File origin determination
First Claim
Patent Images
1. A file validation method comprising:
- requesting, by a computer processor of a computing system executing an agent in response to a request, a detachable fetch software module;
retrieving, by said computer processor, said detachable fetch software module;
downloading, by said computer processor executing said detachable fetch software module, an artifact file;
generating, by said computer processor executing said detachable fetch software module, a digital fingerprint associated with securing said artifact file; and
generating, by said computer processor, metadata describing identification information identifying a requesting user of said artifact file, wherein said metadata comprises attributes including an IP address for said computing system and an identifier for a network receiving said artifact file;
encrypting, by said computer processor based on results of said executing, said metadata resulting in encrypted metadata;
generating, by said computer processor, a log indicating that said encrypted metadata has been successfully generated;
generating, by said computer processor, a modified artifact file comprising said encrypted metadata combined with said artifact file and said log;
validating, by said computer processor, that said modified artifact file is in compliance with a licensing agreement for execution of said artifact file resulting in the generation of a portable binary for execution; and
generating, by said computer processor, an encrypted package comprising said modified artifact file and a portion of an encryption key.
2 Assignments
0 Petitions
Accused Products
Abstract
A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
37 Citations
20 Claims
-
1. A file validation method comprising:
-
requesting, by a computer processor of a computing system executing an agent in response to a request, a detachable fetch software module; retrieving, by said computer processor, said detachable fetch software module; downloading, by said computer processor executing said detachable fetch software module, an artifact file; generating, by said computer processor executing said detachable fetch software module, a digital fingerprint associated with securing said artifact file; and generating, by said computer processor, metadata describing identification information identifying a requesting user of said artifact file, wherein said metadata comprises attributes including an IP address for said computing system and an identifier for a network receiving said artifact file; encrypting, by said computer processor based on results of said executing, said metadata resulting in encrypted metadata; generating, by said computer processor, a log indicating that said encrypted metadata has been successfully generated; generating, by said computer processor, a modified artifact file comprising said encrypted metadata combined with said artifact file and said log; validating, by said computer processor, that said modified artifact file is in compliance with a licensing agreement for execution of said artifact file resulting in the generation of a portable binary for execution; and generating, by said computer processor, an encrypted package comprising said modified artifact file and a portion of an encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product, comprising a computer readable hardware storage device storing a computer readable program code, said computer readable program code comprising an algorithm that when executed by a computer processor of a computing system implements a file validation method, said method comprising:
-
requesting, by said computer processor executing an agent in response to a request, a detachable fetch software module; retrieving, by said computer processor, said detachable fetch software module; downloading, by said computer processor executing said detachable fetch software module, an artifact file; generating, by said computer processor executing said detachable fetch software module, a digital fingerprint associated with securing said artifact file; and generating, by said computer processor, metadata describing identification information identifying a requesting user of said artifact file, wherein said metadata comprises attributes including an IP address for said computing system and an identifier for a network receiving said artifact file; encrypting, by said computer processor based on results of said executing, said metadata resulting in encrypted metadata; generating, by said computer processor, a log indicating that said encrypted metadata has been successfully generated; generating, by said computer processor, a modified artifact file comprising said encrypted metadata combined with said artifact file and said log; validating, by said computer processor, that said modified artifact file is in compliance with a licensing agreement for execution of said artifact file resulting in the generation of a portable binary for execution; and generating, by said computer processor, an encrypted package comprising said modified artifact file and a portion of an encryption key. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computing system comprising a computer processor coupled to a computer-readable memory unit, said memory unit comprising instructions that when executed by the computer processor implements a file validation method comprising:
-
requesting, by said computer processor executing an agent in response to a request, a detachable fetch software module; retrieving, by said computer processor, said detachable fetch software module; downloading, by said computer processor executing said detachable fetch software module, an artifact file; generating, by said computer processor executing said detachable fetch software module, a digital fingerprint associated with securing said artifact file; and generating, by said computer processor, metadata describing identification information identifying a requesting user of said artifact file, wherein said metadata comprises attributes including an IP address for said computing system and an identifier for a network receiving said artifact file; encrypting, by said computer processor based on results of said executing, said metadata resulting in encrypted metadata; generating, by said computer processor, a log indicating that said encrypted metadata has been successfully generated; generating, by said computer processor, a modified artifact file comprising said encrypted metadata combined with said artifact file and said log; validating, by said computer processor, that said modified artifact file is in compliance with a licensing agreement for execution of said artifact file resulting in the generation of a portable binary for execution; and generating, by said computer processor, an encrypted package comprising said modified artifact file and a portion of an encryption key.
-
Specification