File origin determination
First Claim
Patent Images
1. A file validation method comprising:
- retrieving, by a computer processor of a computing system, via a fetch component external to said computing system, from an authoritative source system, an artifact file;
generating, by said computer processor, metadata describing identification information identifying a requesting user of said artifact file, wherein said metadata comprises attributes including an IP address for said computing system and an identifier for a network receiving said artifact file;
encrypting, by said processor, said metadata resulting in encrypted metadata;
generating, by said processor, a log indicating that said encrypted metadata has been successfully generated;
generating, by said computer processor, a modified artifact file comprising said encrypted metadata combined with said artifact file and said log;
validating, by said processor, that said modified artifact file is in compliance with a licensing agreement for execution of said artifact file resulting in the generation of a portable binary for execution;
generating, by said computer processor, an encryption key comprising a first portion and a second portion;
storing, by said computer processor, said first portion of said key within a central key store database; and
generating, by said computer processor, an encrypted package comprising said modified artifact file and said second portion of said key.
2 Assignments
0 Petitions
Accused Products
Abstract
A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
-
Citations
18 Claims
-
1. A file validation method comprising:
-
retrieving, by a computer processor of a computing system, via a fetch component external to said computing system, from an authoritative source system, an artifact file; generating, by said computer processor, metadata describing identification information identifying a requesting user of said artifact file, wherein said metadata comprises attributes including an IP address for said computing system and an identifier for a network receiving said artifact file; encrypting, by said processor, said metadata resulting in encrypted metadata; generating, by said processor, a log indicating that said encrypted metadata has been successfully generated; generating, by said computer processor, a modified artifact file comprising said encrypted metadata combined with said artifact file and said log; validating, by said processor, that said modified artifact file is in compliance with a licensing agreement for execution of said artifact file resulting in the generation of a portable binary for execution; generating, by said computer processor, an encryption key comprising a first portion and a second portion; storing, by said computer processor, said first portion of said key within a central key store database; and generating, by said computer processor, an encrypted package comprising said modified artifact file and said second portion of said key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product for file validation executed by at least one processor of a computing system, the computer program product comprising:
-
one or more computer-readable, hardware storage devices and program instructions, stored on at least one of the one or more storage devices, to; retrieve, via a fetch component external to said computing system, from an authoritative source system, an artifact file; generate metadata describing identification information identifying a requesting user of said artifact file, wherein said metadata comprises attributes including an IP address for said computing system and an identifier for a network receiving said artifact file; encrypt said metadata resulting in encrypted metadata; generate a log indicating that said encrypted metadata has been successfully generated; generate a modified artifact file comprising said encrypted metadata combined with said artifact file and said log; validate that said modified artifact file is in compliance with a licensing agreement for execution of said artifact file resulting in the generation of a portable binary for execution; generate an encryption key comprising a first portion and a second portion; store said first portion of said key within a central key store database; and generate an encrypted package comprising said modified artifact file and said second portion of said key. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
Specification