×

Method, system and computer program for deploying software packages with increased security

  • US 8,230,222 B2
  • Filed: 08/21/2006
  • Issued: 07/24/2012
  • Est. Priority Date: 08/23/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for deploying software packages adapted to enforce software configurations in a data processing system including a plurality of target entities, each target entity being associated with a corresponding pair of private key and public key, wherein the method includes the steps of:

  • providing, from a server computer over a data network, a software package to be deployed to a set of selected target entities, each of the selected target entities being an endpoint computer;

    associating a symmetric key with the software package;

    encrypting at least a portion of the software package with the symmetric key;

    for each selected target entity encrypting the symmetric key with the corresponding public key of the selected target entity;

    building a further software package, the further software package including a plurality of encrypted symmetric keys, each encrypted symmetric key in the plurality of encrypted keys being associated with an indication of a corresponding selected target entity; and

    deploying the encrypted software package and the further software package to the selected target entities to enable each selected target entity to decrypt the corresponding encrypted symmetric key with the associated private key, to decrypt the encrypted software package with the decrypted symmetric key, and to apply the decrypted software package for enforcing the corresponding software configuration, wherein for each selected target entity the further software package includes a command for decrypting the corresponding encrypted symmetric key with the associated private key, the command being conditioned to an identification of the selected target entity using run-time parameters of the selected target entity for enforcing a software configuration from the software configurations on the selected target entity.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×