CA2319229A1 - Computer file integrity verification - Google Patents
Computer file integrity verification Download PDFInfo
- Publication number
- CA2319229A1 CA2319229A1 CA002319229A CA2319229A CA2319229A1 CA 2319229 A1 CA2319229 A1 CA 2319229A1 CA 002319229 A CA002319229 A CA 002319229A CA 2319229 A CA2319229 A CA 2319229A CA 2319229 A1 CA2319229 A1 CA 2319229A1
- Authority
- CA
- Canada
- Prior art keywords
- file
- function
- value
- computer
- computer file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Abstract
System and method for verifying the integrity of contents within a computer file (5). A security value S is stored within the file (5). A verification function f is applied against the entire contents of the file (5) including S, where f is a function of S.
Results R of the applying step are compared against a preselected value r, where r is not stored within the file (5). When R equals r, a determination is made that the file (5) has not been modified. f is typically a distributive invertible function such as the Cyclic Redundancy Check (CRC) function known as modulo p, where p is a prime number and is one bit greater than the length of S. Typically, the value of r is zero. Before executing the verification function f, a check generating program is first executed. This check generating program is executed by a computer (4) that is remote from the file (5), further enhancing the security of the system.
Results R of the applying step are compared against a preselected value r, where r is not stored within the file (5). When R equals r, a determination is made that the file (5) has not been modified. f is typically a distributive invertible function such as the Cyclic Redundancy Check (CRC) function known as modulo p, where p is a prime number and is one bit greater than the length of S. Typically, the value of r is zero. Before executing the verification function f, a check generating program is first executed. This check generating program is executed by a computer (4) that is remote from the file (5), further enhancing the security of the system.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/010,939 US6122738A (en) | 1998-01-22 | 1998-01-22 | Computer file integrity verification |
US09/010,939 | 1998-01-22 | ||
PCT/US1999/001444 WO1999038076A1 (en) | 1998-01-22 | 1999-01-21 | Computer file integrity verification |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2319229A1 true CA2319229A1 (en) | 1999-07-29 |
CA2319229C CA2319229C (en) | 2005-12-13 |
Family
ID=21748123
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002319229A Expired - Fee Related CA2319229C (en) | 1998-01-22 | 1999-01-21 | Computer file integrity verification |
Country Status (6)
Country | Link |
---|---|
US (1) | US6122738A (en) |
EP (1) | EP1049977B1 (en) |
AT (1) | ATE217427T1 (en) |
CA (1) | CA2319229C (en) |
DE (1) | DE69901424T2 (en) |
WO (1) | WO1999038076A1 (en) |
Families Citing this family (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL143573A0 (en) | 1998-12-09 | 2002-04-21 | Network Ice Corp | A method and apparatus for providing network and computer system security |
US7346929B1 (en) | 1999-07-29 | 2008-03-18 | International Business Machines Corporation | Method and apparatus for auditing network security |
US8006243B2 (en) | 1999-12-07 | 2011-08-23 | International Business Machines Corporation | Method and apparatus for remote installation of network drivers and software |
US6990579B1 (en) * | 2000-03-31 | 2006-01-24 | Intel Corporation | Platform and method for remote attestation of a platform |
GB2405973B (en) * | 2000-03-31 | 2005-04-27 | Intel Corp | Platform and method for remote attestation of a platform |
US7921459B2 (en) | 2000-04-28 | 2011-04-05 | International Business Machines Corporation | System and method for managing security events on a network |
JP2002014871A (en) * | 2000-06-29 | 2002-01-18 | Fujitsu Ltd | Contents check method, contents update method and processor |
US7093239B1 (en) * | 2000-07-14 | 2006-08-15 | Internet Security Systems, Inc. | Computer immune system and method for detecting unwanted code in a computer system |
US7082521B1 (en) | 2000-08-24 | 2006-07-25 | Veritas Operating Corporation | User interface for dynamic computing environment using allocateable resources |
US7065637B1 (en) | 2000-08-24 | 2006-06-20 | Veritas Operating Corporating | System for configuration of dynamic computing environments using a visual interface |
JP4352600B2 (en) | 2000-09-01 | 2009-10-28 | ソニー株式会社 | Data falsification check device and method, and recording medium |
US7043724B2 (en) * | 2000-09-14 | 2006-05-09 | Veritas Operating Corporation | System and services for handling computing environments as documents |
US9027121B2 (en) | 2000-10-10 | 2015-05-05 | International Business Machines Corporation | Method and system for creating a record for one or more computer security incidents |
US20040039921A1 (en) * | 2000-10-17 | 2004-02-26 | Shyne-Song Chuang | Method and system for detecting rogue software |
JP2002132456A (en) * | 2000-10-20 | 2002-05-10 | Sony Corp | Information recording device, information reproducing device, information recording method, information reproducing method, information recording medium and program providing medium |
US6647528B1 (en) * | 2000-11-02 | 2003-11-11 | Computer Network Technology Corporation | Fiber channel CRC for internal error checking on a switching platform |
US8631103B1 (en) | 2000-11-10 | 2014-01-14 | Symantec Operating Corporation | Web-based administration of remote computing environments via signals sent via the internet |
US7275102B2 (en) * | 2001-01-22 | 2007-09-25 | Sun Microsystems, Inc. | Trust mechanisms for a peer-to-peer network computing platform |
US20020147803A1 (en) | 2001-01-31 | 2002-10-10 | Dodd Timothy David | Method and system for calculating risk in association with a security audit of a computer network |
US7181484B2 (en) | 2001-02-21 | 2007-02-20 | Mips Technologies, Inc. | Extended-precision accumulation of multiplier output |
US7711763B2 (en) * | 2001-02-21 | 2010-05-04 | Mips Technologies, Inc. | Microprocessor instructions for performing polynomial arithmetic operations |
US7162621B2 (en) | 2001-02-21 | 2007-01-09 | Mips Technologies, Inc. | Virtual instruction expansion based on template and parameter selector information specifying sign-extension or concentration |
US20020147918A1 (en) * | 2001-04-05 | 2002-10-10 | Osthoff Harro R. | System and method for securing information in memory |
CN101056159B (en) * | 2001-05-14 | 2014-12-24 | 英特尔公司 | Method and user device for receiving data in high-speed shared control channel |
US6915473B2 (en) | 2001-05-14 | 2005-07-05 | Interdigital Technology Corporation | Method and system for implicit user equipment identification |
US7657419B2 (en) | 2001-06-19 | 2010-02-02 | International Business Machines Corporation | Analytical virtual machine |
US7174463B2 (en) * | 2001-10-04 | 2007-02-06 | Lenovo (Singapore) Pte. Ltd. | Method and system for preboot user authentication |
US7035867B2 (en) * | 2001-11-28 | 2006-04-25 | Aerocast.Com, Inc. | Determining redundancies in content object directories |
US20030101167A1 (en) * | 2001-11-29 | 2003-05-29 | International Business Machines Corporation | File maintenance on a computer grid |
US8266113B2 (en) * | 2003-04-01 | 2012-09-11 | Cybersoft, Inc. | Methods, apparatus and articles of manufacture for computer file integrity and baseline maintenance |
AU2003202876A1 (en) | 2002-01-04 | 2003-07-24 | Internet Security Systems, Inc. | System and method for the managed security control of processes on a computer system |
US7391723B2 (en) * | 2002-04-22 | 2008-06-24 | Computer Network Technology Corporation | Frame-level fibre channel CRC on switching platform |
US6990612B2 (en) * | 2002-07-18 | 2006-01-24 | Hewlett-Packard Development Company, L.P. | System and method for preventing software errors |
US6986033B2 (en) | 2002-09-10 | 2006-01-10 | Veritas Operating Corporation | System for automated boot from disk image |
US7913303B1 (en) | 2003-01-21 | 2011-03-22 | International Business Machines Corporation | Method and system for dynamically protecting a computer system from attack |
US6986041B2 (en) | 2003-03-06 | 2006-01-10 | International Business Machines Corporation | System and method for remote code integrity in distributed systems |
US7657938B2 (en) | 2003-10-28 | 2010-02-02 | International Business Machines Corporation | Method and system for protecting computer networks by altering unwanted network data traffic |
US7200405B2 (en) | 2003-11-18 | 2007-04-03 | Interdigital Technology Corporation | Method and system for providing channel assignment information used to support uplink and downlink channels |
US7984304B1 (en) * | 2004-03-02 | 2011-07-19 | Vmware, Inc. | Dynamic verification of validity of executable code |
US8260893B1 (en) | 2004-07-06 | 2012-09-04 | Symantec Operating Corporation | Method and system for automated management of information technology |
US8984636B2 (en) | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
US7895651B2 (en) | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US8272058B2 (en) | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
US10878646B2 (en) | 2005-12-08 | 2020-12-29 | Smartdrive Systems, Inc. | Vehicle event recorder systems |
US20070150138A1 (en) | 2005-12-08 | 2007-06-28 | James Plante | Memory management in event recording systems |
US9201842B2 (en) | 2006-03-16 | 2015-12-01 | Smartdrive Systems, Inc. | Vehicle event recorder systems and networks having integrated cellular wireless communications systems |
US8996240B2 (en) | 2006-03-16 | 2015-03-31 | Smartdrive Systems, Inc. | Vehicle event recorders with integrated web server |
SG136828A1 (en) * | 2006-04-25 | 2007-11-29 | Khee Seng Chua | Method of safeguarding against malicious software (malware) |
US7659827B2 (en) | 2006-05-08 | 2010-02-09 | Drivecam, Inc. | System and method for taking risk out of driving |
US8373567B2 (en) | 2006-05-08 | 2013-02-12 | Drivecam, Inc. | System and method for identifying non-event profiles |
US7804426B2 (en) | 2006-05-08 | 2010-09-28 | Drivecam, Inc. | System and method for selective review of event data |
US8314708B2 (en) | 2006-05-08 | 2012-11-20 | Drivecam, Inc. | System and method for reducing driving risk with foresight |
US9836716B2 (en) | 2006-05-09 | 2017-12-05 | Lytx, Inc. | System and method for reducing driving risk with hindsight |
US7904963B2 (en) * | 2006-09-26 | 2011-03-08 | Microsoft Corporation | Generating code to validate input data |
US8989959B2 (en) | 2006-11-07 | 2015-03-24 | Smartdrive Systems, Inc. | Vehicle operator performance history recording, scoring and reporting systems |
US8649933B2 (en) | 2006-11-07 | 2014-02-11 | Smartdrive Systems Inc. | Power management systems for automotive video event recorders |
US8868288B2 (en) | 2006-11-09 | 2014-10-21 | Smartdrive Systems, Inc. | Vehicle exception event management systems |
US8356178B2 (en) * | 2006-11-13 | 2013-01-15 | Seagate Technology Llc | Method and apparatus for authenticated data storage |
US7945504B1 (en) * | 2007-03-19 | 2011-05-17 | Columbia Capital Management, L.L.C. | Secure image bidding system |
US8239092B2 (en) | 2007-05-08 | 2012-08-07 | Smartdrive Systems Inc. | Distributed vehicle event recorder systems having a portable memory data transfer system |
US8578179B2 (en) * | 2007-10-19 | 2013-11-05 | Samsung Electronics Co., Ltd | Safe command execution and error recovery for storage devices |
JP5400873B2 (en) * | 2008-06-05 | 2014-01-29 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Method, system, and computer program for identifying software problems |
US8218763B2 (en) * | 2009-04-22 | 2012-07-10 | International Business Machines Corporation | Method for ensuring the validity of recovered electronic documents from remote storage |
US8667301B2 (en) * | 2010-04-01 | 2014-03-04 | Apple Inc. | Obfuscating transformations on data array content and addresses |
US9728228B2 (en) | 2012-08-10 | 2017-08-08 | Smartdrive Systems, Inc. | Vehicle event playback apparatus and methods |
US9501878B2 (en) | 2013-10-16 | 2016-11-22 | Smartdrive Systems, Inc. | Vehicle event playback apparatus and methods |
US9610955B2 (en) | 2013-11-11 | 2017-04-04 | Smartdrive Systems, Inc. | Vehicle fuel consumption monitor and feedback systems |
US8892310B1 (en) | 2014-02-21 | 2014-11-18 | Smartdrive Systems, Inc. | System and method to detect execution of driving maneuvers |
US9663127B2 (en) | 2014-10-28 | 2017-05-30 | Smartdrive Systems, Inc. | Rail vehicle event detection and recording system |
US11069257B2 (en) | 2014-11-13 | 2021-07-20 | Smartdrive Systems, Inc. | System and method for detecting a vehicle event and generating review criteria |
US9679420B2 (en) | 2015-04-01 | 2017-06-13 | Smartdrive Systems, Inc. | Vehicle event recording system and method |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4888798A (en) * | 1985-04-19 | 1989-12-19 | Oms, Inc. | Modular software security |
US4766537A (en) * | 1986-01-02 | 1988-08-23 | Motorola, Inc. | Paged memory management unit having stack change control register |
US5050212A (en) * | 1990-06-20 | 1991-09-17 | Apple Computer, Inc. | Method and apparatus for verifying the integrity of a file stored separately from a computer |
US5103476A (en) * | 1990-11-07 | 1992-04-07 | Waite David P | Secure system for activating personal computer software at remote locations |
US5182770A (en) * | 1991-04-19 | 1993-01-26 | Geza Medveczky | System and apparatus for protecting computer software |
WO1993025024A1 (en) * | 1992-05-26 | 1993-12-09 | Cyberlock Data Intelligence, Inc. | Computer virus monitoring system |
US5432851A (en) * | 1993-10-21 | 1995-07-11 | Tecsec Incorporated | Personal computer access control system |
NZ336414A (en) * | 1993-12-01 | 2000-01-28 | Rpk Nz Ltd | Method of combining serial keystream output to produce encrypted bit stream using pseudorandom permutation and replacing byte(s) of serial keystream |
WO1995015522A1 (en) * | 1993-12-02 | 1995-06-08 | Scheele, Drew | Digital data verification system |
US5548532A (en) * | 1994-04-28 | 1996-08-20 | Thomson Consumer Electronics, Inc. | Apparatus and method for formulating an interactive TV signal |
US5530757A (en) * | 1994-06-28 | 1996-06-25 | International Business Machines Corporation | Distributed fingerprints for information integrity verification |
US5661848A (en) * | 1994-09-08 | 1997-08-26 | Western Digital Corp | Multi-drive controller with encoder circuitry that generates ECC check bytes using the finite field for optical data for appending to data flowing to HDA |
US5606609A (en) * | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
US5625693A (en) * | 1995-07-07 | 1997-04-29 | Thomson Consumer Electronics, Inc. | Apparatus and method for authenticating transmitting applications in an interactive TV system |
AU6502896A (en) * | 1995-07-20 | 1997-02-18 | Dallas Semiconductor Corporation | Single chip microprocessor, math co-processor, random number generator, real-time clock and ram having a one-wire interface |
US5802080A (en) * | 1996-03-28 | 1998-09-01 | Seagate Technology, Inc. | CRC checking using a CRC generator in a multi-port design |
US6014767A (en) * | 1996-09-04 | 2000-01-11 | International Business Machines Corporation | Method and apparatus for a simple calculation of CRC-10 |
US6048090A (en) * | 1997-04-23 | 2000-04-11 | Cirrus Logic, Inc. | Error correction and concurrent verification of a product code |
US5854759A (en) * | 1997-05-05 | 1998-12-29 | Rsa Data Security, Inc. | Methods and apparatus for efficient finite field basis conversion |
US6000032A (en) * | 1997-07-15 | 1999-12-07 | Symantec Corporation | Secure access to software modules |
-
1998
- 1998-01-22 US US09/010,939 patent/US6122738A/en not_active Expired - Lifetime
-
1999
- 1999-01-21 EP EP99903337A patent/EP1049977B1/en not_active Expired - Lifetime
- 1999-01-21 AT AT99903337T patent/ATE217427T1/en not_active IP Right Cessation
- 1999-01-21 WO PCT/US1999/001444 patent/WO1999038076A1/en active IP Right Grant
- 1999-01-21 DE DE69901424T patent/DE69901424T2/en not_active Expired - Lifetime
- 1999-01-21 CA CA002319229A patent/CA2319229C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
DE69901424D1 (en) | 2002-06-13 |
US6122738A (en) | 2000-09-19 |
EP1049977A1 (en) | 2000-11-08 |
DE69901424T2 (en) | 2003-01-09 |
CA2319229C (en) | 2005-12-13 |
ATE217427T1 (en) | 2002-05-15 |
WO1999038076A1 (en) | 1999-07-29 |
EP1049977B1 (en) | 2002-05-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2319229A1 (en) | Computer file integrity verification | |
CA2441620C (en) | Data stream header object protection | |
US5633931A (en) | Method and apparatus for calculating message signatures in advance | |
RU2227376C2 (en) | Authenticating data in digital data transfer system | |
US6134597A (en) | CRC hash compressed server object identifier | |
DE60113844T2 (en) | METHOD FOR DETERMINING NORTHERN COMPUTER CODES | |
CA2458765A1 (en) | Compact hardware identification for binding a software package to a computer system having tolerance for hardware changes | |
US6000032A (en) | Secure access to software modules | |
CN111475824A (en) | Data access method, device, equipment and storage medium | |
WO2004038652A8 (en) | Protection of a portable object against denial of service type attacks. | |
RU2348968C2 (en) | System for interlinking of secrets with computer system having some tolerance on hardware changes | |
DE602004009639T2 (en) | Method or device for authenticating digital data by means of an authentication plug-in | |
WO2003049106A3 (en) | Method and apparatus for verifying the integrity of system data | |
US20020191785A1 (en) | Apparatus and method for encrypting and decrypting data with incremental data validation | |
CN113065169A (en) | File storage method, device and equipment | |
Eisler | LIPKEY-a low infrastructure public key mechanism using SPKM | |
DE102016204684A1 (en) | Method and device for providing a cryptographic security function for the operation of a device | |
KR100745393B1 (en) | Video signal authentication system | |
WO2004090695A1 (en) | Method for checking the data integrity of software in control appliances | |
CN110610079A (en) | Safe starting method, device and system | |
Tomas et al. | Towards formal verification of cyber security standards | |
Nasser et al. | Accelerated Secure Boot for Real-Time Embedded Safety Systems | |
EP1151380B1 (en) | Reducing time for executing instruction streams under run-time security | |
WO2005050397A3 (en) | System and method of ensuring quality control of software | |
WO2003098898A1 (en) | Clearance-based method for dynamically configuring encryption strength |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20190121 |