Processing

Please wait...

Settings

Settings

Goto Application

1. WO2002025409 - SOFTWARE CODE SIGNING SYSTEM AND METHOD

Publication Number WO/2002/025409
Publication Date 28.03.2002
International Application No. PCT/CA2001/001344
International Filing Date 20.09.2001
Chapter 2 Demand Filed 22.04.2002
IPC
G06F 1/00 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
1Details not covered by groups G06F3/-G06F13/82
G06F 21/00 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
CPC
G06F 21/10
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
G06F 21/121
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
121Restricting unauthorised execution of programs
G06F 21/51
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
51at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
G06F 21/629
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
629to features or functions of an application
H04L 63/067
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
06for supporting key management in a packet data network
067using one-time keys
H04L 63/0823
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
0823using certificates
Applicants
  • RESEARCH IN MOTION LIMITED [CA]/[CA] (AllExceptUS)
  • YACH, David, P. [CA]/[CA] (UsOnly)
  • BROWN, Michael, S. [CA]/[CA] (UsOnly)
  • LITTLE, Herbert, A. [CA]/[CA] (UsOnly)
Inventors
  • YACH, David, P.
  • BROWN, Michael, S.
  • LITTLE, Herbert, A.
Agents
  • PATHIYAL, Krishna, K.
Priority Data
60/234,15221.09.2000US
60/235,35426.09.2000US
60/270,66320.02.2001US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SOFTWARE CODE SIGNING SYSTEM AND METHOD
(FR) SYSTEME ET PROCEDE DE SIGNATURE PAR CODE
Abstract
(EN)
A code signing system and method is provided. The code signing system operates in conjunction with a signed software application having a digital signature and includes an application platform, an application programming interface (API), and a virtual machine. The API is configured to link the software application with the application platform. The virtual machine verifies the authenticity of the digital signature in order to control access to the API by the software application.
(FR)
Système de signature par code qui fonctionne en coopération avec une application logicielle signée possédant une signature numérique et qui comporte une plate-forme d'application, une interface de programmation d'application (API) et une machine virtuelle. L'API est configurée pour relier l'application logicielle et la plate-forme d'application. La machine virtuelle vérifie l'authenticité de la signature numérique afin de contrôler l'accès de l'application logicielle à l'API.
Latest bibliographic data on file with the International Bureau