Maintaining code integrity in a central software development system
First Claim
1. A method of maintaining code integrity in a central software development system, comprising:
- scanning modified free source code received by the system for impermissible code patterns by comparing at least one of the modified free source code or intermediate code generated from the modified free source code to one or more groups of regular expressions representing the impermissible code patterns, each regular expression being an ordered sequence of symbols describing or matching a set of strings according to certain syntax rules;
determining if the modified free source code or the intermediate code includes one or more of the impermissible code patterns based on whether a match occurs between the source code or the intermediate code and one or more of the regular expressions during scanning;
converting the modified free source code to program code; and
signing the program code if no impermissible code patterns are found in the modified free source code using an encryption key associated with one or more devices for which the program code is designed.
1 Assignment
0 Petitions
Accused Products
Abstract
A central software development system comprises a code processor and a code authenticator. The code processor converts modified free source code received by the system to program code such as executable code or bytecode. The code authenticator selectively signs the program code using an encryption key associated with one or more devices for which the program code is designed, e.g., a computer or mobile phone. The central system may also include a code scanner. The code scanner verifies the modified free source code, e.g., by scanning the modified free source code or intermediate code generated by the code processor for impermissible code patterns. The code authenticator signs the program code if the modified free source code is verified. The impermissible code patterns may correspond to at least one of proprietary, malicious or virulent code sequences.
27 Citations
15 Claims
-
1. A method of maintaining code integrity in a central software development system, comprising:
-
scanning modified free source code received by the system for impermissible code patterns by comparing at least one of the modified free source code or intermediate code generated from the modified free source code to one or more groups of regular expressions representing the impermissible code patterns, each regular expression being an ordered sequence of symbols describing or matching a set of strings according to certain syntax rules; determining if the modified free source code or the intermediate code includes one or more of the impermissible code patterns based on whether a match occurs between the source code or the intermediate code and one or more of the regular expressions during scanning; converting the modified free source code to program code; and signing the program code if no impermissible code patterns are found in the modified free source code using an encryption key associated with one or more devices for which the program code is designed. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A central software development system, comprising:
-
a processor; a code scanner configured to scan modified free source code received by the system for impermissible code patterns by comparing at least one of the modified free source code or intermediate code generated from the modified free source code to one or more groups of regular expressions representing the impermissible code patterns, each regular expression being an ordered sequence of symbols describing or matching a set of strings according to certain syntax rules, and determine if the modified free source code or the intermediate code includes one or more of the impermissible code patterns based on whether a match occurs between the source code or the intermediate code and one or more of the regular expressions during scanning; a code processor configured to convert modified free source code received by the system to program code; and a code authenticator configured to sign the program code if no impermissible code patterns are found in the modified free source code using an encryption key associated with one or more devices for which the program code is designed. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product implemented on a microprocessor for maintaining code integrity in a central software development system, comprising:
-
computer readable program code for scanning modified free source code received by the system for impermissible code patterns by comparing at least one of the modified source code or intermediate code generated from the modified free source code to one or more groups of regular expressions representing the impermissible code patterns, each regular expression being an ordered sequence of symbols describing or matching a set of strings according to certain syntax rules; computer readable program code for determining if the modified free source code or the intermediate code includes one or more of the impermissible code patterns based on whether a match occurs between the source code or the intermediate code and one or more of the regular expressions during scanning; computer readable program code for converting the modified free source code to program code; and computer readable program code for signing the program code if no impermissible code patterns are found in the modified free source code using an encryption key associated with one or more devices for which the program code is designed. - View Dependent Claims (14, 15)
-
Specification