×

Method and system for protecting against the execution of unauthorized software

  • US 8,239,686 B1
  • Filed: 04/27/2006
  • Issued: 08/07/2012
  • Est. Priority Date: 04/27/2006
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • initializing a central processing unit (CPU) exception vector table of a client with one or more vector table entries, each of the one or more vector table entries referencing a corresponding event handler that is used to process an exception event, wherein at least one vector table entry directs a CPU of the client to execute a code authentication process, the code authentication process being performed every time an exception event occurs on the client;

    in response to detecting an exception event associated with the at least one vector table entry, executing the code authentication process to authenticate a segment of executable code stored in memory, wherein the code authentication process identifies non-conforming or unauthorized code before the non-conforming or unauthorized code is executed; and

    in response to the code authentication process determining that the segment of executable code is conforming or authorized code, executing an event handler associated with the at least one vector table entry;

    wherein the code authentication process authenticates the segment of executable code by calculating a first hash value for a portion of executable code stored in memory, and then, determining whether the first hash value matches a second hash value read from a table of hash values.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×