein the base module when loaded with the first filler module permits the first filler module to be executed;
processing a second loader of the first filler module; and
dynamically loading a second filler module after the second loader verifies a second unique property of a second filler module, wherein the second filler module when loaded is capable of being executed, and wherein the first and second loaders are independent loaders from one another.
9 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method provides one or more controlled, dynamically loaded, modular, cryptographic fillers. Fillers may be loaded by a single loader, multiple independent loaders, or nested loaders. Loaders may be adapted to load other loaders, within cryptographic controls extant and applicable thereto. Integration into a base executable having one or more slots, minimizes, controls, and links the interface between the fillers and base executables. The filler may itself operate recursively to load another filler in nested operations, whether or not the fillers are in nested relation to one another. An ability of any filler to be loaded may be controlled by the base executable verifying the integrity, authorization, or both for any filler. The base executable may rely on an integrated loader to control loading and linking of fillers and submodules. A policy may limit each module function, access, and potential for modification or substitution. Dynamically loaded modules (loaders, other fillers, and submodules thereof), typically represent a relatively small portion of the overall coding required by the base executable, and may provide strong controls limiting integration by providing access that is nested, layered, or both between modules excluding direct access to or by them from the base executable or supported applications.
-
Citations
20 Claims
-
1. A method to limit software module integration, comprising:
-
receiving a first filler module having a first unique property; dynamically loading the first filler module into a base module using the first loader after the first unique property is verified by the first loader, wherein the base module when loaded with the first filler module permits the first filler module to be executed; processing a second loader of the first filler module; and dynamically loading a second filler module after the second loader verifies a second unique property of a second filler module, wherein the second filler module when loaded is capable of being executed, and wherein the first and second loaders are independent loaders from one another. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method to verify software module integration, comprising:
-
identifying a first unique property of a first filler module; verifying the first unique property before permitting the first filler module to load before subsequent processing; authorizing the first filler module to process when verified and loaded, and wherein the first filler module acquires a second unique property of a second filler module; verifying the second unique property by the first filler module before permitting the second filler module to load before subsequent processing; and authorizing the second filler module for processing when it is verified and loaded, and wherein the first filler module is loaded with an independent loader that is different from a loader that loads the second filler module. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A data structure used for dynamically integrating software modules residing in a computer readable medium, the data structure comprising:
-
one or more certificates for dynamically authenticating accesses desired by one or more holders of the certificates that desire use of the data structure; one or more policies for defining access rights and/or interaction rights of the one or more holders to one or more modules; a policy manager for dynamically enforcing the one or more policies; and the one or more modules being accessed by the one or more holders, wherein each module includes a loader module for dynamically authenticating and dynamically loading one or more of the remaining modules, and wherein each module is available for execution when loaded, and wherein each loader is independent from other remaining ones of the loaders. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification