×

System and method for secure authentication of external software modules provided by third parties

  • US 7,500,109 B2
  • Filed: 05/06/2005
  • Issued: 03/03/2009
  • Est. Priority Date: 09/08/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer system for secure authentication of executable external modules, comprising:

  • memory for storingan executable external module whose authenticity is to be verified,data K that can be created by using two different schemes, at least one scheme of the two different schemes being based on the integrity of a module to be verified, andan authentication token for the module to be verified which produces data K in both schemes, the executable external module being representative of the module to be verified; and

    a processor, communicatively coupled to the memory, forusing data K as created by one scheme of the two different schemes to disrupt the executable external module; and

    using data K as created by the other scheme of the two different schemes to restore the executable external module from the disrupted executable external module thereby authenticating said executable external module, and whereinthe processor further for performing at run time of the executable external module at the computer system the secure authentication byusing data K as created by one scheme of the two different schemes to disrupt the executable external module, andusing data K as created by the other scheme of the two different schemes to restore the executable external module from the disrupted executable external module thereby authenticating said executable external module, and whereinthe disrupting of the executable external module is performed by a STOMP process and the restoring of the executable external module is performed by an UNSTOMP process, and whereinone or more of the schemes is based on at least one of RSA encryption and digital signets, and whereina public component of one or more of the schemes is embedded in a verification code of the executable external module, and whereinthe authentication token is embedded in the executable external module and the executable external module itself remaining functional, and further whereinthe authentication token is embedded in the executable external module by adding an additional data section to a DLL in Portable Executable (PE) format, and whereinthe authentication token is external to the executable external module, and whereinthe at least one scheme based on the integrity of the module to be verified is independent of a location of the executable external module in memory, and whereinlocation independence is achieved by a canonical hash.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×