US20020062439A1 - Digital signaturing method and system for packaging specialized native files for open network transport and for burning onto cd-rom - Google Patents

Digital signaturing method and system for packaging specialized native files for open network transport and for burning onto cd-rom Download PDF

Info

Publication number
US20020062439A1
US20020062439A1 US09/124,557 US12455798A US2002062439A1 US 20020062439 A1 US20020062439 A1 US 20020062439A1 US 12455798 A US12455798 A US 12455798A US 2002062439 A1 US2002062439 A1 US 2002062439A1
Authority
US
United States
Prior art keywords
file
format
disk
files
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/124,557
Other versions
US6415385B1 (en
Inventor
Lauren Ann Cotugno
Thien Huu Pham
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unisys Corp
Original Assignee
Unisys Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unisys Corp filed Critical Unisys Corp
Priority to US09/124,557 priority Critical patent/US6415385B1/en
Assigned to UNISYS CORPORATION reassignment UNISYS CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: COTUGNO, LAUREN ANN, PHAM, THIEN HUU
Publication of US20020062439A1 publication Critical patent/US20020062439A1/en
Application granted granted Critical
Publication of US6415385B1 publication Critical patent/US6415385B1/en
Assigned to DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERAL TRUSTEE reassignment DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERAL TRUSTEE PATENT SECURITY AGREEMENT (PRIORITY LIEN) Assignors: UNISYS CORPORATION
Assigned to DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERAL TRUSTEE reassignment DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERAL TRUSTEE PATENT SECURITY AGREEMENT (JUNIOR LIEN) Assignors: UNISYS CORPORATION
Assigned to GENERAL ELECTRIC CAPITAL CORPORATION, AS AGENT reassignment GENERAL ELECTRIC CAPITAL CORPORATION, AS AGENT SECURITY AGREEMENT Assignors: UNISYS CORPORATION
Assigned to UNISYS CORPORATION reassignment UNISYS CORPORATION RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: DEUTSCHE BANK TRUST COMPANY
Assigned to UNISYS CORPORATION reassignment UNISYS CORPORATION RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERAL TRUSTEE
Assigned to WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL TRUSTEE reassignment WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL TRUSTEE PATENT SECURITY AGREEMENT Assignors: UNISYS CORPORATION
Assigned to JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT reassignment JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: UNISYS CORPORATION
Assigned to UNISYS CORPORATION reassignment UNISYS CORPORATION RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: WELLS FARGO BANK, NATIONAL ASSOCIATION (SUCCESSOR TO GENERAL ELECTRIC CAPITAL CORPORATION)
Anticipated expiration legal-status Critical
Assigned to UNISYS CORPORATION reassignment UNISYS CORPORATION RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: WELLS FARGO BANK, NATIONAL ASSOCIATION
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems

Definitions

  • This system relates to methods for enabling and signaturing data files which are organized in a first native format to be packaged (wrapped) and burned onto a Compact Disk and to enable the packaged files to be transported via standard protocols and utilized outside their native environment in networks utilizing different data formats.
  • the Unisys A Series computer systems involve a Central Processing Unit and memory together with storage such as disk storage which operates under the control of a Master Control Program.
  • These A Series systems use a particular format for the data files compatible with the A Series software which can be placed on CD-ROMs.
  • the CD-ROMS which contain this A Series software contain an image of a formatted tape which can be utilized only by the A Series systems.
  • the software for a first system such as an A Series system with software, is utilized by providing methods to burn CD disks from a Library Maintenance formatted tape.
  • This method has the limitation in that it limits the type of files that are burned into CD-ROMs to those of the native A Series files.
  • the same system or method also provides the ability to package files of a proprietary system in such a way that allows the files to be transported across an open (non-proprietary) network without losing their original characteristics. When such files return to their native environment, their true data formats can be restored.
  • the A Series systems have files with specialized attributes such as FILEKIND, CREATIONDATE, RELEASEID, etc. When these files are transferred to a PC running Windows NT, all those attributes will be lost. By packaging the files and their attributes into standard, simple text files, the new files then can be transported across any open system (e.g., UNIX, NT). Upon reaching their destinations (which are other A Series systems), the text files are converted back to their native forms with all the right attributes. This is ideal for maintaining A Series data formats in a heterogeneous networking environment.
  • a digital signature is calculated for every file as it is being WRAPPED (packaged). This signature is calculated using the Disk File Header (DFH) and the data within the file, along with the Public/Private key pair. This will ensure that there is no intentional corruption of the Disk File Header (DFH) and the data as the file is shipped across a network. It will also provide the receiver of the file a certain measure of confidence as to the origin of the file. Additionally to the signature, there will be calculated a checksum for entire contents of the file, including the Disk File Header.
  • the Unisys A Series systems will provide a programmatic interface to its Master Control Program (MCP) which will provide a mechanism for “wrapping” files with signature and for “unwrapping” signatured wrapped files.
  • MCP Master Control Program
  • Wrapping is a term which is used to define the process of packaging an A Series file, along with its Disk File Header information and a checksum and optionally a digital signature, as a byte-stream data file, so that it can be transported across heterogeneous networks and non-A Series specific media, while still maintaining its native A Series attributes.
  • Unwrapping is a term used to define the process of taking a previously “wrapped file” and coupling it with the information from its original Disk File Header (DFH) in order to restore the original native A Series file, as it existed prior to being wrapped.
  • DSH Disk File Header
  • the presently described system and method provides for taking a first file format with native attributes such as used in Unisys A-Series systems and developing a second generalized format for transport to open network without losing the native attributes and for burning into a CD-ROM such that now this second file format is compatible for both NT and other systems in addition to A Series systems.
  • the second file format will provide a signature to be created for the entire file. This is so, since the checksum is not sufficient to ensure that a Disk File Header has not been intentionally corrupted, since the checksum algorithm is not protected, and could easily be reproduced.
  • a signed, wrapped file can be sent to another user through e-mail, through the Internet or put into an industry-standard CD-ROM.
  • the packaged (wrapped) file can be transported to an open network without loss of the native attributes and can be burned onto an industry-standard CD-ROM without loss of native attributes.
  • a digital signature is generated to ensure the integrity of the packaged file.
  • An algorithmic sequence is implemented in software for transforming files of a proprietary system into single wrapped files with digital signature option.
  • the new files are stored in a standard text file format such that they can be transported to and across an open network while still maintaining their native characteristics. They can also be burnt together with files originated from other platforms onto the same industry-standard Compact Discs (CDROMs) which then can be viewed and utilized by a variety of systems.
  • CDROMs Compact Discs
  • the present system is applicable in the Unisys ClearPath environment which involves a situation where two systems are connected to and communicating with each other, for example, such as that both a Microsoft NT platform and a Unisys A Series platform can both read from the same Compact Disc in a compatible fashion.
  • a Microsoft NT platform and a Unisys A Series platform can both read from the same Compact Disc in a compatible fashion.
  • this makes it possible to put the NT platform software and the A Series platform software all on the same CDROM.
  • the present system is also applicable in a heterogeneous networking environment where one Unisys A Series system needs to transport is native files across computers of different platforms (for example, UNIX, Windows NT) to another Unisys A Series system.
  • the method enables native files to be encoded in such a way that they can be treated as simple text files by any computing platform and to be restored back to their original forms by an A Series machine without losing their native attributes.
  • the Master Control Program of the A Series computer generally cannot trust files, particularly code files that come from external sources.
  • the method creates a digital signature for a wrapped file to ensure that the file is not tampered either intentionally or unintentionally during its transit.
  • FIG. 1A is a general overview of the present system for digital signaturing and developing a transportable file
  • FIG. 1B is a more detailed block diagram of the system which enables digital signaturing, the packaging of a transportable file and burning-in of a Compact Disk with a file which is compatible to both a first protocol system and a second protocol system;
  • FIGS. 2A (- 1 ,- 2 ,- 3 ,- 4 ) and 2 B are flow charts indicating the system of steps involved for burning a CD-ROM with the data in a generalized protocol format suitable for Internet transmission and for compatibility with NT or other platforms;
  • FIG. 3 is an illustration of the format for a WRAPPEDDATA file as a byte-steam file.
  • FIG. 4A is a flow chart illustrating the overall process of signaturing and wrapping single files
  • FIG. 4B is a flow chart illustrating the MCP_FILEWRAPPER logic to digitally sign and wrap single files
  • FIG. 4C is a flow chart illustrating the MCP_WRAPPER logic to digitally sign and wrap single files
  • FIG. 4D is a flow chart illustrating the WRITE_WRAP logic to digitally signature and wrap a single file
  • FIG. 5 is a block diagram to show creating a DSAKEYSFILE
  • FIG. 6 is a block diagram to show how to wrap and signature a file
  • FIG. 7 is a block diagram to show how to verify and unwrap a signatured file.
  • a SERIES ATTRIBUTES Native attributes that can be assigned to a file to allow the system to control how the file is accessed and used, and by whom (security privileges). There are somewhere on the order of 450 such attributes for Unisys A Series files.
  • a SERIES KEYS FILE A native file, located on a individual system, that contains license key information used to control which features an individual system is allowed to use for some features. License keys need to be purchased by the user before the feature can be utilized on the individual system.
  • DATA CD-ROM See ISO 9660 Format (Item 12 below).
  • CDs appear like disks on A Series systems. Multiple user access is allowed to these CDs.
  • DIGITAL SIGNATURE A digital signature is a hash pattern created by applying an industry standard signaturing algorithm (similar to a checksum) to a file or data stream, along with a private key. This hash pattern travels with the file across a network and is used, along with a public key, in order to ensure the file has not been compromised (intentionally or otherwise) during the transfer process.
  • CONTAINER A single byte-stream file consisting of one or more wrapped files, a simple directory of files stored in the container, and optionally a digital signature.
  • CREATIONDATE An A Series (Unisys) file attribute, used to store the data and time a file was created.
  • FILEDATA LFILE: An A Series (Unisys) program, or utility, used to interrogate attribute information of native A Series files.
  • FILEKIND An A Series (Unisys) file attribute, used to identify the internal structure of the file being accessed (e.g. Algol symbol, Algol object code, character data, or system directory).
  • ICP INTERIM CORRECTION PROCESS
  • ISO 9660 FORMAT A standard format used for directories and files on CD-ROM disks. The presentation for the information contained on these directories is at the operating system's discretion. On Unisys A Series systems, directories and files are viewed using the standard Cande “FILES” and ODT “PD” commands.
  • LIBRARY MAINTENANCE FORMAT A Unisys proprietary format for tapes containing multiple files used primarily for archives, backup of restore, and transferring of files among A Series systems.
  • LIBMAINT CD-ROM A specially formatted CD-ROM, created on an ISO 9660 Formatted CD-ROM, that contains an image of a Library Maintenance tape. This appears to an A Series system as if it were a Library Maintenance tape. Only one user is permitted access at a time, and only COPY (and COPY-related) syntax, and Filedata TDIR are allowed to act on this CD.
  • NATIVE A SERIES FILES A file created on Unisys A Series systems or ClearPath HMP/NX systems specifically for use on that same class of systems.
  • NON A SERIES FILES Files that were created on systems other than Unisys A Series or ClearPath HMP/NX systems.
  • NEW FORMAT FILE the Byte-Stream data file that results from executing the WRAP process on an A Series file.
  • P, O, G keys: Primary numbers, stored in the system's digital signature keys file and used in the creation of public/private keys as well as both signing files and verifying the signatures of files, using the public and private keys.
  • PUBLIC & PRIVATE KEYS Public and private key pairs are generated at the same time by a special utility. These key pairs are used to create a signature and then later check that signature to ensure that a file has not been compromised. These keys are generated together and must be used together to ensure the integrity of a file. Under normal operations, the private key is intended to be known only by the person or utility generating the hashed signature of the file. This key is meant to be restricted. The public key can be made available to any person or utility wishing to check the signature to ensure the integrity of the file once it has reached its destination.
  • PUBLIC/PRIVATE ENCRYPTION A common methodology for encrypting files so they may be transported across an open network so as to use a public/private password encryption scheme.
  • the two passwords are programmatically generated at the same time such that they can be used in conjunction with each other.
  • One password, the private one will be used to encrypt the file.
  • the other password, the public one is used by the recipient of the file to decode it.
  • a smear pattern or some clear text string, is added at the beginning of the file before the file is encrypted. When the file has been decoded using the public password, this smear pattern should match what was originally placed in the file. If the string does not match, it can be assumed that the integrity of the file has been compromised.
  • RELEASE ID A Unisys A Series file attribute, used to store the specific release level that the software was created for.
  • SHARE A Directory or disk that is made available to selected or all users across a network.
  • UNWRAP The process of taking a previously wrapped file (or data stream) and coupling it with the information from its original Disk File Header, to re-create the original native A Series file as it existed prior to being wrapped.
  • WFL SYNTAX Work flow language syntax, used to control job flow on a system.
  • WFL UNWRAP syntax Specific work flow language syntax used to execute the unwrap process on a file, or files.
  • INPUT FILE The already existing file that is to be packaged into a byte-stream text file by the wrap process.
  • OUTPUT FILE The resultant byte-stream text file created by “wrapping” the input file.
  • DSA Digital Signature Algorithm—used to create a digital signature for a file or data stream. It should not be confused with any data encryption algorithm since the data is not encrypted by any means.
  • DSA INFORMATION SET This term is used loosely here. It is essentially the same as DSA Key Set, but without the system DSA public key.
  • DSA KEY SET A set of DSA information which consists of ⁇ KeyID, SSR level, Prime P, Prime Q,G, system DSA public key ⁇ for a particular software level. Only one set is created for a software release.
  • DSA KEYSFILE The system file that contains one or more DSA key sets. If the file is titled as *SYSTEM/DSAKEYSFILE and is stored on the halt/load pack, it is considered as the active system DSA keysfile.
  • SIGNATURING The process of applying the Digital Signature Algorithm to a file while wrapping it into a WRAPPEDDATA or CONTAINERDATA file. The resulting file is said to be digitally “signatured” or “signed”.
  • SYSTEM DSA PRIVATE KEY A DSA private key created for the sole purpose of signaturing Unisys-released software. It is kept secret by the Unisys Software Releases (and/or Support Group). Only one system private key exists per release. Its counterpart—the system public key—is stored in the system DSA keysfile.
  • SYSTEM DSA PUBLIC KEY A DSA public key created for the sole purpose of verifying wrapped software signed by the Unisys Software Releases (and/or Support Group) using a corresponding system DSA private key. only one system public key exists per release and is stored as part of a DSA key set in the System DSA keysfile.
  • VERIFYING The process of validating the digital signature of a WRAPPEDDATA or CONTAINERDATA file before unwrapping it.
  • SL is a Unisys A-Series MCP systems operation used to declare that a codefile o program, is to be considered a “System Library” for execution purposes. It allows for other programs to access the functions in that library without knowing much of anything about the library itself. The operating system will have knowledge about where the library is located on the disk, and control over which programs are allowed to link to the library for the purpose of accessing its routines.
  • a user terminal 8 is connected to a first operating system 14 , such as a Unisys A Series computer, having outputs to a disk A, 20 and a disk B, 22 .
  • a first operating system 14 such as a Unisys A Series computer, having outputs to a disk A, 20 and a disk B, 22 .
  • a second operating system such as NT platform system 30 , utilizing the Microsoft Explorer program 30 x, Internet or e-mail program 30 y, and a CD Writer Package 30 w, communicates with disk C, 24 so that the User terminal 8 can initiate the CD Writer Package 30 w to energize the CD Write Module 32 in order to burn a file on to the compact disk (CD) 34 .
  • CD compact disk
  • the disk A, 20 holds data designated as MY/FILE.
  • the disk B, 22 holds the data designated MY/NEW/FILE, 23 .
  • the disk C, 24 holds the resultant data designated C:MY ⁇ NEW ⁇ FILE, 25 .
  • the data 25 of disk C, 24 is controlled by the CD Writer 30 w for transmittal to the CD Write Module 32 for burning into the compact disk (CD) disk 34 .
  • the Internet/e-mail programs 30 y enable transmittal of a packaged file (wrapped) to the open network 40 . It may also be noted that Disk A and Disk B could actually be the same physical device. It is not necessary that they always be two separate entities.
  • the User terminal 8 will use the channel marker cycle designated 101 to the first system computer 14 with a WFL WRAP [input file] as a [output file] from the [input disk media] such as disk A over to a [output disk media] such as disk B, 22 .
  • the User terminal 8 will communicate with the NT system 30 having Microsoft Explorer 30 x, in order to start an operation which drags the file from the A Series' disks A, 20 , and B, 22 , and drops the file on to the NT systems' disk C 24 .
  • the User terminal 8 using the designated channel marker cycle 103 then executes the CD Writer Package 30 w by initiating the CD Write Module 32 in order to burn the file 25 , C: ⁇ MY ⁇ NEW ⁇ FILE, on to the CD (compact disk) unit 34 .
  • the resultant file data on the compact disk 34 is in a protocol compatible for usage by other platforms.
  • the second system designated as the NT system 30 could also be designated alternatively as a UNIX system, in which case, the NX services 50 shown in FIG. 1B would not be required and the Microsoft Explorer program 30 x of FIG. 1A would be replaced by the industry-wide standard File Transfer Protocol (FTP).
  • FTP File Transfer Protocol
  • FIG. 1B will be subsequently described herein to indicate the hardware system in greater detail.
  • FIG. 1B there is seen a drawing of the major elements involved in the present system.
  • a first system is shown, for example, such as a Unisys A Series computer operating system 14 which involves a Central Processing Unit 12 , a main memory 18 , a microcode memory 16 which is managed by the MCP 10 (Master Control Program).
  • the CPU 12 is also supported by a storage media 20 , Disk A, which carries an original file 21 , designated MY/FILE which is formatted suitably for the first system such as the A Series computer system 14 and Disk B, 22 , which will be enabled to carry a new file designated MY/NEW/FILE, which is formatted for transport to a second system.
  • NT System 30 (alternatively a UNIX, IBM or other system) which is a platform developed by the Microsoft Corporation of Redland, Wash.
  • the NT System 30 is seen having a storage medium 24 such as Disk C, which will eventually be provided with a resultant file 25 designated C: ⁇ MY ⁇ NEW ⁇ FILE (Item 25).
  • the A-Series system 14 is provided with a WFL (Work Flow Language) compiler 15 which is an interpretive language capable of taking User instructions and translating them into Operating System (O.S.) procedure calls.
  • WFL Work Flow Language
  • the MCP 10 has a relationship to the NT system 30 through use of a NX services unit 50 .
  • NX/Services is a software unit used to integrate MCP operations with NT platform operations through the use of a Microsoft (MS) Standard RPC (Remote Procedure Call) interface.
  • MS Microsoft
  • RPC Remote Procedure Call
  • the WFL compiler 15 is an interpretive compiler which provides a new language syntax using the word “Wrap”.
  • the Operator Terminal 8 of FIG. 1B is the operator interface in which an operator would enter a command such as WRAP MY ⁇ FILE AS MY ⁇ NEW ⁇ FILE FROM A TO B, which is the file 21 sitting in Disk A and MY/NEW/FILE which is the file 23 (FIG. 1B) residing in Disk B.
  • This command is transmitted through the MCP (or Master Control Program 10 ) in order to initiate the action of the WFL compiler program 15 .
  • the MCP 10 then calls the MCP_FILEWRAPPER routine 36 passing parameters built by WFL 15 as the input to this routine.
  • the MCP_FILEWRAPPER process 36 will then take the original MY ⁇ FILE 21 from Disk A, 20 and convert it to a new file designated MY ⁇ NEW ⁇ FILE 23 and deposit this into the storage disk B, 22 .
  • the MCP_FILEWRAPPER process 36 will call the MCP WRAPPER 38 routine indicating that the data should be processed, wrapped, and signed.
  • the MCP_WRAPPER routine communicates back to Disk A and reads the file starting with the file's Disk File Header (DFH) information and then its rows of data. For each buffer it reads, MCP_WRAPPER calls the WRITE_WRAP routine 39 to calculate the running signature for the data, as well as write the data out to the temporary output file MY/NEW/FILE on Disk B.
  • DH Disk File Header
  • the MCP_WRAPPER routine 38 calls WRITE_WRAP the last time passing the checksum on the contents of the whole file.
  • the WRITE_WRAP routine 39 determines the final digital signature and then writes both the checksum and the signature to the output file MY/NEW/FILE on Disk B before returning to MCP_WRAPPER.
  • the MCP_WRAPPER routine returns to MCP_FILEWRAPPER and tells it to make the file MY/NEW/FILE on Disk B permanent.
  • MY/NEW/FILE is now available to the NT system platform 30 from the file 23 residing on Disk B, 22 .
  • Another example of a problem that arises is the situation where there are two separate and different A Series computers, whereby the first computer has data and information (files) which it is desired to give or present for use by the second computer system.
  • the first system file is in object code, it is then necessary to put it on a tape and mail it to the second computer User or alternatively, to have the first system and second system connected to each other through a proprietary network connection.
  • this is sometimes a long and cumbersome process, when it would be most desirable to be able to transmit it electronically to the second user through an open network such as e-mail or FTP (File Transfer Protocol).
  • the first computer system user would take his file and do his wrapping operation using either the Work Flow Language (WFL) statement WRAP or a user program that interfaces with the MCP routine MCP_FILEWRAPPER (or MCP_WRAPPER if no digital signature is required).
  • WFL Work Flow Language
  • the present system allows these recipients to download these files to their personal computer and then burn them into a Compact Disk and send them to their local co-workers or to their other customers.
  • the burned-in files on the Compact Disk are burned using Industry Standard format for compatibility to other systems platforms, such as NT system platforms, UNIX system platforms, IBM system platforms, DEC System platforms and Unisys A Series system platforms.
  • the present system operates such that operators using the A Series systems can unwrap their files directly from an industry compatible Compact Disk, so that the file is usable just by putting the Compact Disk into the A Series system and giving it the command to “Unwrap Files”. The files and software can then be received for utilization.
  • the present system requires the packaging of native files of a first computer system such as a Unisys A Series system, in such a way as to allow them to co-exist on the same CD-ROM media, as non-native files.
  • This packaging of files also allows for the transport of the native (A Series) files across heterogeneous networks, while still maintaining information on their native (A Series) attributes.
  • Previously CD-ROM's contained native A Series software on CD disks which were burned from a library maintenance formatted tape. However, this limited these types of files to only be useful for native A Series systems which are formatted for native A Series files.
  • the present system provides an expanded ability for burning the native A Series files of software for a first computer system onto CD-ROM disks which will be compatible with suitable files for a second computer system, such as a Microsoft NT system and other platforms.
  • a Series files had attributes such as FILEKIND, CREATIONDATE, and RELEASEID, which now need to be placed in a format capable of being stored on a disk media which is using an industry-standard file format.
  • the “digital signature” is created using an industry-standard public key/private key signaturing algorithm which provides a measure of security in that it allows a user confidence as to where the file originated from.
  • the present system encompasses the Master Control Program (MCP), the Work Flow Language (WFL) program, and the FILEDATA work necessary to wrap files by packaging them into new, byte-stream files (wrapping) and later restoring them to their original native A Series format when needed for A Series systems (Unwrapping).
  • NEW WFL SYNTAX This involves a new work flow language syntax, so that arrangements are made in the WFL compiler 15 to support the new syntax which will have some similarity to a previous Library Maintenance MOVE command.
  • the new syntax allows a User to wrap either a single file, a list of files, or a directory of files, in addition to subsequently enabling the unwrapping of these files, by specifying both the input file and the output file, or the directory title and location.
  • a programmatic interface is provided that will allow the User-Caller to pass a native A Series file's title and location as “input” along with an “output” file, title and location.
  • the “output” file will be a “byte-stream” file with a beginning data block containing (i) an identification string; (ii) the original files Disk File Header information; (iii) the file itself as byte-stream data; and (iv) an ending block containing a checksum, and optionally a digital signature.
  • the added programmatic interface allows the caller to pass byte-stream file's title and location as input, along with an output file title and location if needed, for use of the “unwrapping” process.
  • the “resultant file” will be a native A Series file created with the output file and location, but also containing the data and all of the native A Series attributes of the original file.
  • This first programmatic interface will allow input and output directory names to be passed in order to wrap or unwrap a directory of files with a single procedural call. This also allows for a single output “container file” to be created from multiple input files.
  • This interface is created to allow a caller to pass the A Series file's title and location as “input”, together with an “output” procedure.
  • the data returned to the caller's output procedure will be a stream of data with (i) a beginning data block containing an identification string; (ii) the original file's Disk File Header information; (iii) the file itself as byte-stream data; and (iv) an ending block containing a checksum or a digital signature.
  • the second programmatic interface will also allow the caller to pass an input procedure, along with the title and location of an output file.
  • the data passed to the input procedure here would consist of a stream of data, with a beginning data block containing the identification string, the original file's Disk File Header (DFH) information, the file itself as “byte-stream data”, and also an ending block containing the checksum and optionally the digital signature, which is basically the same information that was passed to the output procedure when the file was originally wrapped.
  • the “resultant file” will be a native A Series file created with the output file title and location, but containing the data and all of the native A Series attributes of the original file.
  • New syntax has been added to the FILEDATA LFILEs command in order to specify that the file being interrogated is a WRAPPEDDATA file. If this is a WRAPPEDDATA file, then FILEDATA will report the “attributes” of the native A Series file contained within the wrapped data file, rather than the attributes of the “wrapped” data file itself.
  • a first system computer such as the Unisys A Series computer system
  • the software files of a first computer platform can now be made able to co-exist on the same data CD-ROM's as other types of software which is not A Series software.
  • the system will provide the use of A Series KEYSFILE which will also be wrapped using the new WFL syntax. This resulting file will also be burned onto the CD-ROM. Normally, the Unisys A Series KEYSFILES are shipped on separate tapes from the rest of the software releases, so that in the present situation, the newly wrapped KEYSFILE will be shipped on a separate data CD-ROM separate from the rest of the A Series release software files.
  • the A Series KEYSFILE is a file on each A Series system used to store License Key information for the individual system in order to determine which of the Unisys licensed features the user has purchased for use on that system.
  • the new WFL UNWRAP syntax can be used to unwrap the KEYSFILE off of the CD, while copying it into the A Series system. Once the file (as KEYSFILE) has been copied onto the A Series system, then a IK MERGE can be performed. IK MERGE is the system command used to merge the data from the new KEYSFILE (unwrapped from the CD ROM on to Disk) on the A Series system into the system's current KEYSFILE.
  • DSA refers to the digital signal algorithm (DSA).
  • DSA public and private key are a function of a large prime numbers designated P,Q,G, which are generated by the digital signature algorithm.
  • P,Q,G When “signing” a given file, the DSA requires the values of P,Q,G, and their private key to produce a digital signature which consists of two large integers designated R and S.
  • R and S When this message is to be verified, the verification process asks for a set of data designated [P,Q,G, PUBLICKEY, R, S].
  • a user is only concerned with the public and the private key pair.
  • prime numbers P,Q,G,R,S are inherent and required in the creation and verification of a “digital signature”, there must be provided a way to manage them and make their presence essentially transparent to the user.
  • R and S are easy to handle because they are created during the “signing” process of a WRAP operation, so that their values are readily available to be embedded in the WRAPPED file.
  • the handling of elements P,Q,G is more complex because their values must be supplied from an “external source”, (that is to say, the user), to the WRAPPING function.
  • a special Release group will run a special utility that generates the values for P,Q,G, public and private keys.
  • This particular set [ID, software level, public key, P,Q,G] will be stored by the utility as a record of the new KEYSFILE called *SYSTEM/DSAKEYSFILE.
  • the Release group will use the “private key” during the WRAP process to “sign” all the required system software files for that particular level.
  • the DSA (Digital Signature Algorithm) KEYSFILE will be distributed to customers in the same manner as the existing SYSTEM/KEYSFILE. Upon receiving the DSAKEYSFILE and the system software, the customer installs the KEYSFILE into the system and starts UNWRAPPING WRAPPED software without the need for specifying a public key.
  • the private key would then be supplied to the WRAPPING routine (for example, through the TASKSTRING) attribute of the WFL_WRAP statement).
  • the public key would be given to the receiver of the files.
  • a correct public key must be provided (for example, via the TASKSTRING attribute of the WFL UNWRAP statement) for the operation to succeed.
  • the WRAPPING routine upon recognizing that a digital signature is required, obtains the P,Q,G, values from the active DSAKEYSFILE for the System Software Release (SSR) level that the system is currently running on. It then provides these values, along with the user-furnished private key, to the DSA “signing routine”. This routine, after signaturing the file, returns two large integers, R and S. These two integers, along with the current SSR level, can be stored within the file by the WRAPPING process.
  • SSR System Software Release
  • the UNWRAPPING routine gets P,Q,G, values from the active DSAKEYSFILE based on the SSR level it extracts from the file.
  • the file's R and S values, along with P,Q,G, and the user-supplied public key, are then passed to the DSA signature verification routine. If there is no user-supplied public key (as is often the case of System Software WRAPPED by the Release group), then the public key from the active DSAKEYSFILE is used.
  • a checksum is calculated for the Disk File Header (DFH) for every file as it is wrapped. This ensures that there is no unintentional corruption of the Disk File Header as the file is shipped across a network. It also provides the receiver of the file some measure of confidence as to the origin of the file.
  • a checksum is also calculated for the entire context of the file including the Disk File Header (DFH).
  • the checksum will not normally be sufficient to ensure that a Disk File Header has not been intentionally corrupted, since the checksum algorithm is not protected and is fairly easy to reproduce. There is significant overhead to validate the Disk File Header if there were no protection of the structure, other than the simple checksum. Thus, without any real protection for the Disk File Header, it would be necessary to create an entirely new Disk File Header for the original file, and then separately validate every attribute of the header before it could be considered trustworthy for application.
  • the Master Control Program (MCP) 10 FIG. 1B, will assume that a Disk File Header is a valid piece of data. However, it is necessary to validate the Disk File Header before the rest of the file has even been retrieved, since even the information regarding the “size” of the file is stored in the Disk File Header.
  • MCP Master Control Program
  • a digital signature may be requested when the file is wrapped by specifying a private key with which to identify the signature file while wrapping.
  • the receiver “must” specify the file's public key in order to verify the file when unwrapping it.
  • a KEYS generation utility is provided as a separate utility to generate public/private key pairs to be used when signing files. Public/Private key pairs are generated using the new utility in order to be used by the wrapping interfaces for signaturing files. Users who wish to create their own utility can write a program to interface with the MCP procedure MCP_GENERATEDSAKEYS.
  • the format of the WRAPPEDDATA FILE which will be a simple byte-stream file.
  • This file will contain several sections.
  • the first section (i) is the word UNISYS “000010” which will be “EBCDIC” data used to indicate that this is likely to be a Wrapped file. The number associated with this identifier may be changed if the format of this file is changed.
  • the second block (ii) labeled “options” contains the options used when wrapping the file, such as the identifier to be used to locate the “public key” information in order to verify a file containing a digital signature.
  • the third block of FIG. 3 is (iii) designated as the Disk File Header, which involves a copy of the actual A Series Disk File Header for the file. This will become the actual Disk File Header for the file when it is restored to its native format after a “unwrap” operation. Additionally in block (iii), there is seen the Header checksum, which is a separate checksum for the Disk File Header itself.
  • the fourth block (iv) of FIG. 3 indicates “the file” which involves the contents of the file itself, written as byte-stream data.
  • the fifth block (v) of FIG. 3, is designated as “checksum”, which will be a single word of 48 bits calculated for the file and the disk file header combined, using a private key from a public/private key pair.
  • the sixth section (vi) shows the digital signature as being composed of Section R and Section S.
  • the Section R includes 11 words or a total of 528 bits.
  • the Section S includes 11 words of a total of 528 bits. This constitutes the digital signature portion of the transmitted file which has been wrapped.
  • the new system involves a keys file called “SYSTEM/DSAKEYSFILE”. This file is stored and managed similarly to the manner of existence on earlier A Series systems which used the “SYSTEM/KEYSFILE”. This file is used to store records of ID, software level, public key, PQG. These involve the following:
  • ID This is a unique and meaningful EBCDIC string with a length of up to 17 characters which is used for external display and for identifying the set.
  • P.O.G These are prime numbers generated by a special utility. For a given set of (P,Q,G), there are a variety of public and private key pairs which can be generated.
  • the DSAKEYSFILE is an unblocked file which consists of records whose maximum record size is 60 words in length.
  • the general information record contains miscellaneous data about the file, for example, version, number of search table records, number of key entries, etc. This record is then followed by one or more search table records which in turn, contain a number of four word search entries. Following the search table records are the data records with each containing a different set of [ID, software, public key, P,Q,G].
  • the main purpose of the DSAKEYSFILE is to store the P,Q,G primes used when creating public and private key pairs. It is also used to store system public keys which are normally about 60 characters long, so the caller of Unwrap does not need to enter this character string every time when he unwraps Unisys' signed software.
  • This procedure involves a further procedure entitled “GET_DSA_PQGKEY” which obtains the corresponding set of [P,Q,G, system public key] from the active DSAKEYSFILE based on the SSR level and return the set to the caller.
  • This system involves new work flow language (WFL commands) designated as WRAP and UNWRAP which are provided to allow Users a simple method of invoking the new interfaces of this system.
  • WFL commands new work flow language designated as WRAP and UNWRAP which are provided to allow Users a simple method of invoking the new interfaces of this system.
  • MCP_FILEWRAPPER MCP_FILEWRAPPER
  • MCP_WRAPPER MCP_WRAPPER
  • the WRAP command would begin to act on the directory over from the very beginning. If a file is encountered with a FILEKIND or with a WRAPPEDDATA value, that file will be skipped, and an error message will be issued for the file indicating that the file had already been previously wrapped.
  • the Work Flow Language syntax is provided to allow a user easy access to the new programmatic interfaces.
  • the new WFL commands permit the user to access the new interfaces to institute a wrap or an unwrap action without having to know the layout of the interfaces or having to create a program to call up these interfaces.
  • the TASKSTRING will be used to specify the public key that should be used to verify the signature that was calculated when the file was wrapped.
  • the TASKSTRING is used to specify the “private key” that should be used to calculate the signature of the file.
  • the newly developed MCP_FILEWRAPPER program is used for Work Flow Language support and User programs.
  • a User can call this program specifying either a “Wrap” or an “Unwrap” action along with the title and the location of both the input files and the output files.
  • the input file specified for a “wrap” operation must not have a FILEKIND of WRAPPEDDATA.
  • the caller must have the proper privilege for both the input and the output files or directories.
  • the MCP_FILEWRAPPER program involves procedures which return errors. These errors are returned as display messages if the procedure is called from the Work Flow Language (WFL).
  • WFL Work Flow Language
  • this interface program When this interface program is called to “Wrap” a file, it takes a standard form name for an existing A Series file, along with an output, or Write, procedure.
  • the A Series files Disk File Header (DFH) will be checksum passed the output procedure as data along with the checksum. Then the file itself will be read and passed on to the output procedure as data. Finally, there will be provided (optionally) a calculated digital signature or a checksum for the entire file which will be passed to the output procedure as data.
  • DSH Disk File Header
  • IOWRAP is the procedure being passed, either as an output or a WRITE procedure for Wrap or an input or READ procedure for the Unwrap.
  • the parameters for IOWRAP involve (i) LGTH which indicates the length array data in bytes; (ii) DATA is the array containing the data to be written when for wrapping or READ for unwrapping.
  • a Disk File Header can involve data up to about 20,000 words long.
  • the IOWRAP parameter procedure must be able to handle at least 20,000 words in the data array in one call.
  • FIGS. 2A 2 A 1 , 2 A 2 , 2 A 3 , 2 A 4 ) and 2 B illustrate the various sequential steps involved in programming a file which is taken from a first format system, such as an A Series file, and converting it to a standard industry format file which is compatible for other platforms, such as the NT platform.
  • a first format system such as an A Series file
  • a standard industry format file which is compatible for other platforms, such as the NT platform.
  • the source User will initiate the operation at marker cycle 101 for developing the Compact Disk by entering at step (a) the command WFL WRAP MY/FILE AS MY/NEW/FILE from Disk A to Disk B.
  • step (b) this command is parsed and passed from the WFL compiler 15 over to the operating system 10 and into the routine 36 designated MCP_FILEWRAPPER.
  • step (c) the MCP_FILEWRAPPER program will then verify the names of the files, then open up a new file MY/NEW/FILE to be outputted, it will verify the options and then call step (e) as seen in FIG. 2A- 1 .
  • the MCP_FILEWRAPPER routine will close and save the output file when the MCP_WRAPPER program returns to the MCP_FILEWRAPPER.
  • step (d) an output procedure is executed which provides for an array of data file information and whereby this array is written to an output file (MY/NEW/FILE). Additionally, any I/O errors are returned to the User or caller.
  • MY/NEW/FILE an output file
  • step (e) of FIG. 2A- 1 there is involved the MCP_WRAPPER operation.
  • the software operation involves verifying the input file title, and opening the file; verifying the options for wrapping the file; verifying the file license applicability by calling the operating system and verifying the feature key.
  • step (e) involves a series of sub-steps going from (e)(i) over to (e)(xii). These involve the following:
  • the MCP-WRAPPER operation will copy the input files and send a Disk File Header to an intermediate local storage array in memory.
  • This array provides temporary data storage so that there is no chance of accidentally acting on the “real” DFH or data for the file.
  • step (e)(ii) the MCP_WRAPPER operation will add a checksum to the end of the array.
  • step (e)(iii) the program will save the checksum in a local variable, and then at step (e)(iv), it will call the output procedure (d) in order to Write the Disk File Header (DFH) to the output data file.
  • step (d) of FIG. 2A- 1 which has called in the mCP_WRAPPER operation step (e)
  • the output procedure (d) is invoked by this step (e) at e (iv), FIG. 2A- 2 , MCP_WRAPPER operation to pass the input file data over to be written to the new byte-stream data file at step (d), FIG. 2A- 2 .
  • step (e)(v) the software will cause a Read of the input file using disk row addresses of the Disk A, one at a time, until there are no more disk row addresses for the file. When the disk row addresses are exhausted, the software will proceed to step (e)(viii). Then at step (e)(vi), the program will pass information in the array onto the output procedure (d) in order to Write the array information to the output file.
  • the “input” file is the file being “Read”, (MY/FILE) while the “output” file is the new file being created or written (MY/NEW/FILE).
  • step (e) (vii) the program calculates the running checksum for each row and adds this on to the checksum variable. Using the local checksum variable, a checksum is calculated for the entire file as it is being repackaged. This checksum will reside in the file and be later used by the unwrap operation to verify that the file was not unintentionally corrupted while transferring across a second system platform.
  • step (e)(viii) the program will call the output procedure (d) FIG. 2A- 4 and pass the checksum to write the checksum value over to the output data file, (Disk B).
  • step (e)(ix) the program will close the input file, and at step (e)(x), will update the time-stamp information for the original file (A Series DFH Attribute Information).
  • step (e)(xi) the program will set time-stamps in the disk file header (DFH) for the input file (Disk A) and then return [step e(xii)] to the MCP_FILEWRAPPER procedure from where it was called.
  • MCP_FILEWRAPPER continues at c(ii), FIG. 2A- 4 , and will then close and save the output file (MY/NEW/FILE) on Disk B.
  • MCP_FILEWRAPPER will then continue on to process the next file in its list (if there is one) by returning to c(i), FIG. 2A- 1 . Otherwise, if there are no new files to process, then MCP_FILEWRAPPER will Exit, thus returning (with any error information) to its Caller. This completes the operation for marker cycle 101 .
  • the source user will initiate at (f) the operation (marker cycle 102 of FIG. 1A) to drag the file (MY/NEW/FILE), using the Microsoft Explorer program, from the shared Disk B, 22 over to the local Disk C, 24 where it becomes C: ⁇ MY ⁇ NEW ⁇ FILE. Then Source User 8 , using marker channel cycle 103 will initiate the CD Writer package.
  • the shared disk would be a LAN connected Disk B owned by the first system, that the PC has access to.
  • step (g) on marker cycle 103 (of FIG. 1A and FIG. 2B), the User 8 will execute (within the client terminal 30 ), a CD-WRITER package in order to burn the file onto a Compact Disk, 34 .
  • the Compact Disk 34 once it has been burned with the files, can be removed and delivered to a customer-client terminal for that party's PC (Personal Computer) platform.
  • PC Personal Computer
  • FIGS. 4A, 4B, 4 C and 4 D will provide a sequence for WRAPPING a native file into a text stream data file and generating the signatures which can be used to guarantee reliability of the data.
  • the Digital Signal Algorithm (DSA) utility has a symbol file designated SYMBOL/DSATOOLS.
  • SYMBOL/DSATOOLS When compiling this symbol file with the compiler option set at “INTERNAL”, a non-restricted version of the utility is produced, otherwise, a restricted version of the utility is produced.
  • This latter version only provides the capability to generate DSA public/private key pairs from a DSAKEYSFILE and is intended for general use.
  • a non-restricted version of the DSA utility is designated “OBJECT/DSATOOLS/FULL”.
  • DSAINFO/SOURCE A sequential file containing sets of DSA information (designated, DSAINFO/SOURCE).
  • this file contains 21 sets of DSA information used to generate system public and private key pairs. Only one set is used per each software release, so that these can last for a considerable period of time.
  • FIG. 5 is a diagram illustrating how the digital signature algorithm information, together with the key ID is inserted into the DSATOOLS, which feeds one Output to the DSAKEYSFILE, and another output to the DSAKEYS/442. This results in the creation of the DSAKEYSFILE, having a public key and a DSAKEYS/442 unit which combines the public key and the private key.
  • ODT Operating Display Terminal
  • WFL Work Flow Language
  • files can also be wrapped and signatured using a programmatic interface to the MCP-exported entry point MCP_FILEWRAPPER.
  • FIG. 6 is an illustration of wrapping and signaturing a file.
  • the wrapping sequence receives information from the DSAKEYSFILE. It also receives an input from the system DSA private key, in addition to receiving the file information, after which the wrapping sequence will produce the signatured file.
  • the unwrap sequence is fed information from the DSAKEYSFILE, and also fed by the signatured FILE in order to then produce the original native file which is compatible for the original computer system which uses the Master Control Program.
  • the present system also gives users the ability to optionally sign wrapped files and wrapped containers with digital signatures.
  • a digital signature allows the recipient of a singed wrapped file to be certain of its origin.
  • the digital signature is electronically represented as binary data rather than handwritten characters. This allows the signature to be embedded within the file, and it enables the system to do some special calculations in order to authenticate the signature and verify that the file has not been tampered or altered during its transmission.
  • Digital signature “creation” is based on the data within a file and a private key.
  • digital signature “authentication” is based on the same data of the file and a corresponding public key.
  • the private key and public key are generated as a pair by the system, so even though they are not the same, they still share some underlying common mathematical properties.
  • By differentiating the public key and the private key of a key pair one cannot use either key for both signing and verification.
  • a person possessing only a “public key” though is capable of authenticating a wrapped file's digital signature “created” by a corresponding “private key”, but cannot use it to produce the same signature.
  • a person with only the private key will not be able to verify the signed wrapped file.
  • the digital signature algorithm also ensures that a public key belonging to one key pair cannot be used to validate the digital signature derived from a private key of another key pair.
  • the DSA Since the DSA is not an encryption algorithm, signing a wrapped file or wrapped container does not scramble its data. Instead the DSA makes a pass through the data stream and applies the specified private key to come up with a checksum-like binary hash pattern which is then inserted into the resulting file.
  • a customer also needs to obtain a copy of the SYSTEM/DSAKEYSFILE.
  • This keysfile contains one or more DSA information “sets” where each corresponds to a particular SSR (System Software Release).
  • DSA System Software Release
  • the DSA keysfile is shipped with standard software releases. For earlier releases, a customer needs to call the support organization to obtain a copy of this file. This file will be delivered through the same process as *SYSTEM/KEYSFILE because wrapping the DSA keysfile could compromise Unisys' digital signature security mechanism.
  • the DSA keysfile is cumulative, that is—a DSA keysfile of a later SSR release will contain the DSA information set of that release plus all DSA information sets of earlier releases [Note: All supported software levels earlier than SSR 44.2 will use the 44.2 DSA information set.]
  • installing a DSA keysfile is as simple as copying the most current DSA keysfile to one's Halt/Load family.
  • the DSA keysfile with the name *SYSTEM/DSAKEYSFILE will be recognized by the system as the active system DSA keysfile.
  • the following command is used:
  • the system will produce the signed container for the current software level.
  • the level value should be represented as a whole number without the decimal point.
  • Recipients of the signed files should use the SFL UNWRAP syntax to verify and unwrap files, passing the 20 public key one provided through TASKSTRING.
  • PRIVATEKEY: “ ⁇ hex string for DSA private key>”
  • R MCP_GENERATEDSAKEYS (SSRLEVEL, NUMREQKEYS, KEYARY, WRITEKEYPAIR, 0 & 1 USEUSERARYF & 1 USEUSERPROCF); IF BOOLEAN (R) THEN DISPLAY (“DSA key generation Error #” !! STRING(R.CODEF,*) ! “ - SubCode #” !! STRING(R.SCODEF,*)); If USEUSERARYF is set, process the returned info.
  • FIG. 4B is an exposition of steps C and D of FIG. 4A, wherein by referring to FIG. 4B, it is seen that at step C1, there is an entering of MCP_FILEWRAPPER routine ( 36 ).
  • step C1a the program will verify all the parameters.
  • step C1b the routine will get the specified or default SSR level.
  • Step C1c the routine will call the program GET_DSA PQGKEY while passing the SSR level in order to:
  • step C1d there will be a verification of the specified private keys using a hexadecimal presentation.
  • step C1e the routine will verify the wrap license key.
  • the Signature Support Library exports the procedure DSASIGN for MCP_FILEWRAPPER to use.
  • step C1g a decision tree is initiated to see if there is a pair of Input and Output file names from the file list. If the answer is “NO”, then an exit is made at step C1x, to exit the routine of MCP_FILEWRAPPER 36 .
  • step C1h will open the Output file, and step C1i will call the DSASIGN routine in the Signature Support Library for the first time in order to signature the ID “UNISYS”.
  • step C1j the routine will call the program designated MCP_WRAPPER ( 38 ) according to the steps of FIG. 4C, and thus passing:—Input file name;—WRITE_WRAP according to the routine shown in FIG. 4D.
  • step C1L the routine will close and lock the output file.
  • Appendix I is attached to indicate how to run the DSA utility program routine.
  • Described herein has been a method and system whereby native specialized files in a first computer system, can use the operating system of the first computer system together with first and second programmatic interfaces therein in order to transform a file (native to the first system) into a standard byte-stream file which is utilizable by many other types of computer platforms (second system), and which byte-stream files can be burned into a CD-ROM (or transported via an open network) which is then available for utilization by multiple numbers of other system platforms.
  • the integrity for transforming the native files of the first system into a standard byte stream file utilizable by other computer platforms, and which can be transferred over the Internet, is rendered reliable by the use of the digital signaturing systems described above.
  • a restricted version of this utility only supports function (5). All other functions are intended for internal use, specifically—the Unisys software release group. A non-restricted version of of this utility is only available when compiled with the compiler option INTERNAL set. Because security restriction is required by the MCP entry-point DSAKEYSFILEHANDLER, this utility can only be run succcessfully by a privileged user, or the codefile must be PU-ed.
  • FIN Sequential file containing DSA information. The format of this file is described below.
  • KFOUT DSA keysfile where DSA key sets are to be added. If omitted, active DSA keysfile is used. If it does not exist, a new DSA keysfile will be created.
  • SSR the level from which key pairs are to be generated (e.g. 442). Its default value is the current SSR. SR is intended for use with KFIN, but not with FIN since SSR should already be specified in FIN. If FIN is specified, SSR is ignored.
  • NUN the number of key pairs to be generated. Its default value is 1.
  • FIN Sequential file containing prime numbers for creating key pairs if KFIN is not specified. Use of FIN excludes the KFIN and SSR specifications. The format for this sequential file is described below.
  • KFIN the DSA keysfile whose DSA information will be used to generate key pairs. The default is the *SYSTEM/DSAKEYSFILE on the halt/load family. It is mutually exclusive of the FIN specification.
  • FOUT the destination sequential file where key pairs are stored. If FIN is specified, this file also contains FIN'S prime numbers which make it suitable for the ADDKEYS request. Its default title is DSAKEYS.
  • KFOUT allows the last generated key pair from each set ⁇ SSR, KEYID, P, Q, G ⁇ in the file FIN to be added to a DSA keysfile directly without the need to run this utility again with the ADDKEYS request.
  • This option is only available when compiling with INTERNAL set.
  • VALIDATE indicates whether the utility will do tests on generated key pairs. Its default value is (T)rue. . Syntax for deleting DSA key pairs:
  • ⁇ KEYID ID of the DSA key sets to be deleted.
  • ⁇ KFIN DSA keysfile where key sets are to be deleted from. If not specified, *SYSTEM/DSAKEYSFILE is used. .
  • FOUT Sequential file where contents of KF are dumped to.
  • KFIN Source DSA keysfile whose key sets are to be dumped. If not specified, *SYSTEM/DSAKEYSFILE is used. . Syntax for merging a DSA keysfile to the active one ---- MERGEKEYS -- KFIN --------- ⁇ filename> ---------
  • KFIN the DSA keysfile to be merged with *SYSTEM/DSAKEYSFILE on halt/load family.
  • KEYID all DSA key sets with IDs containing the specified will be copied to KFOUT.
  • SSR DSA key set for the level specified by SSR is copied to KFOUT.
  • KFIN Input DSA keysfile where the key sets are to becopied. if not specified, the *SYSTEM/DSAKEYSFILE on the halt/load family is used.
  • KFOUT Output DSA keysfile where copied key sets are stored.
  • User-specified file FIN and the output file FOUT created by the utility are sequential files sharing the same format. These file contain a number of DSA key sets and comment lines.
  • Each DSA key set should be separated by a semicolon.
  • the last DSA key set in the file should also end with a semicolon.
  • PUBLICKEY “0123456789ABC” “DEF0123456789”) PRIVATEKEY hex string DSA private key generated from the same P, Q, G values in its set. Usage similar to PUBLICKEY. P hex string Prime number P. Q hex string Prime number Q. G hex string G value.
  • PRIVATEKEY is not actually used. Thus, you can store PRIVATEKEY there for reference. However, it is recommended that you should keep PRIVATEKEY separately and make sure that no unauthorized users can get access to it.
  • the request requires FIN to contain at least one DSA key set. Entries required for all DSA key sets in this request are ⁇ SSR, KEYID, PUBLICKEY, P, Q, G ⁇ . Note that PRIVATEKEY is not a part of the added key set and will be ignored.
  • entries required for a DSA key set consist of ⁇ SSR, KEYID, P, Q, G ⁇ .
  • the utility will generate public/private key pairs and write ⁇ SSR, KEYID, PUBLICKEY, PRIVATEKEY, P, Q, G ⁇ out to the file DSAKEYS or to the file indicated by FOUT.
  • the resulting file then can be used as FIN to the ADDKEYS request.
  • KF will be used instead.
  • only ⁇ SSR, KEYID, PUBLICKEY, PRIVATEKEY ⁇ is wriiten out to the file FOUT by the utility. Prime numbers P, Q, G extracted from KF are not included.
  • KEYID SSR999-KEYID
  • G “B3085510021F999049A9E7CD3872CE99” “58186B5007E7ADAF25248B58A3DC4F71” “781D21F2DF89B71747BD54B323BBECC4” “43EC1D3E020DADABBF7822578255C104”;

Abstract

A specialized data format native to a first platform is wrap-packaged into an industry-standard text file in a protocol suitable for Internet transmittal. A Signature Support Library provides parameters to combine with a User's private key to generate a signature particular to the data file being converted.

Description

    CROSS-REFERENCES TO RELATED APPLICATIONS:
  • This application is related to a co-pending application U.S. Ser. No. 08/962,468 entitled “Method and System for Wrapping Single Files for Burning into Compact Disk”, and to co-pending application U.S. Ser. No. ______ entitled “Digital Signaturing Method and System for Re-Creating Specialized Native Files from Single Wrapped Files Imported from an Open Network or Residing on a CD-ROM”, each of which co-pending applications are incorporated herein by reference.[0001]
  • FIELD OF THE INVENTION:
  • This system relates to methods for enabling and signaturing data files which are organized in a first native format to be packaged (wrapped) and burned onto a Compact Disk and to enable the packaged files to be transported via standard protocols and utilized outside their native environment in networks utilizing different data formats. [0002]
  • BACKGROUND OF THE INVENTION
  • In the usage of modern computer systems and networks, the situation arises where systems having one proprietary protocol and data format are connected to systems having different data formats and protocols. Thus in order to provide for systems integration in different networks, it is necessary that there be provided a system or method whereby the data formats of a first system can be transferred to and utilized by the network of a differently oriented system. [0003]
  • For example, the Unisys A Series computer systems involve a Central Processing Unit and memory together with storage such as disk storage which operates under the control of a Master Control Program. These A Series systems use a particular format for the data files compatible with the A Series software which can be placed on CD-ROMs. Thus, the CD-ROMS which contain this A Series software contain an image of a formatted tape which can be utilized only by the A Series systems. [0004]
  • However, when it is desirable to integrate a first system such as the A Series systems for operation with other platforms such as an NT system, then problems arise in that the second system such as the NT system, utilizes formats which are not compatible with the software formats of the A Series system, which is the first system. [0005]
  • Presently, the software for a first system, such as an A Series system with software, is utilized by providing methods to burn CD disks from a Library Maintenance formatted tape. This method has the limitation in that it limits the type of files that are burned into CD-ROMs to those of the native A Series files. [0006]
  • Now, in order to provide for system integration where an A Series system is to be coupled to a NT system, which overall system would be designated as a Unisys ClearPath system, the desirability here would be to make and use a single CD-ROM disk which would carry both the A series software and at the same time carry the NT software. [0007]
  • Thus in this regard, a method is needed to couple the A Series files with their native attributes and also arrange them in a format capable of being stored on a particular media such as a CD-ROM which will also hold the readable software for the NT system. [0008]
  • The same system or method also provides the ability to package files of a proprietary system in such a way that allows the files to be transported across an open (non-proprietary) network without losing their original characteristics. When such files return to their native environment, their true data formats can be restored. [0009]
  • For example, the A Series systems have files with specialized attributes such as FILEKIND, CREATIONDATE, RELEASEID, etc. When these files are transferred to a PC running Windows NT, all those attributes will be lost. By packaging the files and their attributes into standard, simple text files, the new files then can be transported across any open system (e.g., UNIX, NT). Upon reaching their destinations (which are other A Series systems), the text files are converted back to their native forms with all the right attributes. This is ideal for maintaining A Series data formats in a heterogeneous networking environment. [0010]
  • A digital signature is calculated for every file as it is being WRAPPED (packaged). This signature is calculated using the Disk File Header (DFH) and the data within the file, along with the Public/Private key pair. This will ensure that there is no intentional corruption of the Disk File Header (DFH) and the data as the file is shipped across a network. It will also provide the receiver of the file a certain measure of confidence as to the origin of the file. Additionally to the signature, there will be calculated a checksum for entire contents of the file, including the Disk File Header. [0011]
  • When a file is wrapped with a request for digital signature, its Disk File Header will have a checksum, its entire file will also have another checksum, and a digital signature will be calculated for the entire contents of the newly wrapped file. The functionality of wrapping files with digital signature is available through the WFL syntax as well as through programmatic interface. [0012]
  • As a result, the Unisys A Series systems will provide a programmatic interface to its Master Control Program (MCP) which will provide a mechanism for “wrapping” files with signature and for “unwrapping” signatured wrapped files. [0013]
  • Wrapping is a term which is used to define the process of packaging an A Series file, along with its Disk File Header information and a checksum and optionally a digital signature, as a byte-stream data file, so that it can be transported across heterogeneous networks and non-A Series specific media, while still maintaining its native A Series attributes. [0014]
  • Unwrapping is a term used to define the process of taking a previously “wrapped file” and coupling it with the information from its original Disk File Header (DFH) in order to restore the original native A Series file, as it existed prior to being wrapped. [0015]
  • Thus, the problem of a software and file format which is oriented to one specialized system can now be transformed in order to provide a format that is utilizable not just for a first system, but also for a first and second system, whereby the second system would not ordinarily be compatible with the first system. Thus, it is desirable to allow files (created on a Unisys ClearPath HMP/NX system or A-Series system) to be transformed so they can travel across a completely different system (such as NT) without loss of the file's original native characteristics. [0016]
  • The presently described system and method provides for taking a first file format with native attributes such as used in Unisys A-Series systems and developing a second generalized format for transport to open network without losing the native attributes and for burning into a CD-ROM such that now this second file format is compatible for both NT and other systems in addition to A Series systems. [0017]
  • The second file format will provide a signature to be created for the entire file. This is so, since the checksum is not sufficient to ensure that a Disk File Header has not been intentionally corrupted, since the checksum algorithm is not protected, and could easily be reproduced. A signed, wrapped file can be sent to another user through e-mail, through the Internet or put into an industry-standard CD-ROM. [0018]
  • Thus, the packaged (wrapped) file can be transported to an open network without loss of the native attributes and can be burned onto an industry-standard CD-ROM without loss of native attributes. In each case, a digital signature is generated to ensure the integrity of the packaged file. [0019]
  • SUMMARY OF INVENTION
  • An algorithmic sequence is implemented in software for transforming files of a proprietary system into single wrapped files with digital signature option. The new files are stored in a standard text file format such that they can be transported to and across an open network while still maintaining their native characteristics. They can also be burnt together with files originated from other platforms onto the same industry-standard Compact Discs (CDROMs) which then can be viewed and utilized by a variety of systems. [0020]
  • The present system is applicable in the Unisys ClearPath environment which involves a situation where two systems are connected to and communicating with each other, for example, such as that both a Microsoft NT platform and a Unisys A Series platform can both read from the same Compact Disc in a compatible fashion. Thus, this makes it possible to put the NT platform software and the A Series platform software all on the same CDROM. [0021]
  • The present system is also applicable in a heterogeneous networking environment where one Unisys A Series system needs to transport is native files across computers of different platforms (for example, UNIX, Windows NT) to another Unisys A Series system. The method enables native files to be encoded in such a way that they can be treated as simple text files by any computing platform and to be restored back to their original forms by an A Series machine without losing their native attributes. [0022]
  • For security and data integrity reasons, the Master Control Program of the A Series computer generally cannot trust files, particularly code files that come from external sources. Thus, the method creates a digital signature for a wrapped file to ensure that the file is not tampered either intentionally or unintentionally during its transit.[0023]
  • BRIEF DESCRIPTION OF THE DRAWINGS:
  • FIG. 1A is a general overview of the present system for digital signaturing and developing a transportable file; [0024]
  • FIG. 1B is a more detailed block diagram of the system which enables digital signaturing, the packaging of a transportable file and burning-in of a Compact Disk with a file which is compatible to both a first protocol system and a second protocol system; [0025]
  • FIGS. 2A (-[0026] 1,-2,-3,-4) and 2B are flow charts indicating the system of steps involved for burning a CD-ROM with the data in a generalized protocol format suitable for Internet transmission and for compatibility with NT or other platforms;
  • FIG. 3 is an illustration of the format for a WRAPPEDDATA file as a byte-steam file. [0027]
  • FIG. 4A is a flow chart illustrating the overall process of signaturing and wrapping single files; [0028]
  • FIG. 4B is a flow chart illustrating the MCP_FILEWRAPPER logic to digitally sign and wrap single files; [0029]
  • FIG. 4C is a flow chart illustrating the MCP_WRAPPER logic to digitally sign and wrap single files; [0030]
  • FIG. 4D is a flow chart illustrating the WRITE_WRAP logic to digitally signature and wrap a single file; [0031]
  • FIG. 5 is a block diagram to show creating a DSAKEYSFILE; [0032]
  • FIG. 6 is a block diagram to show how to wrap and signature a file; [0033]
  • FIG. 7 is a block diagram to show how to verify and unwrap a signatured file. [0034]
  • Glossary Items [0035]
  • 1. A SERIES ATTRIBUTES: Native attributes that can be assigned to a file to allow the system to control how the file is accessed and used, and by whom (security privileges). There are somewhere on the order of 450 such attributes for Unisys A Series files. [0036]
  • 2. A SERIES KEYS FILE: A native file, located on a individual system, that contains license key information used to control which features an individual system is allowed to use for some features. License keys need to be purchased by the user before the feature can be utilized on the individual system. [0037]
  • 3. ATTRIBUTE INFORMATION OF A SERIES FILES: Specific attributes assigned to individual files stored in the file's Disk File Header (DFH) on Disk. [0038]
  • 4. BYTE-STREAM FILE: A character oriented file with FILESTRUCTURE=STREAM, MAXRECSIZE=1, AND FRAMESIZE=8. This is a simple, non-executable, data file that can exist on any kind of system. [0039]
  • 5. DATA CD-ROM: See ISO 9660 Format ([0040] Item 12 below).
  • These CD's appear like disks on A Series systems. Multiple user access is allowed to these CDs. [0041]
  • 6. DIGITAL SIGNATURE: A digital signature is a hash pattern created by applying an industry standard signaturing algorithm (similar to a checksum) to a file or data stream, along with a private key. This hash pattern travels with the file across a network and is used, along with a public key, in order to ensure the file has not been compromised (intentionally or otherwise) during the transfer process. [0042]
  • 7. CONTAINER: A single byte-stream file consisting of one or more wrapped files, a simple directory of files stored in the container, and optionally a digital signature. [0043]
  • 8. CREATIONDATE: An A Series (Unisys) file attribute, used to store the data and time a file was created. [0044]
  • 9. FILEDATA—LFILE: An A Series (Unisys) program, or utility, used to interrogate attribute information of native A Series files. [0045]
  • 10. FILEKIND: An A Series (Unisys) file attribute, used to identify the internal structure of the file being accessed (e.g. Algol symbol, Algol object code, character data, or system directory). [0046]
  • 11. INTERIM CORRECTION PROCESS (ICP): The process used by Unisys computer systems to deliver software updates to released products held by customers. [0047]
  • 12. ISO 9660 FORMAT (A.K.A. ISO STANDARD FORMAT, HIGH SIERRA FORMAT): A standard format used for directories and files on CD-ROM disks. The presentation for the information contained on these directories is at the operating system's discretion. On Unisys A Series systems, directories and files are viewed using the standard Cande “FILES” and ODT “PD” commands. [0048]
  • 13. LIBRARY MAINTENANCE FORMAT: A Unisys proprietary format for tapes containing multiple files used primarily for archives, backup of restore, and transferring of files among A Series systems. [0049]
  • 14. LIBMAINT CD-ROM: A specially formatted CD-ROM, created on an ISO 9660 Formatted CD-ROM, that contains an image of a Library Maintenance tape. This appears to an A Series system as if it were a Library Maintenance tape. Only one user is permitted access at a time, and only COPY (and COPY-related) syntax, and Filedata TDIR are allowed to act on this CD. [0050]
  • 15. NATIVE A SERIES FILES: A file created on Unisys A Series systems or ClearPath HMP/NX systems specifically for use on that same class of systems. [0051]
  • 16. NON A SERIES FILES: Files that were created on systems other than Unisys A Series or ClearPath HMP/NX systems. [0052]
  • 17. NEW FORMAT FILE: the Byte-Stream data file that results from executing the WRAP process on an A Series file. [0053]
  • 18. NT SOFTWARE—CD BURN PROCESS: Any standard “Off-the-shelf” package capable of burning images on to a Compact Disk (CD) that runs on a Microsoft NT system. [0054]
  • 19. P, O, G, keys: Primary numbers, stored in the system's digital signature keys file and used in the creation of public/private keys as well as both signing files and verifying the signatures of files, using the public and private keys. [0055]
  • 20. PUBLIC & PRIVATE KEYS: Public and private key pairs are generated at the same time by a special utility. These key pairs are used to create a signature and then later check that signature to ensure that a file has not been compromised. These keys are generated together and must be used together to ensure the integrity of a file. Under normal operations, the private key is intended to be known only by the person or utility generating the hashed signature of the file. This key is meant to be restricted. The public key can be made available to any person or utility wishing to check the signature to ensure the integrity of the file once it has reached its destination. [0056]
  • 21. PUBLIC/PRIVATE ENCRYPTION: A common methodology for encrypting files so they may be transported across an open network so as to use a public/private password encryption scheme. Typically, the two passwords are programmatically generated at the same time such that they can be used in conjunction with each other. One password, the private one, will be used to encrypt the file. The other password, the public one, is used by the recipient of the file to decode it. Typically, a smear pattern, or some clear text string, is added at the beginning of the file before the file is encrypted. When the file has been decoded using the public password, this smear pattern should match what was originally placed in the file. If the string does not match, it can be assumed that the integrity of the file has been compromised. [0057]
  • 22. RELEASE ID: A Unisys A Series file attribute, used to store the specific release level that the software was created for. [0058]
  • 23. SHARE: A Directory or disk that is made available to selected or all users across a network. [0059]
  • 24. UNWRAP: The process of taking a previously wrapped file (or data stream) and coupling it with the information from its original Disk File Header, to re-create the original native A Series file as it existed prior to being wrapped. [0060]
  • 25. WFL SYNTAX: Work flow language syntax, used to control job flow on a system. [0061]
  • 26. WFL UNWRAP syntax: Specific work flow language syntax used to execute the unwrap process on a file, or files. [0062]
  • 27. WRAP: The process of packaging an A Series file, along with its Disk File Header information and a digital signature, as a data stream, or as a byte-stream data file (FILESTRUCTURE=STREAM, MAXECSIZE=1, FRAMESIZE-8), so that it can be transported across heterogeneous networks and non-A Series specific media, while still maintaining its native A Series attributes. [0063]
  • 28. INPUT FILE: The already existing file that is to be packaged into a byte-stream text file by the wrap process. [0064]
  • 29. OUTPUT FILE: The resultant byte-stream text file created by “wrapping” the input file. [0065]
  • 30. DSA: Digital Signature Algorithm—used to create a digital signature for a file or data stream. It should not be confused with any data encryption algorithm since the data is not encrypted by any means. [0066]
  • 31. DSA INFORMATION SET: This term is used loosely here. It is essentially the same as DSA Key Set, but without the system DSA public key. [0067]
  • 32. DSA KEY SET: A set of DSA information which consists of {KeyID, SSR level, Prime P, Prime Q,G, system DSA public key} for a particular software level. Only one set is created for a software release. [0068]
  • 33. DSA KEYSFILE: The system file that contains one or more DSA key sets. If the file is titled as *SYSTEM/DSAKEYSFILE and is stored on the halt/load pack, it is considered as the active system DSA keysfile. [0069]
  • 34. SIGNATURING: The process of applying the Digital Signature Algorithm to a file while wrapping it into a WRAPPEDDATA or CONTAINERDATA file. The resulting file is said to be digitally “signatured” or “signed”. [0070]
  • 35. SYSTEM DSA PRIVATE KEY: A DSA private key created for the sole purpose of signaturing Unisys-released software. It is kept secret by the Unisys Software Releases (and/or Support Group). Only one system private key exists per release. Its counterpart—the system public key—is stored in the system DSA keysfile. [0071]
  • 36. SYSTEM DSA PUBLIC KEY: A DSA public key created for the sole purpose of verifying wrapped software signed by the Unisys Software Releases (and/or Support Group) using a corresponding system DSA private key. only one system public key exists per release and is stored as part of a DSA key set in the System DSA keysfile. [0072]
  • 37. VERIFYING: The process of validating the digital signature of a WRAPPEDDATA or CONTAINERDATA file before unwrapping it. [0073]
  • 38. WRAPPED FILES: Files created as a result of the wrapping process—See Wrapping. [0074]
  • 39. SL (SYSTEM LIBRARY): SL is a Unisys A-Series MCP systems operation used to declare that a codefile o program, is to be considered a “System Library” for execution purposes. It allows for other programs to access the functions in that library without knowing much of anything about the library itself. The operating system will have knowledge about where the library is located on the disk, and control over which programs are allowed to link to the library for the purpose of accessing its routines. [0075]
  • General Overview: [0076]
  • As seen in FIG. 1A, a [0077] user terminal 8 is connected to a first operating system 14, such as a Unisys A Series computer, having outputs to a disk A,20 and a disk B,22.
  • A second operating system, such as [0078] NT platform system 30, utilizing the Microsoft Explorer program 30 x, Internet or e-mail program 30 y, and a CD Writer Package 30 w, communicates with disk C,24 so that the User terminal 8 can initiate the CD Writer Package 30 w to energize the CD Write Module 32 in order to burn a file on to the compact disk (CD) 34.
  • The disk A,[0079] 20 holds data designated as MY/FILE. The disk B,22 holds the data designated MY/NEW/FILE,23. The disk C,24 holds the resultant data designated C:MY\NEW\FILE,25. The data 25 of disk C,24, is controlled by the CD Writer 30 w for transmittal to the CD Write Module 32 for burning into the compact disk (CD) disk 34. The Internet/e-mail programs 30 y enable transmittal of a packaged file (wrapped) to the open network 40. It may also be noted that Disk A and Disk B could actually be the same physical device. It is not necessary that they always be two separate entities.
  • In summary, the [0080] User terminal 8 will use the channel marker cycle designated 101 to the first system computer 14 with a WFL WRAP [input file] as a [output file] from the [input disk media] such as disk A over to a [output disk media] such as disk B,22.
  • Then using channel marker cycle designated [0081] 102, the User terminal 8 will communicate with the NT system 30 having Microsoft Explorer 30 x, in order to start an operation which drags the file from the A Series' disks A,20, and B,22, and drops the file on to the NT systems' disk C 24.
  • The [0082] User terminal 8 using the designated channel marker cycle 103 then executes the CD Writer Package 30 w by initiating the CD Write Module 32 in order to burn the file 25, C:\MY\NEW\FILE, on to the CD (compact disk) unit 34.
  • Finally at this time, the resultant file data on the [0083] compact disk 34 is in a protocol compatible for usage by other platforms.
  • In FIG. 1A, the second system designated as the [0084] NT system 30 could also be designated alternatively as a UNIX system, in which case, the NX services 50 shown in FIG. 1B would not be required and the Microsoft Explorer program 30 x of FIG. 1A would be replaced by the industry-wide standard File Transfer Protocol (FTP).
  • FIG. 1B will be subsequently described herein to indicate the hardware system in greater detail. [0085]
  • DESCRIPTION OF PREFERRED EMBODIMENT
  • Referring to FIG. 1B, there is seen a drawing of the major elements involved in the present system. [0086]
  • A first system is shown, for example, such as a Unisys A Series [0087] computer operating system 14 which involves a Central Processing Unit 12, a main memory 18, a microcode memory 16 which is managed by the MCP 10 (Master Control Program). The CPU 12 is also supported by a storage media 20, Disk A, which carries an original file 21, designated MY/FILE which is formatted suitably for the first system such as the A Series computer system 14 and Disk B,22, which will be enabled to carry a new file designated MY/NEW/FILE, which is formatted for transport to a second system.
  • Now, in the sense of integrating to other systems, there is seen a second system called the “[0088] NT System 30” (alternatively a UNIX, IBM or other system) which is a platform developed by the Microsoft Corporation of Redland, Wash. The NT System 30 is seen having a storage medium 24 such as Disk C, which will eventually be provided with a resultant file 25 designated C:\MY\NEW\FILE (Item 25).
  • The [0089] A-Series system 14 is provided with a WFL (Work Flow Language) compiler 15 which is an interpretive language capable of taking User instructions and translating them into Operating System (O.S.) procedure calls. The MCP 10 has a relationship to the NT system 30 through use of a NX services unit 50.
  • NX/Services is a software unit used to integrate MCP operations with NT platform operations through the use of a Microsoft (MS) Standard RPC (Remote Procedure Call) interface. [0090]
  • The [0091] WFL compiler 15 is an interpretive compiler which provides a new language syntax using the word “Wrap”.
  • The [0092] Operator Terminal 8 of FIG. 1B, is the operator interface in which an operator would enter a command such as WRAP MY\FILE AS MY\NEW\FILE FROM A TO B, which is the file 21 sitting in Disk A and MY/NEW/FILE which is the file 23 (FIG. 1B) residing in Disk B. This command is transmitted through the MCP (or Master Control Program 10) in order to initiate the action of the WFL compiler program 15.
  • The [0093] MCP 10 then calls the MCP_FILEWRAPPER routine 36 passing parameters built by WFL 15 as the input to this routine. The MCP_FILEWRAPPER process 36 will then take the original MY\FILE 21 from Disk A, 20 and convert it to a new file designated MY\NEW\FILE 23 and deposit this into the storage disk B,22.
  • The [0094] MCP_FILEWRAPPER process 36 will call the MCP WRAPPER 38 routine indicating that the data should be processed, wrapped, and signed.
  • Thus, the MCP_WRAPPER routine communicates back to Disk A and reads the file starting with the file's Disk File Header (DFH) information and then its rows of data. For each buffer it reads, MCP_WRAPPER calls the WRITE_WRAP routine [0095] 39 to calculate the running signature for the data, as well as write the data out to the temporary output file MY/NEW/FILE on Disk B.
  • When there are no more rows of data, the MCP_WRAPPER routine [0096] 38 calls WRITE_WRAP the last time passing the checksum on the contents of the whole file. The WRITE_WRAP routine 39 determines the final digital signature and then writes both the checksum and the signature to the output file MY/NEW/FILE on Disk B before returning to MCP_WRAPPER.
  • The MCP_WRAPPER routine returns to MCP_FILEWRAPPER and tells it to make the file MY/NEW/FILE on Disk B permanent. As a result, there is now a data file provided onto the storage Disk B,[0097] 22. This file, MY/NEW/FILE, is now available to the NT system platform 30 from the file 23 residing on Disk B,22.
  • Another example of a problem that arises is the situation where there are two separate and different A Series computers, whereby the first computer has data and information (files) which it is desired to give or present for use by the second computer system. Normally, if the first system file is in object code, it is then necessary to put it on a tape and mail it to the second computer User or alternatively, to have the first system and second system connected to each other through a proprietary network connection. However, this is sometimes a long and cumbersome process, when it would be most desirable to be able to transmit it electronically to the second user through an open network such as e-mail or FTP (File Transfer Protocol). [0098]
  • Thus in the present system, the first computer system user would take his file and do his wrapping operation using either the Work Flow Language (WFL) statement WRAP or a user program that interfaces with the MCP routine MCP_FILEWRAPPER (or MCP_WRAPPER if no digital signature is required). [0099]
  • Thus, what has been accomplished is to take an original A Series file and repackage it, allowing the resultant file to be transported across an open network or to be burnt onto a PC-readable CD-ROM without losing the file's native attributes. When the file is loaded back to its native environment, it will be restored to its original state. [0100]
  • It should be noted that once the [0101] new file 23 has been placed on storage Disk B, 22, then by the use of the NX services 50, this new file 23 can be transmitted to the NT system 30. Thus, the NT system with its hard Disk C,24, can now receive and utilize the new file (as C:\MY\NEW\FILE) which came from the storage Disk B,22.
  • Another problem aspect involved is when an operator wishes to take a file from a first system, such as an A Series system program and copy it into a UNIX box or an NT box—that information cannot normally be transported because of the format and protocol differences. [0102]
  • Thus, the specialized structure and format of the A Series native files which normally could not be moved across a network, would have to be reconstituted and stored as part of the data in the data file and then made into a regular character data file of a common format such that any operating system can read it. This would be a byte-stream data file which could be read by any platform, whether it be a UNIX box, an IBM box, or a NT box. Thus, resultantly there is now a file that any platform can read. [0103]
  • In what is called the “Unwrapping” operation, all the time-stamped dates are reapplied, all the disk, row, address information is supplied, the file is rewritten row for row, segment for segment, exactly as it looked on the original system. Thus, if there were “spaces” at the end of the segment on the original file, there will also be the same spaces at the end of this segment on the resultant file. This is so because all this information is in the file's Disk File Header. [0104]
  • Thus, what has been accomplished is to take a first original native file and repackage it, by burning the file into a CD-ROM, so it can be transported anywhere to a second location, and then be loaded to act like the original file. [0105]
  • One method of getting system software out from the originator to a customer is on a Compact Disk, that is a CD-ROM, which has specially formatted arrangements in order to transmit A Series software. However, these files often are not always an industry standard format. [0106]
  • Customers often ask saying that they have a Compact Disk writer on their PC and they want to know—“how do I format a file so that I can distribute software to my other terminals” or to other customers that they have in their area?[0107]
  • Thus, the present system allows these recipients to download these files to their personal computer and then burn them into a Compact Disk and send them to their local co-workers or to their other customers. The burned-in files on the Compact Disk are burned using Industry Standard format for compatibility to other systems platforms, such as NT system platforms, UNIX system platforms, IBM system platforms, DEC System platforms and Unisys A Series system platforms. [0108]
  • Thus, the present system operates such that operators using the A Series systems can unwrap their files directly from an industry compatible Compact Disk, so that the file is usable just by putting the Compact Disk into the A Series system and giving it the command to “Unwrap Files”. The files and software can then be received for utilization. [0109]
  • The present system requires the packaging of native files of a first computer system such as a Unisys A Series system, in such a way as to allow them to co-exist on the same CD-ROM media, as non-native files. This packaging of files also allows for the transport of the native (A Series) files across heterogeneous networks, while still maintaining information on their native (A Series) attributes. [0110]
  • Previously CD-ROM's contained native A Series software on CD disks which were burned from a library maintenance formatted tape. However, this limited these types of files to only be useful for native A Series systems which are formatted for native A Series files. The present system provides an expanded ability for burning the native A Series files of software for a first computer system onto CD-ROM disks which will be compatible with suitable files for a second computer system, such as a Microsoft NT system and other platforms. [0111]
  • The native formatting of A Series files had attributes such as FILEKIND, CREATIONDATE, and RELEASEID, which now need to be placed in a format capable of being stored on a disk media which is using an industry-standard file format. [0112]
  • As mentioned earlier, “Wrapping” is a term used to define the process of packaging a native A Series file (first computer system) along with its Disk File Header information, (plus either a checksum, or optionally a digital signature), as a byte-stream data file (FILESTRUCTURE=STREAM, MAXRECSIZE=1, FRAMESIZE=8) so that it can be transported across heterogeneous networks and non-A Series specific media, while still maintaining its native A Series attributes. [0113]
  • The “digital signature” is created using an industry-standard public key/private key signaturing algorithm which provides a measure of security in that it allows a user confidence as to where the file originated from. The present system encompasses the Master Control Program (MCP), the Work Flow Language (WFL) program, and the FILEDATA work necessary to wrap files by packaging them into new, byte-stream files (wrapping) and later restoring them to their original native A Series format when needed for A Series systems (Unwrapping). NEW WFL SYNTAX: This involves a new work flow language syntax, so that arrangements are made in the [0114] WFL compiler 15 to support the new syntax which will have some similarity to a previous Library Maintenance MOVE command. The new syntax allows a User to wrap either a single file, a list of files, or a directory of files, in addition to subsequently enabling the unwrapping of these files, by specifying both the input file and the output file, or the directory title and location.
  • Added Programmatic Interfaces: [0115]
  • A programmatic interface is provided that will allow the User-Caller to pass a native A Series file's title and location as “input” along with an “output” file, title and location. The “output” file will be a “byte-stream” file with a beginning data block containing (i) an identification string; (ii) the original files Disk File Header information; (iii) the file itself as byte-stream data; and (iv) an ending block containing a checksum, and optionally a digital signature. [0116]
  • Thus, the added programmatic interface allows the caller to pass byte-stream file's title and location as input, along with an output file title and location if needed, for use of the “unwrapping” process. The “resultant file” will be a native A Series file created with the output file and location, but also containing the data and all of the native A Series attributes of the original file. [0117]
  • Single Procedure Call: [0118]
  • This first programmatic interface will allow input and output directory names to be passed in order to wrap or unwrap a directory of files with a single procedural call. This also allows for a single output “container file” to be created from multiple input files. [0119]
  • Second Programmatic Interface: [0120]
  • This interface is created to allow a caller to pass the A Series file's title and location as “input”, together with an “output” procedure. The data returned to the caller's output procedure will be a stream of data with (i) a beginning data block containing an identification string; (ii) the original file's Disk File Header information; (iii) the file itself as byte-stream data; and (iv) an ending block containing a checksum or a digital signature. [0121]
  • Functionally, the second programmatic interface will also allow the caller to pass an input procedure, along with the title and location of an output file. The data passed to the input procedure here would consist of a stream of data, with a beginning data block containing the identification string, the original file's Disk File Header (DFH) information, the file itself as “byte-stream data”, and also an ending block containing the checksum and optionally the digital signature, which is basically the same information that was passed to the output procedure when the file was originally wrapped. Here, the “resultant file” will be a native A Series file created with the output file title and location, but containing the data and all of the native A Series attributes of the original file. [0122]
  • New Filedata Syntax: [0123]
  • New syntax has been added to the FILEDATA LFILEs command in order to specify that the file being interrogated is a WRAPPEDDATA file. If this is a WRAPPEDDATA file, then FILEDATA will report the “attributes” of the native A Series file contained within the wrapped data file, rather than the attributes of the “wrapped” data file itself. [0124]
  • WFL Wrap Command: [0125]
  • This is the Work Flow Language wrap command usable in a first system computer such as the Unisys A Series computer system which can be executed to initiate the action of taking specialized formatted native A Series files and turning them into byte-stream files which can later be burned onto CD-ROM disks. Thus, the software files of a first computer platform, such as the Unisys A Series system, can now be made able to co-exist on the same data CD-ROM's as other types of software which is not A Series software. [0126]
  • Keysfiles: [0127]
  • The system will provide the use of A Series KEYSFILE which will also be wrapped using the new WFL syntax. This resulting file will also be burned onto the CD-ROM. Normally, the Unisys A Series KEYSFILES are shipped on separate tapes from the rest of the software releases, so that in the present situation, the newly wrapped KEYSFILE will be shipped on a separate data CD-ROM separate from the rest of the A Series release software files. [0128]
  • The A Series KEYSFILE is a file on each A Series system used to store License Key information for the individual system in order to determine which of the Unisys licensed features the user has purchased for use on that system. [0129]
  • The new WFL UNWRAP syntax can be used to unwrap the KEYSFILE off of the CD, while copying it into the A Series system. Once the file (as KEYSFILE) has been copied onto the A Series system, then a IK MERGE can be performed. IK MERGE is the system command used to merge the data from the new KEYSFILE (unwrapped from the CD ROM on to Disk) on the A Series system into the system's current KEYSFILE. [0130]
  • Digital Signature Algorithm: [0131]
  • The acronym DSA refers to the digital signal algorithm (DSA). The DSA public and private key are a function of a large prime numbers designated P,Q,G, which are generated by the digital signature algorithm. When “signing” a given file, the DSA requires the values of P,Q,G, and their private key to produce a digital signature which consists of two large integers designated R and S. When this message is to be verified, the verification process asks for a set of data designated [P,Q,G, PUBLICKEY, R, S]. [0132]
  • A user is only concerned with the public and the private key pair. However, since prime numbers P,Q,G,R,S, are inherent and required in the creation and verification of a “digital signature”, there must be provided a way to manage them and make their presence essentially transparent to the user. R and S are easy to handle because they are created during the “signing” process of a WRAP operation, so that their values are readily available to be embedded in the WRAPPED file. The handling of elements P,Q,G, on the other hand, is more complex because their values must be supplied from an “external source”, (that is to say, the user), to the WRAPPING function. [0133]
  • Thus questions and decisions arise regarding (i) how should P,Q,G, be generated? (ii) Since the generation process consumes so much resources, how often should P,Q,G, be generated, that is to say, should it be on a per-run basis, on a per-user basis, or otherwise? (iii) Since each binary value occupies an array of 11 words, how would a user handle such large values, since the manual typing of these values would be unnecessarily time-consuming? (iv) Then, what kind of user interface should be provided to accommodate the P,Q,G, public key and private keys? How would they be handled by the Work Flow Language statements of WRAP and UNWRAP? (v) Should the items P,Q,G, be embedded within the WRAPPED FILES? And if so, would that compromise the security of the file, if the file is intercepted when it is transferred across an open network?[0134]
  • The solution to these types of problems and questions will be delineated in the following paragraphs. [0135]
  • Overall Process: [0136]
  • For each software Release made, a special Release group will run a special utility that generates the values for P,Q,G, public and private keys. This particular set [ID, software level, public key, P,Q,G] will be stored by the utility as a record of the new KEYSFILE called *SYSTEM/DSAKEYSFILE. [0137]
  • The Release group will use the “private key” during the WRAP process to “sign” all the required system software files for that particular level. [0138]
  • The DSA (Digital Signature Algorithm) KEYSFILE will be distributed to customers in the same manner as the existing SYSTEM/KEYSFILE. Upon receiving the DSAKEYSFILE and the system software, the customer installs the KEYSFILE into the system and starts UNWRAPPING WRAPPED software without the need for specifying a public key. [0139]
  • When a user wants to WRAP his files with the “digital signature option”, he must obtain a DSA keypair. Keypairs can be generated by writing a program that calls the MCP, MCP_GENERATEDSAKEYS procedure. [0140]
  • The private key would then be supplied to the WRAPPING routine (for example, through the TASKSTRING) attribute of the WFL_WRAP statement). The public key would be given to the receiver of the files. When these files are to be UNWRAPPED, a correct public key must be provided (for example, via the TASKSTRING attribute of the WFL UNWRAP statement) for the operation to succeed. [0141]
  • Handling DSA Value During Wrap and Unwrap: [0142]
  • The WRAPPING routine, upon recognizing that a digital signature is required, obtains the P,Q,G, values from the active DSAKEYSFILE for the System Software Release (SSR) level that the system is currently running on. It then provides these values, along with the user-furnished private key, to the DSA “signing routine”. This routine, after signaturing the file, returns two large integers, R and S. These two integers, along with the current SSR level, can be stored within the file by the WRAPPING process. [0143]
  • When this file is UNWRAPPED, the UNWRAPPING routine gets P,Q,G, values from the active DSAKEYSFILE based on the SSR level it extracts from the file. The file's R and S values, along with P,Q,G, and the user-supplied public key, are then passed to the DSA signature verification routine. If there is no user-supplied public key (as is often the case of System Software WRAPPED by the Release group), then the public key from the active DSAKEYSFILE is used. [0144]
  • Checksum: [0145]
  • A checksum is calculated for the Disk File Header (DFH) for every file as it is wrapped. This ensures that there is no unintentional corruption of the Disk File Header as the file is shipped across a network. It also provides the receiver of the file some measure of confidence as to the origin of the file. [0146]
  • In addition to the checksum for the Disk File Header, a checksum is also calculated for the entire context of the file including the Disk File Header (DFH). [0147]
  • Signature and Checksum (Prevention Of Corruption): [0148]
  • The checksum will not normally be sufficient to ensure that a Disk File Header has not been intentionally corrupted, since the checksum algorithm is not protected and is fairly easy to reproduce. There is significant overhead to validate the Disk File Header if there were no protection of the structure, other than the simple checksum. Thus, without any real protection for the Disk File Header, it would be necessary to create an entirely new Disk File Header for the original file, and then separately validate every attribute of the header before it could be considered trustworthy for application. [0149]
  • The Master Control Program (MCP) [0150] 10, FIG. 1B, will assume that a Disk File Header is a valid piece of data. However, it is necessary to validate the Disk File Header before the rest of the file has even been retrieved, since even the information regarding the “size” of the file is stored in the Disk File Header. In order to insure that there was no intentional corruption while the file was in transit and also provide the “receiver” of the file with some insurance that the sender of the file was indeed that who the receiver expected it to be, a digital signature may be requested when the file is wrapped by specifying a private key with which to identify the signature file while wrapping. The receiver “must” specify the file's public key in order to verify the file when unwrapping it.
  • Public/Private Keys for Signaturing: [0151]
  • A KEYS generation utility is provided as a separate utility to generate public/private key pairs to be used when signing files. Public/Private key pairs are generated using the new utility in order to be used by the wrapping interfaces for signaturing files. Users who wish to create their own utility can write a program to interface with the MCP procedure MCP_GENERATEDSAKEYS. [0152]
  • WRAPPEDDATA File Format: [0153]
  • With reference to FIG. 3, there will be seen the format of the WRAPPEDDATA FILE which will be a simple byte-stream file. This file, as seen in FIG. 3, will contain several sections. The first section (i) is the word UNISYS “000010” which will be “EBCDIC” data used to indicate that this is likely to be a Wrapped file. The number associated with this identifier may be changed if the format of this file is changed. [0154]
  • The second block (ii) labeled “options” contains the options used when wrapping the file, such as the identifier to be used to locate the “public key” information in order to verify a file containing a digital signature. [0155]
  • The third block of FIG. 3 is (iii) designated as the Disk File Header, which involves a copy of the actual A Series Disk File Header for the file. This will become the actual Disk File Header for the file when it is restored to its native format after a “unwrap” operation. Additionally in block (iii), there is seen the Header checksum, which is a separate checksum for the Disk File Header itself. [0156]
  • The fourth block (iv) of FIG. 3 indicates “the file” which involves the contents of the file itself, written as byte-stream data. [0157]
  • The fifth block (v) of FIG. 3, is designated as “checksum”, which will be a single word of 48 bits calculated for the file and the disk file header combined, using a private key from a public/private key pair. [0158]
  • The sixth section (vi) shows the digital signature as being composed of Section R and Section S. The Section R includes 11 words or a total of 528 bits. Likewise, the Section S includes 11 words of a total of 528 bits. This constitutes the digital signature portion of the transmitted file which has been wrapped. [0159]
  • DSAKEYSFILE File Format: [0160]
  • The new system involves a keys file called “SYSTEM/DSAKEYSFILE”. This file is stored and managed similarly to the manner of existence on earlier A Series systems which used the “SYSTEM/KEYSFILE”. This file is used to store records of ID, software level, public key, PQG. These involve the following: [0161]
  • (i) ID: This is a unique and meaningful EBCDIC string with a length of up to 17 characters which is used for external display and for identifying the set. [0162]
  • (ii) Software Level: This is a real number that identifies the software level involved. [0163]
  • (iii) Public Key: This is a system DSA key generated along with a system private key based on certain prime numbers designated P, Q, G. This key is subsequently used in the “Unwrap” process of the A Series software. [0164]
  • (iv) P.O.G: These are prime numbers generated by a special utility. For a given set of (P,Q,G), there are a variety of public and private key pairs which can be generated. [0165]
  • The DSAKEYSFILE is an unblocked file which consists of records whose maximum record size is 60 words in length. The general information record contains miscellaneous data about the file, for example, version, number of search table records, number of key entries, etc. This record is then followed by one or more search table records which in turn, contain a number of four word search entries. Following the search table records are the data records with each containing a different set of [ID, software, public key, P,Q,G]. [0166]
  • The main purpose of the DSAKEYSFILE is to store the P,Q,G primes used when creating public and private key pairs. It is also used to store system public keys which are normally about 60 characters long, so the caller of Unwrap does not need to enter this character string every time when he unwraps Unisys' signed software. [0167]
  • This procedure involves a further procedure entitled “GET_DSA_PQGKEY” which obtains the corresponding set of [P,Q,G, system public key] from the active DSAKEYSFILE based on the SSR level and return the set to the caller. [0168]
  • Interface Operations: [0169]
  • This system involves new work flow language (WFL commands) designated as WRAP and UNWRAP which are provided to allow Users a simple method of invoking the new interfaces of this system. [0170]
  • There are two new FILEKIND values created to identify the files of the new format. These will help to prevent users from accidentally using the WRAP syntax to act on a file that has already previously been wrapped. [0171]
  • There is basically now provided two new programmatic interfaces designated as (i) MCP_FILEWRAPPER and also (ii) MCP_WRAPPER. These programmatic interfaces are exported out of the Master Control Program (MCP) [0172] 10.
  • Filekind: [0173]
  • This involves a set of values which will aid in identifying files that have been wrapped as long as the files have never left the environment of the first computer system, that is to say, the A Series computer. Once the file has then been copied into a non-A Series system, and then back on to the A Series system, this information is lost. The main purpose of new FILEKIND value is to ensure that a user does not accidentally attempt to WRAP an already WRAPPED file, as would be the case if a WFL WRAP command was executed on a directory of files and then the system did a Halt/Load before all of the files of a directory were wrapped. If the job were to restart after the Halt/Load, the WRAP command would begin to act on the directory over from the very beginning. If a file is encountered with a FILEKIND or with a WRAPPEDDATA value, that file will be skipped, and an error message will be issued for the file indicating that the file had already been previously wrapped. [0174]
  • Work Flow Language (WFL): [0175]
  • The Work Flow Language syntax is provided to allow a user easy access to the new programmatic interfaces. The new WFL commands permit the user to access the new interfaces to institute a wrap or an unwrap action without having to know the layout of the interfaces or having to create a program to call up these interfaces. [0176]
  • Taskstring: [0177]
  • This is a data structure that contains private or public key information for either signaturing or for verifying the signature of the file. Thus, for a “Unwrap” operation, the TASKSTRING will be used to specify the public key that should be used to verify the signature that was calculated when the file was wrapped. Then conversely, for the WRAP operation, the TASKSTRING is used to specify the “private key” that should be used to calculate the signature of the file. [0178]
  • MCP Filewrapper Interface: [0179]
  • The newly developed MCP_FILEWRAPPER program is used for Work Flow Language support and User programs. A User can call this program specifying either a “Wrap” or an “Unwrap” action along with the title and the location of both the input files and the output files. Of course, the input file specified for a “wrap” operation must not have a FILEKIND of WRAPPEDDATA. Further, the caller must have the proper privilege for both the input and the output files or directories. [0180]
  • The MCP_FILEWRAPPER program involves procedures which return errors. These errors are returned as display messages if the procedure is called from the Work Flow Language (WFL). [0181]
  • MCP Wrapper Interface: [0182]
  • When this interface program is called to “Wrap” a file, it takes a standard form name for an existing A Series file, along with an output, or Write, procedure. The A Series files Disk File Header (DFH) will be checksum passed the output procedure as data along with the checksum. Then the file itself will be read and passed on to the output procedure as data. Finally, there will be provided (optionally) a calculated digital signature or a checksum for the entire file which will be passed to the output procedure as data. [0183]
  • When the MCP_WRAPPER program copies a file from disk (i.e. “Wraps” the file), it updates the files COPY SOURCE time-stamp in the Disk File Header (DFH) of the A Series file that has been wrapped. [0184]
  • One of the parameters for the MCP_WRAPPER is the procedure designated IOWRAP. IOWRAP is the procedure being passed, either as an output or a WRITE procedure for Wrap or an input or READ procedure for the Unwrap. The parameters for IOWRAP involve (i) LGTH which indicates the length array data in bytes; (ii) DATA is the array containing the data to be written when for wrapping or READ for unwrapping. [0185]
  • It is significant to note that a Disk File Header (DFH) can involve data up to about 20,000 words long. Thus, the IOWRAP parameter procedure must be able to handle at least 20,000 words in the data array in one call. [0186]
  • Algorithmic Sequence for Burning a Compatible Compact Disk into a Standard Industry Format: [0187]
  • FIGS. 2A ([0188] 2A1, 2A2, 2A3, 2A4) and 2B illustrate the various sequential steps involved in programming a file which is taken from a first format system, such as an A Series file, and converting it to a standard industry format file which is compatible for other platforms, such as the NT platform.
  • Referring to FIG. 2A-[0189] 1, the source User will initiate the operation at marker cycle 101 for developing the Compact Disk by entering at step (a) the command WFL WRAP MY/FILE AS MY/NEW/FILE from Disk A to Disk B.
  • At c(i) step (b), this command is parsed and passed from the [0190] WFL compiler 15 over to the operating system 10 and into the routine 36 designated MCP_FILEWRAPPER.
  • At step (c), the MCP_FILEWRAPPER program will then verify the names of the files, then open up a new file MY/NEW/FILE to be outputted, it will verify the options and then call step (e) as seen in FIG. 2A-[0191] 1.
  • At step (cii), the MCP_FILEWRAPPER routine will close and save the output file when the MCP_WRAPPER program returns to the MCP_FILEWRAPPER. [0192]
  • At step (d) an output procedure is executed which provides for an array of data file information and whereby this array is written to an output file (MY/NEW/FILE). Additionally, any I/O errors are returned to the User or caller. [0193]
  • At step (e) of FIG. 2A-[0194] 1 there is involved the MCP_WRAPPER operation. At step (e), the software operation involves verifying the input file title, and opening the file; verifying the options for wrapping the file; verifying the file license applicability by calling the operating system and verifying the feature key.
  • Then subsequently, (as seen in FIGS. [0195] 2A-2 through 2A-4) the step (e) involves a series of sub-steps going from (e)(i) over to (e)(xii). These involve the following:
  • At step (e)(i), the MCP-WRAPPER operation will copy the input files and send a Disk File Header to an intermediate local storage array in memory. This array provides temporary data storage so that there is no chance of accidentally acting on the “real” DFH or data for the file. [0196]
  • Then at step (e)(ii), the MCP_WRAPPER operation will add a checksum to the end of the array. [0197]
  • At step (e)(iii), the program will save the checksum in a local variable, and then at step (e)(iv), it will call the output procedure (d) in order to Write the Disk File Header (DFH) to the output data file. [0198]
  • Continuing from step (c) of FIG. 2A-[0199] 1 which has called in the mCP_WRAPPER operation step (e), it will be seen that the output procedure (d) is invoked by this step (e) at e (iv), FIG. 2A-2, MCP_WRAPPER operation to pass the input file data over to be written to the new byte-stream data file at step (d), FIG. 2A-2.
  • At step (e)(v), FIG. 2A-[0200] 3, the software will cause a Read of the input file using disk row addresses of the Disk A, one at a time, until there are no more disk row addresses for the file. When the disk row addresses are exhausted, the software will proceed to step (e)(viii). Then at step (e)(vi), the program will pass information in the array onto the output procedure (d) in order to Write the array information to the output file. For descriptive purposes, the “input” file is the file being “Read”, (MY/FILE) while the “output” file is the new file being created or written (MY/NEW/FILE).
  • At step (e) (vii), the program calculates the running checksum for each row and adds this on to the checksum variable. Using the local checksum variable, a checksum is calculated for the entire file as it is being repackaged. This checksum will reside in the file and be later used by the unwrap operation to verify that the file was not unintentionally corrupted while transferring across a second system platform. [0201]
  • Then at step (e)(viii), the program will call the output procedure (d) FIG. 2A-[0202] 4 and pass the checksum to write the checksum value over to the output data file, (Disk B).
  • At step (e)(ix), the program will close the input file, and at step (e)(x), will update the time-stamp information for the original file (A Series DFH Attribute Information). [0203]
  • At step (e)(xi), the program will set time-stamps in the disk file header (DFH) for the input file (Disk A) and then return [step e(xii)] to the MCP_FILEWRAPPER procedure from where it was called. [0204]
  • MCP_FILEWRAPPER continues at c(ii), FIG. 2A-[0205] 4, and will then close and save the output file (MY/NEW/FILE) on Disk B.
  • MCP_FILEWRAPPER will then continue on to process the next file in its list (if there is one) by returning to c(i), FIG. 2A-[0206] 1. Otherwise, if there are no new files to process, then MCP_FILEWRAPPER will Exit, thus returning (with any error information) to its Caller. This completes the operation for marker cycle 101.
  • Now referring to FIG. 2B, the source user will initiate at (f) the operation ([0207] marker cycle 102 of FIG. 1A) to drag the file (MY/NEW/FILE), using the Microsoft Explorer program, from the shared Disk B,22 over to the local Disk C,24 where it becomes C:\MY\NEW\FILE. Then Source User 8, using marker channel cycle 103 will initiate the CD Writer package.
  • The shared disk would be a LAN connected Disk B owned by the first system, that the PC has access to. [0208]
  • At step (g), on marker cycle [0209] 103 (of FIG. 1A and FIG. 2B), the User 8 will execute (within the client terminal 30), a CD-WRITER package in order to burn the file onto a Compact Disk, 34.
  • At step (h), FIG. 2B, the [0210] Compact Disk 34, once it has been burned with the files, can be removed and delivered to a customer-client terminal for that party's PC (Personal Computer) platform.
  • After a preliminary discussion of the Digital Signal Algorithm, then subsequently the description of FIGS. 4A, 4B, [0211] 4C and 4D, will provide a sequence for WRAPPING a native file into a text stream data file and generating the signatures which can be used to guarantee reliability of the data.
  • The DSA Utility: [0212]
  • The Digital Signal Algorithm (DSA) utility has a symbol file designated SYMBOL/DSATOOLS. When compiling this symbol file with the compiler option set at “INTERNAL”, a non-restricted version of the utility is produced, otherwise, a restricted version of the utility is produced. This latter version only provides the capability to generate DSA public/private key pairs from a DSAKEYSFILE and is intended for general use. [0213]
  • The symbol file for the DSA utility provides certain functionalities which include: [0214]
  • (i) the ability to generate key pairs from a sequential file containing sets of DSA information. [0215]
  • (ii) the ability to create or to add DSA key sets to a DSAKEYSFILE. [0216]
  • (iii) the ability to delete DSA key sets from a DSAKEYSFILE. [0217]
  • (iv) the ability to dump contents of a DSAKEYSFILE into a “sequential file” (regular text file). [0218]
  • (v) the ability to merge a DSAKEYSFILE into the active *SYSTEM/DSAKEYSFILE. [0219]
  • (vi) the ability to copy certain DSA key sets from one DSAKEYSFILE and store them into another KEYSFILE. [0220]
  • Both of the above versions of the code file must be executed under a “privileged” User code. [0221]
  • The restricted version of the DSA utility is designated “OBJECT/DSATOOLS”. [0222]
  • A non-restricted version of the DSA utility is designated “OBJECT/DSATOOLS/FULL”. [0223]
  • A sequential file containing sets of DSA information (designated, DSAINFO/SOURCE). Currently, this file contains 21 sets of DSA information used to generate system public and private key pairs. Only one set is used per each software release, so that these can last for a considerable period of time. [0224]
  • Overall Process: [0225]
  • For each Software Release (SSR=System Software Release), the software origination group will do the following steps: [0226]
  • 1. Create a DSAKEYSFILE containing a DSA key set for that release, including a system DSA public/private key pair. The DSA public key is part of the DSA key set. The DSA private key is kept on a secret basis. [0227]
  • 2. Using the generated DSA private key, the software origination group will sign Unisys system software. This, however, can be omitted if software is burned into Compact Disks (CD'S), since the software on a Compact Disk cannot be tampered with. [0228]
  • 3. Distribute the signatured software and the related DSAKEYSFILE to users and customers. [0229]
  • Generating a System DSA Key Pair and Creating a DSAKEYSILE: [0230]
  • Using a privileged User code, execute the following steps: [0231]
  • 1. Create a sequential file (for example, DSAINFO442) with at least one of the DSA information sets in the file DSAINFO/SOURCE. Each DSA information set is intended to be used in any one particular Software Release, and the same set should not be used more than once. [0232]
  • For example, in a Command and Edit (CANDE) session, insert the following commands: [0233]
  • MAKE DSAINFO/442SEQ [0234]
  • U ED [0235]
    ]INSERT DSAINFO/SOURCE from line- to line
    <editKEYID name if necessary, for example,
    SSR442DSAKEYID>
    <edit SSR number, if necessary, for
    example, 442.>
    ]END
  • SAVE [0236]
  • FIG. 5 is a diagram illustrating how the digital signature algorithm information, together with the key ID is inserted into the DSATOOLS, which feeds one Output to the DSAKEYSFILE, and another output to the DSAKEYS/442. This results in the creation of the DSAKEYSFILE, having a public key and a DSAKEYS/442 unit which combines the public key and the private key. [0237]
  • Signaturing System Software Using DSA Private Key: [0238]
  • 1. Assuming that the system is running on a System Software Release designated 44.2, the method is now ready to signature the files. If the system is not ready to signature the files, it is necessary to go back to step 1, in the previous section and create a DSA key set in the *SYSTEM/DSAKEYSFILE for the particular level the system is running on. [0239]
  • 2. It is necessary to ensure that SIGNATURESUPPORT is SL-ed. If this is not the case, then SL it with *SYSTEM/DIGITAL/SIGNATURE/SUPPORT. SL is defined in item 41 of the Glossary. [0240]
  • For example, at the Operating Display Terminal (ODT), enter the following: [0241]
  • SL SIGNATURESUPPORT=*SYSTEM/DIGITAL/SIGNATURE/SUPPORT [0242]
  • 3. Ensure that DIGESTSUPPORT is SL-ed. If this is not the case, then SL it with: [0243]
  • * SYSTEM/MESSAGE/DIGEST/SUPPORT [0244]
  • For example, at the Operator Display Terminal, enter the following: [0245]
  • SL DIGESTSUPPORT=*SYSTEM/MESSAGE/DIGEST/SUPPORT [0246]
  • 4. Now operate to signature the software by using the system DSA private key. Files can be wrapped as separately Wrapped files, or as Containers. The latter, (Containers), allows a number of Wrapped files to be grouped into one single entity. For the software that is to be burned into a Compact Disk (CD), there is no need to signature them since they cannot be altered after they are put into a Compact Disk. [0247]
  • EXAMPLE
  • Using the WFL WRAP syntax, to pass the system DSA private key in the task attribute TASKSTRING, a Work Flow Language (WFL) job can then be created to automate the wrapping process. [0248]
  • In a Command and Edit (CANDE) session, do the following: [0249]
  • WFL WRAP AFILE AS WRAPPED/AFILE;TASKSTRING=<system DSA private key>[0250]
  • WFL WRAP ADIR/=INTO CONTAINERA; TASKSTRING=<system DSA private key>[0251]
  • It should be noted that the files can also be wrapped and signatured using a programmatic interface to the MCP-exported entry point MCP_FILEWRAPPER. [0252]
  • Wrap and Signature File: [0253]
  • FIG. 6 is an illustration of wrapping and signaturing a file. Here, it is seen that the wrapping sequence receives information from the DSAKEYSFILE. It also receives an input from the system DSA private key, in addition to receiving the file information, after which the wrapping sequence will produce the signatured file. [0254]
  • 5. To make sure that wrapped files are signatured correctly, it is desirable to verify these files before shipping them out to customers over the Internet, or via the CD-ROM. [0255]
  • Examples Utilizing the Unwrapped Sequence For System Software that was Signed with a System DSA Private Key
  • Use the WFL UNWRAP syntax, but do not pass any string in the TASKSTRING attribute. The system will pick-up the corresponding system DSA public key in the file *SYSTEM/DSAKEYSFILE for verification. This step can also be incorporated into the same Work Flow Language (WFL) job that also WRAPS files. [0256]
  • WFL UNWRAP WRAPPED/AFILE AS UNWRAPPED/AFILE [0257]
  • WFL UNWRAP*=AS UNWRAPPED/=OUTOF CONTAINERA [0258]
  • As seen in FIG. 7, the unwrap sequence is fed information from the DSAKEYSFILE, and also fed by the signatured FILE in order to then produce the original native file which is compatible for the original computer system which uses the Master Control Program. [0259]
  • Distribution: [0260]
  • The distribution of the signatured files and the DSAKEYSFILE is done using the ordinary procedures for shipment which can be done via Internet transfer or by CD-ROM. [0261]
  • Using Digital Signatures with Wrapped Files and Wrapped Containers: [0262]
  • With the advent of the WRAP/UNWRAP feature, the present system also gives users the ability to optionally sign wrapped files and wrapped containers with digital signatures. Like a normal signature on a real piece of paper, a digital signature allows the recipient of a singed wrapped file to be certain of its origin. Unlike a normal signature, the digital signature is electronically represented as binary data rather than handwritten characters. This allows the signature to be embedded within the file, and it enables the system to do some special calculations in order to authenticate the signature and verify that the file has not been tampered or altered during its transmission. [0263]
  • Digital signature “creation” is based on the data within a file and a private key. Similarly, digital signature “authentication” is based on the same data of the file and a corresponding public key. The private key and public key are generated as a pair by the system, so even though they are not the same, they still share some underlying common mathematical properties. By differentiating the public key and the private key of a key pair, one cannot use either key for both signing and verification. Thus, a person possessing only a “public key”, though is capable of authenticating a wrapped file's digital signature “created” by a corresponding “private key”, but cannot use it to produce the same signature. On the other hand, a person with only the private key will not be able to verify the signed wrapped file. [0264]
  • The digital signature algorithm (DSA) also ensures that a public key belonging to one key pair cannot be used to validate the digital signature derived from a private key of another key pair. [0265]
  • Since the DSA is not an encryption algorithm, signing a wrapped file or wrapped container does not scramble its data. Instead the DSA makes a pass through the data stream and applies the specified private key to come up with a checksum-like binary hash pattern which is then inserted into the resulting file. [0266]
  • When creating a wrapped file or wrapped container with digital signature, the originator should perform the following steps: [0267]
  • Obtain a DSA key pair that consists of a public key and a private key [0268]
  • Specify the private key in the wrapping process to create a digitally signed wrapped file (or container) [0269]
  • Send the signed wrapped file to its intended recipient [0270]
  • Send the public key to the same recipient [0271]
  • The last two steps should get executed separately to make the file more secure. If both the signed wrapped file and the public key are transmitted in the same message, it may be possible for some unauthorized party to intercept the message, unwrap and modify the file, then sign it with their own private key, and forward, to the unsuspecting recipient, the altered signed wrapped file and a different public key. [0272]
  • Upon receiving a signed wrapped file or container, the recipient of the file should perform the following steps: [0273]
  • Obtain the corresponding public key [0274]
  • Specify the public key in the unwrapping process. If the system does not attempt to authenticate the file's digital signature or fails to do so, the signed wrapped file is either corrupted or was modified and should not be trusted. [0275]
  • The following sections describe in detail what a customer should do to unwrap the signed wrapped files and containers (such as ICs), and how one can wrap and unwrap one's own files with digital signatures. [0276]
  • Getting Started: [0277]
  • New System Libraries: [0278]
  • There are two new System Library files that need to be installed and SL'ed (Glossary, item 40) on the system before one can utilize the digital signature feature. These are SYSTEM/DIGITAL/SIGNATURE/SUPPORT and SYSTEM/MESSAGE/DIGEST/SUPPORT. These files are shipped with software releases beginning with HMP NX3.0/SSR44.2. If these files are not currently available on the system, they may be obtained by ordering the SECURITY Interim Correction (IC) for releases beginning with SSR 42.3. From the ODT, install these files as follows: [0279]
  • SL SIGNATURESUPPORT=*SYSTEM/DIFITAL/SIGNATURE/SUPPORT [0280]
  • SL DIGESTSUPPORT=*SYSTEM/MESSAGE/DIGEST/SUPPORT [0281]
  • New DSA Keysfile: [0282]
  • A customer also needs to obtain a copy of the SYSTEM/DSAKEYSFILE. This keysfile contains one or more DSA information “sets” where each corresponds to a particular SSR (System Software Release). One can only wrap and unwrap files with digital signatures for the levels indicated in the DSA keysfile. If the *SYSTEM/DSAKEYSFILE already exists on the Halt/Load family, the available levels can be shown by entering the ODT (Operator Display Terminal) command: IK DSASHOW [0283]
  • Beginning with HMP NX4.0/SSR45.1, the DSA keysfile is shipped with standard software releases. For earlier releases, a customer needs to call the support organization to obtain a copy of this file. This file will be delivered through the same process as *SYSTEM/KEYSFILE because wrapping the DSA keysfile could compromise Unisys' digital signature security mechanism. [0284]
  • The DSA keysfile is cumulative, that is—a DSA keysfile of a later SSR release will contain the DSA information set of that release plus all DSA information sets of earlier releases [Note: All supported software levels earlier than SSR 44.2 will use the 44.2 DSA information set.] Thus, installing a DSA keysfile is as simple as copying the most current DSA keysfile to one's Halt/Load family. However, only the DSA keysfile with the name *SYSTEM/DSAKEYSFILE will be recognized by the system as the active system DSA keysfile. To install a DSA keysfile as the active DSA keysfile, the following command is used: [0285]
  • COPY<DSA keysfile filename>AS *SYSTEM/DSAKEYSFILE TO <Halt/Load Pack>(PACK) [0286]
  • Signing and Verifying One's Own File: [0287]
  • Obtaining One's Own Public/Private Key Pairs: [0288]
  • In order to add a digital signature to one's own files during the wrapping process, one must first obtain a public/private key pair. Generating key pairs involves writing a program that interfaces with the new MCP procedure MCP_GENERATEDSAKEYS. One may want to use the sample program listed at the end of this document (sample program to generate DSAKEYPAIRS, page 48) to help one get the key pairs, or one may want to modify it to suit one's own needs. [0289]
  • Note that key pairs are generated based on an SSR level. This means one cannot use a private key of one SSR level to digitally sign wrapped files for another SSR level. [0290]
  • Creating Digitally Signed Wrapped Files: [0291]
  • Once a key pair is generated, one can use the WFL WRAP syntax to create a digitally signed wrapped file. By passing the private key through the task attribute TASKSTRING of the WRAP statement, one indicates the desire to add a digital signature to the file. [0292]
  • By default, the system will produce the signed container for the current software level. At times, one may want to create a digitally signed wrapped file for an SSR level different than that of the running system (for example, the recipient of the file may not be on the same SSR level as the operator). For such situations, one will need to specify the targeted SSR level for the WRAP statement through the task attribute TARGET. The level value should be represented as a whole number without the decimal point. [0293]
  • Distributing and Verifying Digitally Signed Wrapped Files: [0294]
  • One can now send the signed wrapped files to intended users. In order for these files to be verified and unwrapped, one also needs to send the corresponding public key to them. To ensure the wrapped files are not compromised in transit, one should avoid sending both signed files and public key at the same time. For instance, if using e-mail as the delivery mechanism, send the public keys in a separate mail message from the wrapped files they are protecting. If files are to be transferred over the Internet, one can allow the wrapped files themselves to be down loaded, but simply display the public key for the recipient to “cut and paste” into the WFL WRAP statement, or offer to send the public key to the recipient via a provided e-mail address. [0295]
  • Recipients of the signed files should use the SFL UNWRAP syntax to verify and unwrap files, passing the 20 public key one provided through TASKSTRING. [0296]
  • Dealing with Digital Signatures: [0297]
  • One should not release one's private key because it may compromise the signed wrapped file's security. [0298]
  • Because both public and private keys are long hex strings, when one needs to execute many WRAP and UNWRAP statements dealing with digital signatures, it may be better for one to create a WFL job and associate the key values with string variables. For instance, [0299]
  • STRING PUBLICKEY,PRIVATEKEY; [0300]
  • PUBLICKEY:=“<hex string for DSA public key>”; [0301]
  • PRIVATEKEY:=“<hex string for DSA private key>”; [0302]
  • WRAP MYDIR/=INTO MYCONTAINER;TASKSTRING=PRIVATEKEY; [0303]
  • UNWRAP=OUTOF YOURCONTAINER;TASKSTRING=PUBLICKEY; [0304]
  • Since wrapping files with digital signatures is processor-intensive, one should generally avoid creating many separate signed wrapped files. One may want to put them into one single signed container instead. [0305]
  • One should not trust files that are supposedly wrapped with digital signatures under conditions when the system does not either attempt to verify the signature or fails to do so. [0306]
  • Sample Program to Generate DSA Key Pairs: [0307]
  • Begin [0308]
  • This sample program demonstrates the basic technique on how to generate DSA key pairs based on a specified SSR level. The resulting public and private key pairs then can be used in the WFL WRAP/UNWRAP statements to sign and verify signatured wrapped files. [0309]
    FILE DSAKEYS (KIND=DISK, MAXRECSIZE=14,
    MINRECSIZE=14, BLOCKSIZE=420,
    BLOCKSTRUCTURE=FIXED,
    FILEKIND=DATA,
    FRAMESIZE=48, NEWFILE=TRUE);
     LIBRARY MCP (LIBACCESS=BYFUNCTION,
    FUNCTIONNAME=“MCPSUPPORT.”);
     REAL PROCEDURE MCP_GENERATEDSAKEYS (SOFTLEVEL,
    NUMOFPAIRS, ARY,
    PROC, OPT);
    VALUE SOFTLEVEL, NUMOFPAIRS, OPT;
    REAL SOFTLEVEL, NUMOFPAIRS, OPT;
    ARRAY ARY [0];
    REAL PROCEDURE PROC (INX, PUBKEY, PRIKEY);
    VALUE INX;
    REAL INX;
    ARRAY PUBKEY, PRIKEY [0]; FORMAL;
    LIBRARY MCP;
     REAL PROCEDURE WRITEKEYPAIR (PAIRNUM, PUBKEY,
     PRIKEY);
     VALUE PAIRNUM;
     REAL PAIRNUM;
     ARRAY PUBKEY, PRIKEY[0];
     BEGIN
    ARRAY BUFF [0:13];
    DEFINE WRITEIT =
     BEGIN
      WRITE(DSAKEYS, 14, BUFF);
      REPLACE POINTER(BUFF) BY “ ” FOR 14
    WORDS;
     END #,
    WRITEHEXSTR (PREFIX, ARY, INX, LEN) =
     BEGIN
      REPLACE POINTER(BUFF) BY PREFIX,
       POINTER(ARY[INX],4) FOR LEN WITH
    HEXTOEBCDIC;
      WRITEIT;
     END #;
    % Notify user about the progress. Useful if
    USEUSERPROCF is set.
    DISPLAY (“Key pair #” !! STRING(PAIRNUM,*) !! “
    generated.”);
    % Keep key pair information secret. Write it out to
    file.
    REPLACE POINTER(BUFF) BY “KEY PAIR #”, PAIRNUM FOR
    * DIGITS, “:”;
    WRITEIT;
    WRITEHEXSTR (“ PublicKey = ”, PUBKEY, 0, 48);
    WRITEHEXSTR (“ ”, PUBKEY, 4, 48);
    WRITEHEXSTR (“ ”, PUBKEY, 8, 36);
    WRITEHEXSTR (“ Private Key = ”, PRIKEY, 0, 48);
    WRITEHEXSTR (“ ”, PRIKEY, 4, 48);
    WRITEHEXSTR (“ ”, PRIKEY, 8, 36);
     END;
     DEFINE % Returned value
    CODEF = [15:08] #,
    SCODEF = [31:16] #,
    % OPT word
    USEUSERARYF = [01:01] #,
    USEUSERPROCF = [00:01] #,
    % Others
    NUMRETKEYS = KEYARY[0].[15:16] #,
    FIRSTKEY = KEYARY[0].[31:16] #,
    NUMREQKEYS = 4 #, % Number of
    requested keypairs
    KEYWORDS = 11 #, % Words for
    each key
    SSRLEVEL = 442 #; % SSR Level
    44.2
     REAL R, I;
     ARRAY KEYARY [0:(KEYWORDS*2*NUMREQKEYS)],
    PUBKEY [0:(KEYWORDS-1)],
    PRIKEY [0:(KEYWORDS-1)];
    MAIN PROGRAM
    Generate 10 DSA public/private key pairs for SSR level
    44.2.
    Because both USEUSERARYF and USEUSERPROCF return the same
    information, we normally set either flag but not both.
    This is just an example to illustrate how both cases
    work.
     R := MCP_GENERATEDSAKEYS (SSRLEVEL, NUMREQKEYS,
    KEYARY, WRITEKEYPAIR,
    0 & 1 USEUSERARYF & 1
    USEUSERPROCF);
     IF BOOLEAN (R) THEN
      DISPLAY (“DSA key generation Error #” !!
    STRING(R.CODEF,*) !!
    “ - SubCode #” !! STRING(R.SCODEF,*));
    If USEUSERARYF is set, process the returned info.
     IF (NUMRETKEYS GTR 0) THEN   % Got some good key
    pairs
      BEGIN
       FOR I:=1 STEP 1 UNTIL NUMRETKEYS DO
        BEGIN
         R := ((I−1) * 2 * KEYWORDS) + FIRSTKEY;
         REPLACE POINTER(PUBKEY) BY
    POINTER(KEYARY[R])
    FOR KEYWORDS
    WORDS;
         REPLACE POINTER(PRIKEY) BY
    POINTER(KEYARY[R+KEYWORDS])
    FOR KEYWORDS
    WORDS;
         WRITEKEYPAIR (I, PUBKEY, PRIKEY);
        END;
      END;
     LOCK (DSAKEYS);
    END.
  • FIG. 4B is an exposition of steps C and D of FIG. 4A, wherein by referring to FIG. 4B, it is seen that at step C1, there is an entering of MCP_FILEWRAPPER routine ([0310] 36).
  • At step C1a, the program will verify all the parameters. [0311]
  • At step C1b, the routine will get the specified or default SSR level. [0312]
  • Step C1c, the routine will call the program GET_DSA PQGKEY while passing the SSR level in order to: [0313]
  • ensure the DSAKEYSFILE availability;—get the prime numbers P,Q,G and the system public key based on the SSR level. [0314]
  • At step C1d, there will be a verification of the specified private keys using a hexadecimal presentation. [0315]
  • At step C1e, the routine will verify the wrap license key. [0316]
  • At step C1f, a link will be made to the Signature Support Library (FIG. 1B). [0317]
  • The Signature Support Library exports the procedure DSASIGN for MCP_FILEWRAPPER to use. [0318]
  • At step C1g, a decision tree is initiated to see if there is a pair of Input and Output file names from the file list. If the answer is “NO”, then an exit is made at step C1x, to exit the routine of [0319] MCP_FILEWRAPPER 36.
  • If the answer is “YES”, then step C1h will open the Output file, and step C1i will call the DSASIGN routine in the Signature Support Library for the first time in order to signature the ID “UNISYS”. [0320]
  • At step C1j, the routine will call the program designated MCP_WRAPPER ([0321] 38) according to the steps of FIG. 4C, and thus passing:—Input file name;—WRITE_WRAP according to the routine shown in FIG. 4D.
  • Then at step C1L, the routine will close and lock the output file. [0322]
  • Appendix I is attached to indicate how to run the DSA utility program routine. [0323]
  • Described herein has been a method and system whereby native specialized files in a first computer system, can use the operating system of the first computer system together with first and second programmatic interfaces therein in order to transform a file (native to the first system) into a standard byte-stream file which is utilizable by many other types of computer platforms (second system), and which byte-stream files can be burned into a CD-ROM (or transported via an open network) which is then available for utilization by multiple numbers of other system platforms. The integrity for transforming the native files of the first system into a standard byte stream file utilizable by other computer platforms, and which can be transferred over the Internet, is rendered reliable by the use of the digital signaturing systems described above. [0324]
  • While other variations and embodiments of the described method may be implemented for various purposes, the invention is defined by the following claims appended herein. [0325]
  • Appendix I How to Run the DSA Utility
  • General Description [0326]
  • This utility is used to: [0327]
  • (1) Add DSA key sets to a DSA keysfile [0328]
  • (2) Delete DSA key sets from a DSA keysfile [0329]
  • (3) Merge a DSA keysfile to the active *SYSTEM/DSAKEYSFILE [0330]
  • (4) Extract DSA key sets from one DSA keysfile to another [0331]
  • (5) Generate DSA public and private key pairs [0332]
  • A restricted version of this utility only supports function (5). All other functions are intended for internal use, specifically—the Unisys software release group. A non-restricted version of of this utility is only available when compiled with the compiler option INTERNAL set. Because security restriction is required by the MCP entry-point DSAKEYSFILEHANDLER, this utility can only be run succcessfully by a privileged user, or the codefile must be PU-ed. [0333]
  • Usage [0334]
    To run this utility, enter:
    R <this utility codefile> (“<request>”)
    <request> can be one of the following:
    ADDKEYS
    DELETEKEYS
    GETKEYS
    DUMPKEYS
    MERGEKEYS
    EXTRACTKEYS
    . Syntax for adding DSA key sets:
    ---- ADDKEYS ---- FIN --------- <filename> ------------>
    | − = − |
    > --------------------------------------------------- |
    | − KFOUT --------- <filename> − |
    | − = − |
  • FIN : Sequential file containing DSA information. The format of this file is described below. [0335]
  • KFOUT: DSA keysfile where DSA key sets are to be added. If omitted, active DSA keysfile is used. If it does not exist, a new DSA keysfile will be created. [0336]
  • Syntax for generating DSA key pairs: [0337]
    ---- GETKEYS ---------------------------------------- |
    | |
    | | <----------------------------------------------- | |
    | | | |
    | ------ /1\-- SSR ---------- <number> ------------------- |
    | | | − = − | |
    | -/1\-- NUM - | |
    | |
    | -/1\-- FIN---------<filename>- |
    | | |− = − | |
    | /1\-- FOUT-- | |
    | | |
    | /1\-- KFIN-- | |
    | | |
    | -/1\ -- KFOUT- | |
    | | |
    | -/1\-- VALIDATE --------- T --- |
    | − = − | | − F − |
  • SSR: the level from which key pairs are to be generated (e.g. 442). Its default value is the current SSR. SR is intended for use with KFIN, but not with FIN since SSR should already be specified in FIN. If FIN is specified, SSR is ignored. [0338]
  • NUN: the number of key pairs to be generated. Its default value is 1. [0339]
  • FIN: Sequential file containing prime numbers for creating key pairs if KFIN is not specified. Use of FIN excludes the KFIN and SSR specifications. The format for this sequential file is described below. [0340]
  • KFIN: the DSA keysfile whose DSA information will be used to generate key pairs. The default is the *SYSTEM/DSAKEYSFILE on the halt/load family. It is mutually exclusive of the FIN specification. [0341]
  • FOUT: the destination sequential file where key pairs are stored. If FIN is specified, this file also contains FIN'S prime numbers which make it suitable for the ADDKEYS request. Its default title is DSAKEYS. [0342]
  • KFOUT: allows the last generated key pair from each set {SSR, KEYID, P, Q, G} in the file FIN to be added to a DSA keysfile directly without the need to run this utility again with the ADDKEYS request. NOTE: This option is only available when compiling with INTERNAL set. [0343]
  • VALIDATE indicates whether the utility will do tests on generated key pairs. Its default value is (T)rue. [0344]
    . Syntax for deleting DSA key pairs:
    | <---- , ---- |
    | |
    ---- DELETEKEYS -- KEYID --------- <string>--------->
    | − = − |
    >--------------------------------------------------------- |
    | - KFIN --------- <filename> - |
    | − = − |
    ∘ KEYID: ID of the DSA key sets to be deleted.
    ∘ KFIN : DSA keysfile where key sets are to be deleted
    from. If not specified, *SYSTEM/DSAKEYSFILE is
    used.
    . Syntax for dumping a DSA keysfile
    ---- DUMPKEYS -- FOUT --------- <filename> --------->
    | − = − |
    | - KFIN --------- <filename> - |
    | − = − |
  • FOUT: Sequential file where contents of KF are dumped to. [0345]
  • KFIN: Source DSA keysfile whose key sets are to be dumped. If not specified, *SYSTEM/DSAKEYSFILE is used. [0346]
    . Syntax for merging a DSA keysfile to the active one
    ---- MERGEKEYS -- KFIN --------- <filename> --------- |
    | − = − |
  • KFIN: the DSA keysfile to be merged with *SYSTEM/DSAKEYSFILE on halt/load family. [0347]
  • Syntax for Extracting DSA Key Sets from One DSA Keysfile to Another [0348]
    ---- EXTRACTKEYS ----- KEYID ------ <string> -------------->
    | | − = − | |
    | -- SSR --------- <number>- |
    | − = − |
    >-------------------------------- KFOUT ---------- <filename>-- |
    | -- KFIN ---------<filename> --| | − = − |
    | − = − |
  • KEYID: all DSA key sets with IDs containing the specified will be copied to KFOUT. [0349]
  • SSR: DSA key set for the level specified by SSR is copied to KFOUT. [0350]
  • KFIN: Input DSA keysfile where the key sets are to becopied. if not specified, the *SYSTEM/DSAKEYSFILE on the halt/load family is used. [0351]
  • KFOUT: Output DSA keysfile where copied key sets are stored. [0352]
  • Format of FIN, FOUT [0353]
  • User-specified file FIN and the output file FOUT created by the utility are sequential files sharing the same format. These file contain a number of DSA key sets and comment lines. [0354]
  • Comment lines should be preceded by the character ‘%’. [0355]
  • Each DSA key set should be separated by a semicolon. The last DSA key set in the file should also end with a semicolon. [0356]
  • Valid entries in a key set are as follows: [0357]
    Keyword Value Explanation
    SSR integer Specifies which SSR level.
    The must be between 442 and
    999. (e.g. SSR=442)
    KEYID string A unique ID to the key set.
    Its string can consist up
    to 17 alphanumeric
    characters (hyphen and
    underscore can also be
    used) (e.g. KEYID=SSR442_DSAID)
    PUBLICKEY hex string DSA public key generated
    from the same P, Q, G
    values in its set. Its hex
    string must be enclosed by
    quotes. Longer string
    continues on the next line.
    (e.g. PUBLICKEY=
    “0123456789ABC”
    “DEF0123456789”)
    PRIVATEKEY hex string DSA private key generated
    from the same P, Q, G
    values in its set. Usage
    similar to PUBLICKEY.
    P hex string Prime number P.
    Q hex string Prime number Q.
    G hex string G value.
  • Each keyword should be followed by ‘=’, and each entry should be separated by a comma. [0358]
  • Although the utility allows PRIVATEKEY in the file FIN to the ADDKEYS request, PRIVATEKEY is not actually used. Thus, you can store PRIVATEKEY there for reference. However, it is recommended that you should keep PRIVATEKEY separately and make sure that no unauthorized users can get access to it. [0359]
  • For ADDKEYS, the request requires FIN to contain at least one DSA key set. Entries required for all DSA key sets in this request are {SSR, KEYID, PUBLICKEY, P, Q, G}. Note that PRIVATEKEY is not a part of the added key set and will be ignored. [0360]
  • For GETKEYS, if FIN is specified, entries required for a DSA key set consist of {SSR, KEYID, P, Q, G}. The utility will generate public/private key pairs and write {SSR, KEYID, PUBLICKEY, PRIVATEKEY, P, Q, G} out to the file DSAKEYS or to the file indicated by FOUT. The resulting file then can be used as FIN to the ADDKEYS request. If FIN is not specified for GETKEYS, KF will be used instead. However, only {SSR, KEYID, PUBLICKEY, PRIVATEKEY} is wriiten out to the file FOUT by the utility. Prime numbers P, Q, G extracted from KF are not included. [0361]
  • Procedural Steps and Usage [0362]
  • 1. If you start from scratch, create a sequential file that contains at least one DSA key set with {SSR, KEYID, P, Q, G} in it. For example, the contents of file MY/PRIMES may include something like these: [0363]
  • % Primes for key set #1 [0364]
  • SSR=999, [0365]
  • KEYID=SSR999-KEYID, [0366]
  • P=“D411A4A0E393F6AAB0F08B14D1845866” “5B3E4DBDCE2544543FE365CF71C86224” “12DB6E7DD02BBE13D88C58D7263E9023” “6AF17AC8A9FE5F249CC81F427FC543F7”, [0367]
  • Q=“B20DB0B11DF0C6624FC1392BA55F77D” “577481E5”, [0368]
  • G=“B3085510021F999049A9E7CD3872CE99” “58186B5007E7ADAF25248B58A3DC4F71” “781D21F2DF89B71747BD54B323BBECC4” “43EC1D3E020DADABBF7822578255C104”; [0369]
  • 2. Run the utility to get a DSA public/private key pair for the key set in MY/PRIMES. A sequential output file with the name MY/KEYSET will be created. [0370]
  • RUN<DSA utility> (“GETKEYS FIN=MY/PRIMES FOUT=MY/KEYSET”) [0371]
  • 3. Use information in MY/KEYSET to create a new DSA keysfile called *SYSTEM/DSAKEYSFILE on the halt/load pack HLPACK: [0372]
  • RUN <DSA utility> (“ADDKEYS FIN=MY/KEYSET KF=*SYSTEM/DSAKEYSFILE ON HLPACK”) [0373]

Claims (12)

What is claimed is:
1. A method, initiated by a source-User, for creating a data file and its verifying signature into a format compatible to two or more different platforms, comprising the steps of:
(a) creating a specialized keysfile (DSAKEYSFILE) to store sets of digital signature information, wherein each set corresponds to a particular software level and each set includes the following data items:
(i) ID string for the set;
(ii) the value of the Software Release Level (SSR);
(iii) three prime numbers designated as P,Q,G used for calculating a signature;
(iv) a proprietary system public key derived from the prime numbers in item (iii) above for the particular SSR indicated in item (ii);
(b) initiating a wrap-packaging action for transforming a first data file, having a first format in a first platform into an industry-standard text stream data format as a data file compatible to a second platform;
(c) executing the said wrap-packaging action by utilizing the data of the file, by utilizing the information stored in the said DSAKEYSFILE, and utilizing the User-supplied private key to develop a simple text file containing both the data and a digital signature in a format acceptable for burning onto an industry-standard Compact Disk.
2. The method of claim 1 wherein step (c) includes the step of:
(c1) executing said wrap-packaging action by utilizing the data of the file, by utilizing the information stored in the said DSAKEYSFILE, and utilizing the User-supplied private key to develop a simple text file containing both the data and a signature in a format acceptable for a protocol transmittable over the Internet.
3. The method of claim 1 wherein step (c) includes the steps of:
(c1) transforming a data file (21) on a first disk (20) in a first platform (14) having a first format into an industry-standard text stream data format as a data file (23) on a second disk (22);
(c2) transferring said industry-standard text stream data file (23) onto a third disk (24) of a second platform (30) as a resultant file (24);
(c3) initiating said second platform (30) to transfer said industry-standard text stream data file (25) onto a CD-Write Module (30 w);
(c4) enabling said CD-Write Module to burn the industry-standard text stream data file (25) onto a Compact Disk (CD,34).
4. The method of claim 3 wherein step (c) includes the step of:
(i) utilizing Internet or E-mail software to transport said data file (25) on said third disk (24) over to an open network (40).
5. A method for wrap-packaging and signaturing specialized file in a first format into a second file in a second format compatible for burning onto an industry-standard Compact Disk, as well as for transmission on the Internet, wherein a primary sourced Operating System (10) of a platform (14) holds a first programmatic routine MCP_FILEWRAPPER and a second programmatic routine MCP_WRAPPER and Write-WRAP routine, said Operating System utilizing a Work Flow Language Compiler (15) and Signature Support Library, and communicating with a secondary platform (30) said method for wrap-packaging and creating a digital signature to verify the validity of the file, comprising the steps of:
(a) initiating, by a User, of a WRAP operation together with a digital signature routine;
(b) utilizing the WRAP statement of the Work Flow Language for making a direct programmatic call to said routine-designated MCP_FILEWRAPPER and passing a private key to indicate the request for a digital signature by utilizing said primary-sourced Operating System (MCP 10) to initiate a specialized routine designated MCP_FILEWRAPPER;
(c) obtaining digital signature information from active DSAKEYSFILE in said Signature Support Library based on the particular Software Release Level of the Operating System;
(d) developing a link to said SIGNATURESUPPORT library in order to gain access to its DSASIGN routine;
(e) calling the DSASIGN routine of the said SIGNATURESUPPORT library in order to digitally sign the ID “source company name”;
(f) calling said MCP_WRAPPER routine in order to wrap-package a data file from a first format to a second format compatible for the Internet and compatible for burning into an industry-standard CD-ROM;
(g) calling said WRITE_WRAP routine in order to invoke the DSASIGN ROUTINE to develop a digital signature for the wrapped file;
(h) developing the said wrapped file together with its digital signature as a resultant file which can later be used in subsequent operations to verify the integrity of the wrapped file.
6. The method of claim 5 which includes:
(i) placing said wrapped file with signature on a Compact Disk.
7. The method of claim 5 which includes the step of:
(j) transmitting said wrapped file with signature over an open network.
8. A system, available to a client-user, for converting a specialized protocol data file in a first platform into a standard protocol format usable for the Internet and other different platforms and providing a digital signature for verification of the integrity of the converted data file, said system comprising:
(a) a first platform (14) which uses a specialized protocol for a data file (MY/FILE,21) stored on a first storage means (Disk A,20) of said first platform (14);
(b) program means (36) to transform such specialized protocol data file (MY/FILE,21) into a standard text stream data file (MY/NEW/FILE,23);
(c) second shared storage means (22) for holding said text stream data file (MY/NEW/FILE,23) transferred by said first platform (14) from said storage means (Disk A,20);
(d) a second platform (30) connected to said first platform and said second shared storage means (Disk B,22) for storage of said standard text stream data file (C:\MY\NEW\FILE,25) on a third storage means (Disk C,24);
(e) software means (30 y) for transferring said standard text stream data file (25) onto to an open network 40;
(f) means for creating a digital signature which reflects the integrity of said wrapped data file (C:\MY\NEW\FILE,25).
9. The system of claim 8 which includes:
(g) A CD Writer package unit (30 w) for activating a Compact Disk write module (32);
(h) said CD Write module (32) for burning said text stream data file (25) containing both data and digital signature onto a compact disk (34).
10. The system of claim 9 which includes:
(i) client-user terminal means for initiating said Compact Disk Write package unit (30 w) to burn said data file (25) onto said compact disk as a standard text stream data file with a digital signature.
11. A system initiated by a client-user for digitally signaturing a wrapped file which has just been converted from a first specialized format into a second format compatible with the file transfer protocol of the Internet, said system comprising:
(a) operator terminal means for initiating a first platform and its operating system which operates on a specialized first format protocol;
(b) initiating an MCP_FILEWRAPPER routine to access digital signal algorithm parameters and to access a digital signal algorithm signature routine in a Signature Support Library;
(c) calling an MCP_WRAPPER routine to institute a wrapping action to convert said data file from a first format to a second text file of Internet-compatible format;
(d) calling a WRITE_WRAP program, which in turn calls the digital signal algorithm to sign the converted data and also to generate two large integers, R and S as a signature to be added to the end of the file;
(e) means to constitute an output resultant file which is now a wrapped file with a digital signature compatible for transfer on the Internet with file transfer protocol.
12. A system for converting specialized first format data files into second format protocol data files compatible for Internet transmission and each of which data files is provided with a digital signature for verification of the file's integrity, said system comprising:
(a) means for creating a specialized keysfile (DSAKEYSFILE) which holds a series of digital signature information sets;
(b) means to institute a wrapping procedure for transforming said specialized first format data file into a text stream data file suitable for the Internet said wrapping procedure incorporating a set of digital signature parameters from said DSAKEYSFILE, along with a digital signature private key in order to create a digitally signatured file which includes the converted data plus a digital signature which later can be used to verify the integrity of said converted data file.
US09/124,557 1998-07-29 1998-07-29 Digital signaturing method and system for packaging specialized native files for open network transport and for burning onto CD-ROM Expired - Lifetime US6415385B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/124,557 US6415385B1 (en) 1998-07-29 1998-07-29 Digital signaturing method and system for packaging specialized native files for open network transport and for burning onto CD-ROM

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/124,557 US6415385B1 (en) 1998-07-29 1998-07-29 Digital signaturing method and system for packaging specialized native files for open network transport and for burning onto CD-ROM

Publications (2)

Publication Number Publication Date
US20020062439A1 true US20020062439A1 (en) 2002-05-23
US6415385B1 US6415385B1 (en) 2002-07-02

Family

ID=22415562

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/124,557 Expired - Lifetime US6415385B1 (en) 1998-07-29 1998-07-29 Digital signaturing method and system for packaging specialized native files for open network transport and for burning onto CD-ROM

Country Status (1)

Country Link
US (1) US6415385B1 (en)

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020059438A1 (en) * 2000-01-21 2002-05-16 Drew Sarkisian Wireless communications invisible proxy and hooking systems and methods
US20040006701A1 (en) * 2002-04-13 2004-01-08 Advanced Decisions Inc. Method and apparatus for authentication of recorded audio
US20040019784A1 (en) * 2000-02-14 2004-01-29 Cisco Technology, Inc., A California Corporation File system for nonvolatile memory
US20040025034A1 (en) * 2002-08-02 2004-02-05 Alessi Mark A. System for publishing content on a portable digital storage medium
US20050060348A1 (en) * 2003-09-15 2005-03-17 Coyne Patrick J. Project management system, method, and network, employing ODBC-compliant database and SQL and cold fusion servers
US20050234573A1 (en) * 2001-09-27 2005-10-20 Millikan Thomas N Method and apparatus for providing a playlist in a compact disc player
US20060143713A1 (en) * 2004-12-28 2006-06-29 International Business Machines Corporation Rapid virus scan using file signature created during file write
US20060185017A1 (en) * 2004-12-28 2006-08-17 Lenovo (Singapore) Pte. Ltd. Execution validation using header containing validation data
US20060291700A1 (en) * 2005-06-08 2006-12-28 Ogram Mark E Internet signature verification system
US20070277037A1 (en) * 2001-09-06 2007-11-29 Randy Langer Software component authentication via encrypted embedded self-signatures
US20090208000A1 (en) * 2008-02-19 2009-08-20 Fujitsu Limited Signature management method and signature management device
US20130339310A1 (en) * 2012-06-13 2013-12-19 Commvault Systems, Inc. Restore using a client side signature repository in a networked storage system
US9619480B2 (en) 2010-09-30 2017-04-11 Commvault Systems, Inc. Content aligned block-based deduplication
US9633033B2 (en) 2013-01-11 2017-04-25 Commvault Systems, Inc. High availability distributed deduplicated storage system
US9633056B2 (en) 2014-03-17 2017-04-25 Commvault Systems, Inc. Maintaining a deduplication database
US9639289B2 (en) 2010-09-30 2017-05-02 Commvault Systems, Inc. Systems and methods for retaining and using data block signatures in data protection operations
US9898478B2 (en) 2010-12-14 2018-02-20 Commvault Systems, Inc. Distributed deduplicated storage system
US9934238B2 (en) 2014-10-29 2018-04-03 Commvault Systems, Inc. Accessing a file system using tiered deduplication
US10061663B2 (en) 2015-12-30 2018-08-28 Commvault Systems, Inc. Rebuilding deduplication data in a distributed deduplication data storage system
US10191816B2 (en) 2010-12-14 2019-01-29 Commvault Systems, Inc. Client-side repository in a networked deduplicated storage system
US10339106B2 (en) 2015-04-09 2019-07-02 Commvault Systems, Inc. Highly reusable deduplication database after disaster recovery
US10380072B2 (en) 2014-03-17 2019-08-13 Commvault Systems, Inc. Managing deletions from a deduplication database
US10481825B2 (en) 2015-05-26 2019-11-19 Commvault Systems, Inc. Replication using deduplicated secondary copy data
US10540327B2 (en) 2009-07-08 2020-01-21 Commvault Systems, Inc. Synchronized data deduplication
US10795577B2 (en) 2016-05-16 2020-10-06 Commvault Systems, Inc. De-duplication of client-side data cache for virtual disks
US10831460B2 (en) * 2012-12-21 2020-11-10 Bmc Software, Inc. System and method for extending the functionality of an application
US10846024B2 (en) 2016-05-16 2020-11-24 Commvault Systems, Inc. Global de-duplication of virtual disks in a storage platform
WO2021014326A3 (en) * 2019-07-19 2021-04-22 JFrog Ltd. Software release verification
US11010258B2 (en) 2018-11-27 2021-05-18 Commvault Systems, Inc. Generating backup copies through interoperability between components of a data storage management system and appliances for data storage and deduplication
US11016859B2 (en) 2008-06-24 2021-05-25 Commvault Systems, Inc. De-duplication systems and methods for application-specific data
US11106554B2 (en) 2019-04-30 2021-08-31 JFrog, Ltd. Active-active environment control
US11249858B2 (en) 2014-08-06 2022-02-15 Commvault Systems, Inc. Point-in-time backups of a production application made accessible over fibre channel and/or ISCSI as data sources to a remote application by representing the backups as pseudo-disks operating apart from the production application and its host
US11294768B2 (en) 2017-06-14 2022-04-05 Commvault Systems, Inc. Live browsing of backed up data residing on cloned disks
US11314424B2 (en) 2015-07-22 2022-04-26 Commvault Systems, Inc. Restore for block-level backups
US11321195B2 (en) 2017-02-27 2022-05-03 Commvault Systems, Inc. Hypervisor-independent reference copies of virtual machine payload data based on block-level pseudo-mount
US11328096B2 (en) 2019-04-30 2022-05-10 JFrog, Ltd. Data bundle generation and deployment
US11340894B2 (en) 2019-04-30 2022-05-24 JFrog, Ltd. Data file partition and replication
US11416341B2 (en) 2014-08-06 2022-08-16 Commvault Systems, Inc. Systems and methods to reduce application downtime during a restore operation using a pseudo-storage device
US11436038B2 (en) 2016-03-09 2022-09-06 Commvault Systems, Inc. Hypervisor-independent block-level live browse for access to backed up virtual machine (VM) data and hypervisor-free file-level recovery (block- level pseudo-mount)
US11442896B2 (en) 2019-12-04 2022-09-13 Commvault Systems, Inc. Systems and methods for optimizing restoration of deduplicated data stored in cloud-based storage resources
US11463264B2 (en) 2019-05-08 2022-10-04 Commvault Systems, Inc. Use of data block signatures for monitoring in an information management system
US11687424B2 (en) 2020-05-28 2023-06-27 Commvault Systems, Inc. Automated media agent state management
US11695829B2 (en) 2020-01-09 2023-07-04 JFrog Ltd. Peer-to-peer (P2P) downloading
US11698727B2 (en) 2018-12-14 2023-07-11 Commvault Systems, Inc. Performing secondary copy operations based on deduplication performance
US11829251B2 (en) 2019-04-10 2023-11-28 Commvault Systems, Inc. Restore using deduplicated secondary copy data
US11860680B2 (en) 2020-11-24 2024-01-02 JFrog Ltd. Software pipeline and release validation
US11886390B2 (en) 2019-04-30 2024-01-30 JFrog Ltd. Data file partition and replication

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6629150B1 (en) * 1999-06-18 2003-09-30 Intel Corporation Platform and method for creating and using a digital container
US6834350B1 (en) * 1999-07-06 2004-12-21 Watchguard Technologies, Inc. Secure and differentiated delivery of network security information
US7243236B1 (en) * 1999-07-29 2007-07-10 Intertrust Technologies Corp. Systems and methods for using cryptography to protect secure and insecure computing environments
AU2003216472A1 (en) * 2002-03-01 2003-09-16 Green Border Technologies Method and system for assured denotation of application semantics
EP1343286A1 (en) * 2002-03-04 2003-09-10 BRITISH TELECOMMUNICATIONS public limited company Lightweight authentication of information
US7401221B2 (en) * 2002-09-04 2008-07-15 Microsoft Corporation Advanced stream format (ASF) data stream header object protection
CA2510647A1 (en) * 2005-06-23 2006-12-23 Cognos Incorporated Signing of web request
US8386790B2 (en) * 2010-02-25 2013-02-26 GM Global Technology Operations LLC Method of using ECDSA with winternitz one time signature

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5675780A (en) * 1993-06-01 1997-10-07 Cd-Comm Systems, Inc. Method and apparatus for storing data in database form to a compact disc using a script file to describe the input format of data
EP0717337B1 (en) * 1994-12-13 2001-08-01 International Business Machines Corporation Method and system for the secured distribution of programs
US5870756A (en) * 1996-04-26 1999-02-09 Fujitsu Limited Interchangeable storage medium containing program for processing data files thereupon to match a data file format to a computer system
US6021491A (en) * 1996-11-27 2000-02-01 Sun Microsystems, Inc. Digital signatures for data streams and data archives
ATE223595T1 (en) * 1998-01-23 2002-09-15 Emc Corp ENCAPSULATION, DATA REPRESENTATION AND TRANSMISSION OF CONTENT ADDRESSABLE DATA

Cited By (93)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020059438A1 (en) * 2000-01-21 2002-05-16 Drew Sarkisian Wireless communications invisible proxy and hooking systems and methods
US7512694B2 (en) * 2000-01-21 2009-03-31 Bytemobile, Inc. Wireless communications invisible proxy and hooking systems and methods
US20040019784A1 (en) * 2000-02-14 2004-01-29 Cisco Technology, Inc., A California Corporation File system for nonvolatile memory
US7711696B2 (en) * 2000-02-14 2010-05-04 Cisco Technology, Inc. File system for nonvolatile memory
US20070277037A1 (en) * 2001-09-06 2007-11-29 Randy Langer Software component authentication via encrypted embedded self-signatures
US20050234573A1 (en) * 2001-09-27 2005-10-20 Millikan Thomas N Method and apparatus for providing a playlist in a compact disc player
US20040006701A1 (en) * 2002-04-13 2004-01-08 Advanced Decisions Inc. Method and apparatus for authentication of recorded audio
US7882368B2 (en) * 2002-08-02 2011-02-01 Disney Enterprises, Inc. System for publishing content on a portable digital storage medium
US7545940B2 (en) * 2002-08-02 2009-06-09 Disney Enterprises, Inc. System for publishing content on a portable digital storage medium
US20040025034A1 (en) * 2002-08-02 2004-02-05 Alessi Mark A. System for publishing content on a portable digital storage medium
US20090232305A1 (en) * 2002-08-02 2009-09-17 Alessi Mark A System for Publishing Content on a Portable Digital Storage Medium
US20050060348A1 (en) * 2003-09-15 2005-03-17 Coyne Patrick J. Project management system, method, and network, employing ODBC-compliant database and SQL and cold fusion servers
US7711691B2 (en) * 2003-09-15 2010-05-04 Coyne Patrick J Project management system, method, and network, employing ODBC-compliant database and SQL servers
US20060143713A1 (en) * 2004-12-28 2006-06-29 International Business Machines Corporation Rapid virus scan using file signature created during file write
US7752667B2 (en) * 2004-12-28 2010-07-06 Lenovo (Singapore) Pte Ltd. Rapid virus scan using file signature created during file write
US7805765B2 (en) 2004-12-28 2010-09-28 Lenovo (Singapore) Pte Ltd. Execution validation using header containing validation data
US20060185017A1 (en) * 2004-12-28 2006-08-17 Lenovo (Singapore) Pte. Ltd. Execution validation using header containing validation data
US20060291700A1 (en) * 2005-06-08 2006-12-28 Ogram Mark E Internet signature verification system
US20090208000A1 (en) * 2008-02-19 2009-08-20 Fujitsu Limited Signature management method and signature management device
US8909921B2 (en) * 2008-02-19 2014-12-09 Fujitsu Limited Signature management method and signature management device
US11016859B2 (en) 2008-06-24 2021-05-25 Commvault Systems, Inc. De-duplication systems and methods for application-specific data
US10540327B2 (en) 2009-07-08 2020-01-21 Commvault Systems, Inc. Synchronized data deduplication
US11288235B2 (en) 2009-07-08 2022-03-29 Commvault Systems, Inc. Synchronized data deduplication
US9639289B2 (en) 2010-09-30 2017-05-02 Commvault Systems, Inc. Systems and methods for retaining and using data block signatures in data protection operations
US9898225B2 (en) 2010-09-30 2018-02-20 Commvault Systems, Inc. Content aligned block-based deduplication
US9619480B2 (en) 2010-09-30 2017-04-11 Commvault Systems, Inc. Content aligned block-based deduplication
US10126973B2 (en) 2010-09-30 2018-11-13 Commvault Systems, Inc. Systems and methods for retaining and using data block signatures in data protection operations
US10191816B2 (en) 2010-12-14 2019-01-29 Commvault Systems, Inc. Client-side repository in a networked deduplicated storage system
US9898478B2 (en) 2010-12-14 2018-02-20 Commvault Systems, Inc. Distributed deduplicated storage system
US11169888B2 (en) 2010-12-14 2021-11-09 Commvault Systems, Inc. Client-side repository in a networked deduplicated storage system
US11422976B2 (en) 2010-12-14 2022-08-23 Commvault Systems, Inc. Distributed deduplicated storage system
US10740295B2 (en) 2010-12-14 2020-08-11 Commvault Systems, Inc. Distributed deduplicated storage system
US20130339310A1 (en) * 2012-06-13 2013-12-19 Commvault Systems, Inc. Restore using a client side signature repository in a networked storage system
US9858156B2 (en) 2012-06-13 2018-01-02 Commvault Systems, Inc. Dedicated client-side signature generator in a networked storage system
US10176053B2 (en) 2012-06-13 2019-01-08 Commvault Systems, Inc. Collaborative restore in a networked storage system
US10956275B2 (en) 2012-06-13 2021-03-23 Commvault Systems, Inc. Collaborative restore in a networked storage system
US10387269B2 (en) 2012-06-13 2019-08-20 Commvault Systems, Inc. Dedicated client-side signature generator in a networked storage system
US10831460B2 (en) * 2012-12-21 2020-11-10 Bmc Software, Inc. System and method for extending the functionality of an application
US9633033B2 (en) 2013-01-11 2017-04-25 Commvault Systems, Inc. High availability distributed deduplicated storage system
US9665591B2 (en) 2013-01-11 2017-05-30 Commvault Systems, Inc. High availability distributed deduplicated storage system
US10229133B2 (en) 2013-01-11 2019-03-12 Commvault Systems, Inc. High availability distributed deduplicated storage system
US11157450B2 (en) 2013-01-11 2021-10-26 Commvault Systems, Inc. High availability distributed deduplicated storage system
US9633056B2 (en) 2014-03-17 2017-04-25 Commvault Systems, Inc. Maintaining a deduplication database
US10445293B2 (en) 2014-03-17 2019-10-15 Commvault Systems, Inc. Managing deletions from a deduplication database
US11119984B2 (en) 2014-03-17 2021-09-14 Commvault Systems, Inc. Managing deletions from a deduplication database
US11188504B2 (en) 2014-03-17 2021-11-30 Commvault Systems, Inc. Managing deletions from a deduplication database
US10380072B2 (en) 2014-03-17 2019-08-13 Commvault Systems, Inc. Managing deletions from a deduplication database
US11416341B2 (en) 2014-08-06 2022-08-16 Commvault Systems, Inc. Systems and methods to reduce application downtime during a restore operation using a pseudo-storage device
US11249858B2 (en) 2014-08-06 2022-02-15 Commvault Systems, Inc. Point-in-time backups of a production application made accessible over fibre channel and/or ISCSI as data sources to a remote application by representing the backups as pseudo-disks operating apart from the production application and its host
US11921675B2 (en) 2014-10-29 2024-03-05 Commvault Systems, Inc. Accessing a file system using tiered deduplication
US9934238B2 (en) 2014-10-29 2018-04-03 Commvault Systems, Inc. Accessing a file system using tiered deduplication
US11113246B2 (en) 2014-10-29 2021-09-07 Commvault Systems, Inc. Accessing a file system using tiered deduplication
US10474638B2 (en) 2014-10-29 2019-11-12 Commvault Systems, Inc. Accessing a file system using tiered deduplication
US10339106B2 (en) 2015-04-09 2019-07-02 Commvault Systems, Inc. Highly reusable deduplication database after disaster recovery
US11301420B2 (en) 2015-04-09 2022-04-12 Commvault Systems, Inc. Highly reusable deduplication database after disaster recovery
US10481826B2 (en) 2015-05-26 2019-11-19 Commvault Systems, Inc. Replication using deduplicated secondary copy data
US10481824B2 (en) 2015-05-26 2019-11-19 Commvault Systems, Inc. Replication using deduplicated secondary copy data
US10481825B2 (en) 2015-05-26 2019-11-19 Commvault Systems, Inc. Replication using deduplicated secondary copy data
US11733877B2 (en) 2015-07-22 2023-08-22 Commvault Systems, Inc. Restore for block-level backups
US11314424B2 (en) 2015-07-22 2022-04-26 Commvault Systems, Inc. Restore for block-level backups
US10877856B2 (en) 2015-12-30 2020-12-29 Commvault Systems, Inc. System for redirecting requests after a secondary storage computing device failure
US10255143B2 (en) 2015-12-30 2019-04-09 Commvault Systems, Inc. Deduplication replication in a distributed deduplication data storage system
US10061663B2 (en) 2015-12-30 2018-08-28 Commvault Systems, Inc. Rebuilding deduplication data in a distributed deduplication data storage system
US10592357B2 (en) 2015-12-30 2020-03-17 Commvault Systems, Inc. Distributed file system in a distributed deduplication data storage system
US10310953B2 (en) 2015-12-30 2019-06-04 Commvault Systems, Inc. System for redirecting requests after a secondary storage computing device failure
US10956286B2 (en) 2015-12-30 2021-03-23 Commvault Systems, Inc. Deduplication replication in a distributed deduplication data storage system
US11436038B2 (en) 2016-03-09 2022-09-06 Commvault Systems, Inc. Hypervisor-independent block-level live browse for access to backed up virtual machine (VM) data and hypervisor-free file-level recovery (block- level pseudo-mount)
US11733930B2 (en) 2016-05-16 2023-08-22 Commvault Systems, Inc. Global de-duplication of virtual disks in a storage platform
US11314458B2 (en) 2016-05-16 2022-04-26 Commvault Systems, Inc. Global de-duplication of virtual disks in a storage platform
US10846024B2 (en) 2016-05-16 2020-11-24 Commvault Systems, Inc. Global de-duplication of virtual disks in a storage platform
US10795577B2 (en) 2016-05-16 2020-10-06 Commvault Systems, Inc. De-duplication of client-side data cache for virtual disks
US11321195B2 (en) 2017-02-27 2022-05-03 Commvault Systems, Inc. Hypervisor-independent reference copies of virtual machine payload data based on block-level pseudo-mount
US11294768B2 (en) 2017-06-14 2022-04-05 Commvault Systems, Inc. Live browsing of backed up data residing on cloned disks
US11681587B2 (en) 2018-11-27 2023-06-20 Commvault Systems, Inc. Generating copies through interoperability between a data storage management system and appliances for data storage and deduplication
US11010258B2 (en) 2018-11-27 2021-05-18 Commvault Systems, Inc. Generating backup copies through interoperability between components of a data storage management system and appliances for data storage and deduplication
US11698727B2 (en) 2018-12-14 2023-07-11 Commvault Systems, Inc. Performing secondary copy operations based on deduplication performance
US11829251B2 (en) 2019-04-10 2023-11-28 Commvault Systems, Inc. Restore using deduplicated secondary copy data
US11886390B2 (en) 2019-04-30 2024-01-30 JFrog Ltd. Data file partition and replication
US11709744B2 (en) 2019-04-30 2023-07-25 JFrog Ltd. Active-active environment control
US11921902B2 (en) 2019-04-30 2024-03-05 JFrog Ltd. Data bundle generation and deployment
US11340894B2 (en) 2019-04-30 2022-05-24 JFrog, Ltd. Data file partition and replication
US11328096B2 (en) 2019-04-30 2022-05-10 JFrog, Ltd. Data bundle generation and deployment
US11106554B2 (en) 2019-04-30 2021-08-31 JFrog, Ltd. Active-active environment control
US11386233B2 (en) 2019-04-30 2022-07-12 JFrog, Ltd. Data bundle generation and deployment
US11726777B2 (en) 2019-04-30 2023-08-15 JFrog, Ltd. Data file partition and replication
US11463264B2 (en) 2019-05-08 2022-10-04 Commvault Systems, Inc. Use of data block signatures for monitoring in an information management system
WO2021014326A3 (en) * 2019-07-19 2021-04-22 JFrog Ltd. Software release verification
US11502851B2 (en) 2019-07-19 2022-11-15 JFrog Ltd. Software release verification
US11909890B2 (en) 2019-07-19 2024-02-20 JFrog Ltd. Software release verification
US11442896B2 (en) 2019-12-04 2022-09-13 Commvault Systems, Inc. Systems and methods for optimizing restoration of deduplicated data stored in cloud-based storage resources
US11695829B2 (en) 2020-01-09 2023-07-04 JFrog Ltd. Peer-to-peer (P2P) downloading
US11687424B2 (en) 2020-05-28 2023-06-27 Commvault Systems, Inc. Automated media agent state management
US11860680B2 (en) 2020-11-24 2024-01-02 JFrog Ltd. Software pipeline and release validation

Also Published As

Publication number Publication date
US6415385B1 (en) 2002-07-02

Similar Documents

Publication Publication Date Title
US6415385B1 (en) Digital signaturing method and system for packaging specialized native files for open network transport and for burning onto CD-ROM
US5983295A (en) Method and system for wrapping single files for burning into compact disk
US6357006B1 (en) Digital signaturing method and system for re-creating specialized native files from single wrapped files imported from an open network or residing on a CD-ROM
US6088747A (en) System for reformatting and burning of data files having a first format onto a compact disk to be utilized in a network using different format
US6282535B1 (en) Digital signaturing method and system for wrapping multiple files into a container for open network transport and for burning onto CD-ROM.
US6079047A (en) Unwrapping system and method for multiple files of a container
US11134068B2 (en) Method and apparatus for providing enhanced streaming content delivery with multi-archive support using secure download manager and content-indifferent decoding
US8261066B2 (en) System and method for secure storage, transfer and retrieval of content addressable information
AU717615B2 (en) System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources
US7093132B2 (en) Method and apparatus for protecting ongoing system integrity of a software product using digital signatures
US7424606B2 (en) System and method for authenticating an operating system
US6067575A (en) System and method for generating trusted, architecture specific, compiled versions of architecture neutral programs
RU2762141C2 (en) Abstract enclave identification
US7062650B2 (en) System and method for verifying integrity of system with multiple components
US8078880B2 (en) Portable personal identity information
US20050273600A1 (en) Method and system for file data access within a secure environment
US6353887B1 (en) Digital signaturing method and system for re-creating specialized native files out of a container imported from an open network or residing on a CD-ROM
US8205087B2 (en) Tool for digitally signing multiple documents
KR19980042805A (en) Methods, devices and products to verify that the data in the data file is genuine
KR101411181B1 (en) Schema packaging, distribution and availability
CN110555293A (en) Method, apparatus, electronic device and computer readable medium for protecting data
US20040003244A1 (en) Multiplexing a secure counter to implement second level secure counters
US20070250540A1 (en) A Computer System with File Attribute Extension
GB2389929A (en) Computer Encryption Systems
Privileges Privileges, Permissions, & File I/O

Legal Events

Date Code Title Description
AS Assignment

Owner name: UNISYS CORPORATION, PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PHAM, THIEN HUU;COTUGNO, LAUREN ANN;REEL/FRAME:009353/0773

Effective date: 19980728

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERA

Free format text: PATENT SECURITY AGREEMENT (PRIORITY LIEN);ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:023355/0001

Effective date: 20090731

AS Assignment

Owner name: DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERA

Free format text: PATENT SECURITY AGREEMENT (JUNIOR LIEN);ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:023364/0098

Effective date: 20090731

FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: GENERAL ELECTRIC CAPITAL CORPORATION, AS AGENT, IL

Free format text: SECURITY AGREEMENT;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:026509/0001

Effective date: 20110623

AS Assignment

Owner name: UNISYS CORPORATION, PENNSYLVANIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY;REEL/FRAME:030004/0619

Effective date: 20121127

AS Assignment

Owner name: UNISYS CORPORATION, PENNSYLVANIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEUTSCHE BANK TRUST COMPANY AMERICAS, AS COLLATERAL TRUSTEE;REEL/FRAME:030082/0545

Effective date: 20121127

FPAY Fee payment

Year of fee payment: 12

AS Assignment

Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATE

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:042354/0001

Effective date: 20170417

Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL TRUSTEE, NEW YORK

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:042354/0001

Effective date: 20170417

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, ILLINOIS

Free format text: SECURITY INTEREST;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:044144/0081

Effective date: 20171005

Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT

Free format text: SECURITY INTEREST;ASSIGNOR:UNISYS CORPORATION;REEL/FRAME:044144/0081

Effective date: 20171005

AS Assignment

Owner name: UNISYS CORPORATION, PENNSYLVANIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION (SUCCESSOR TO GENERAL ELECTRIC CAPITAL CORPORATION);REEL/FRAME:044416/0358

Effective date: 20171005

AS Assignment

Owner name: UNISYS CORPORATION, PENNSYLVANIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:054231/0496

Effective date: 20200319