Internet security system
First Claim
Patent Images
1. A method of preventing unauthorized personnel access to a computer file used to perform a function on the computer comprising:
- selecting a file;
inserting a key into the contents of the file, the key being randomly inserted into the contents of the file; and
, encrypting the file after the key has been inserted using an encryption key, which the encryption key is a second key, separate from the first said key and decrypting the encrypted file using the second key; and
, scanning the decrypted file to locate the first said key, the decrypted file then being validated for use to perform the function for which it is used if the first said key is found, but the decrypted file not being validated for use if the first said key is not found which is an indication that the file has been altered without authorization.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of preventing internet hacking of web sites. Operating system component files are encrypted by first selecting a secret key which is randomly inserted into the contents of the source file. The file is then encrypted using a second, separate key. When the encrypted OS file is subsequently requested by the operating system, it is decrypted and the decrypted file searched for the second key. If the second key is found, the file is considered valid and is processed by the operating system. If the second key is not found, the file is considered invalid and is not processed.
10 Citations
8 Claims
-
1. A method of preventing unauthorized personnel access to a computer file used to perform a function on the computer comprising:
-
selecting a file; inserting a key into the contents of the file, the key being randomly inserted into the contents of the file; and
, encrypting the file after the key has been inserted using an encryption key, which the encryption key is a second key, separate from the first said key and decrypting the encrypted file using the second key; and
, scanning the decrypted file to locate the first said key, the decrypted file then being validated for use to perform the function for which it is used if the first said key is found, but the decrypted file not being validated for use if the first said key is not found which is an indication that the file has been altered without authorization. - View Dependent Claims (2, 3)
-
-
4. A method of preventing an unauthorized person access to an operating system (OS) file of a computer, comprising:
-
selecting an operating file; inserting a first key into the contents of the file and then encrypting the resulting file using a second key, the first key being randomly inserted into the contents of the file; subsequently decrypting the file using the second key and examining the decrypted file for the first key; validating the decrypted file for use by the computer if the first key is found in the decrypted file;
but,rejecting the decrypted file for use by the computer if the first key is not found, because failure to find the first key is an indication the computer has been hacked. - View Dependent Claims (5, 6)
-
-
7. A method of preventing a hacked computer file from being run on a computer thereby to prevent damage caused by hacking, comprising:
-
selecting an program file run by the computer; randomly inserting a first key into the contents of the file; encrypting the resulting file using a second, separate key; decrypting the encrypted file prior to its subsequent use, the file being decrypted using the second key and the decrypted file now being examined for the first key embedded therein; and
,validating the decrypted file for use by the computer if the first key is found in the decrypted file, but rejecting the decrypted file for use by the computer if the first key is not found because failure to find the first key in the decrypted file is evidence the file has been hacked. - View Dependent Claims (8)
-
Specification