Method and apparatus for transmitting and receiving encoded data
Data authentication using modification detection codes based on a public one way encryption function
Method and apparatus for verifying the integrity of a file stored separately from a computer
Generic encryption technique for communication networks
System and method for protecting integrity of computer data and software
Method for obtaining a securitized cleartext attestation in a distributed data processing system environment
Hybrid encryption method and system for protecting reusable software components
Method and apparatus for authentication of client server communication
Method for securing software against corruption by computer viruses
Signature data object
ApplicationNo. 761698 filed on 12/06/1996
US Classes:713/176, Authentication by digital signature representation or digital watermark713/167, Object protection713/187COMPUTER PROGRAM MODIFICATION DETECTION BY CRYPTOGRAPHY
ExaminersPrimary: Barron, Gilberto Jr.
Attorney, Agent or Firm
International ClassesH04L 009/30
AbstractA certification or signature is incorporated in a computer program, an executable file, or code to assure its authenticity and integrity, particularly for receiving it over an open computer network like the Internet. The executable file may be of any executable form, including an executable or portable executable .exe file format, a .cab cabinet file format, an .ocx object control format, or a Java class file. The certification includes a keyed source confirmation with a secure representation of the executable file. In an embodiment, the certification is referenced in a header of the executable file, the reference including a pointer to the keyed source confirmation and an indication of the size of the keyed source confirmation.