×

System and method for secure distributed execution

  • US 8,800,032 B2
  • Filed: 02/17/2011
  • Issued: 08/05/2014
  • Est. Priority Date: 03/16/2002
  • Status: Active Grant
First Claim
Patent Images

1. A computing system, the system comprising:

  • a first computing subsystem;

    a second computing subsystem;

    a network coupling said first computing subsystem and said second computing subsystem;

    wherein the second computing subsystem provides sending of a first software application operational software module comprising a user operative portion and a hidden program portion, wherein the user operative portion provides for sending data packets for controlled transmission, and, wherein the hidden program portion provides a security signal representative of the hidden program portion that is coupled to a controller for controlling coupling of the data packets to the network responsive to the hidden program portion;

    wherein the user operative portion and the hidden program portion are interlocked into an integrated logic program that provides a combined functionality that is only provided by the first computing subsystem when the integrated logic program with the combined functionality is executed unchanged;

    wherein the second computing subsystem provides sending of data packets to the first computing subsystem;

    wherein the first computing subsystem provides means for;

    (a) receiving of the data packets from the second computing subsystem, (b) utilizing the operational software module by the first computing subsystem for processing of the data packets, and (c) utilizing the operational software module by the first computing subsystem for generating security tags responsive to said processing of the data packets and sending the security tags to the second subsystem; and

    wherein the second computing subsystem provides means for;

    (a) receiving the security tags from the first computing subsystem, and (b) providing processing logic for validating as a successful validation that the operational software module was unchanged when utilized in generating the security tags at the first computing subsystem, and otherwise determining a failed validation if the operational software module was changed when utilized in generating the security tags at the first computing subsystem;

    wherein the sending of data packets to the first computing subsystem by the second computing subsystem is controlled responsive to the validating by the processing logic.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×