×

Preventing rogue implementations of a security-sensitive class interface

  • US 7,734,918 B2
  • Filed: 01/17/2008
  • Issued: 06/08/2010
  • Est. Priority Date: 02/27/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer program product for securing a server runtime environment, comprising computer executable instructions stored on a computer recordable-type media, the computer executable instructions comprising:

  • first instructions for generating a first unique identifier at startup of the server runtime environment, the first unique identifier being an identifier that is valid for the server runtime environment;

    second instructions encrypting the first unique identifier;

    third instructions for storing the first unique identifier in a private location of the server runtime environment;

    fourth instructions for receiving a request to instantiate a first credential object from a requestor;

    fifth instructions for instantiating the first credential object, wherein the first unique identifier is inserted in a private field of the first credential object;

    sixth instructions for returning the first credential object to the requestor;

    seventh instructions for receiving a second credential object, wherein the second credential object contains a second uniquely encrypted unique identifier stored in a private field of the second credential object;

    eighth instructions for passing the second credential object as parameters to a verification class, wherein the verification class retrieves the encrypted first unique identifier from the private location of the server runtime environment and retrieves the uniquely encrypted second unique identifier from the private field of the second credential object;

    ninth instructions for decrypting the encrypted first unique identifier and the uniquely encrypted second unique identifier;

    tenth instructions for comparing the second unique identifier to the first unique identifier; and

    eleventh instructions for validating the second credential object only if the second unique identifier matches the first unique identifier.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×