A system providing methodology for securing interfaces of executable files is described. In one embodiment, for example, a method is described for securing a program comprised of a plurality of interoperable components, the method comprises steps of: extracting information about a function of a first component of the program that is callable by at least one other component of the program; securing the extracted information; in response to an attempt by a second component of the program to invoke the function of the first component, validating authenticity of the second component; and if the second component is validated, providing access to the function of the first component using the secured extracted information.

 
Web www.patentalert.com

< System and method for implementing click-through for browser executed software including ad proxy and proxy cookie caching

> Graphical user interface and background search methodology for creating references between software components

~ 00426