×

Profile protection

  • US 7,891,008 B2
  • Filed: 02/17/2005
  • Issued: 02/15/2011
  • Est. Priority Date: 06/12/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method for protecting interoperation between pieces of software running on a computing device having a plurality of blobs of data stored in a central hierarchical database, each blob comprising profile data associated with a software component, a signature and a verifier, the computer-implemented method comprising:

  • by a log-on module running on the computing device, initiating access to profile data stored in a blob of the plurality of blobs in the central hierarchical database of the computing device, the log-on module having a public calling key and a private calling key, the log-on module sending a random salt value to second piece of software running on the computing device and having a private library key of a public library key/private library key pair, the profile data being encrypted with the private calling key, the signature of the blob being a checksum of at least the profile data signed with the public library key and the verifier of the blob being a checksum of at least the profile data signed with the public calling key;

    with the second piece of software;

    finding the blob in the central hierarchical database of the computing device, the finding comprising decrypting the blob using the private library key,computing a first computed checksum based at least in part on the profile data and the random salt value, andsending the first computed checksum and at least a portion of the blob to the log-on module; and

    with the log-on module;

    computing a second computed checksum based at least in part on the random salt value and information provided by the second software component,comparing the first computed checksum with the second computed checksum andtaking security error measures when the first and second computed checksums do not match,wherein;

    the second piece of software is an obfuscated piece of software, andthe private library key is private to the second piece of software and is inaccessible to the log-on module.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×