Enforcing trusted application settings for shared code libraries
First Claim
1. A method of restricting access to a shared library within a computer security system, the method comprising:
- storing, by a security database for each of a plurality of trusted applications, a trusted application profile identifying a set of application constraints each associated with an application property that must be satisfied before an application can access a shared library;
detecting, by an administrative server, an attempt from a customer application to access the shared library;
responsive to the attempt, generating, by the administrative server, a profile of the customer application, the customer application profile representative of a set of properties of the customer application, each property of the set of properties represented by the customer application profile corresponding to a constraint identified by a trusted application profile;
retrieving, by the administrative server from the security database, a profile for each trusted application of a set of trusted applications;
comparing the customer application profile to each retrieved trusted application profile by comparing each property of the customer application represented by the customer application profile to the corresponding constraint identified by the retrieved trusted application profile;
responsive to a successful comparison between the customer application profile and at least one trusted application profile, verifying, by the administrative server, that the customer application can access the shared library;
responsive to verifying that the customer application can access the shared library, allowing, by the administrative server, the attempt from the customer application to access the shared library; and
responsive to not verifying that the customer application can access the shared library, denying, by the administrative server, the attempt from the customer application to access the shared library.
1 Assignment
0 Petitions
Accused Products
Abstract
Access to a shared library API is restricted for a customer application by a security system. A profile for each of a plurality of trusted applications is generated and stored in a security database. When a customer application attempts to access the shared library API, the customer application is verified by extracting a customer application profile for the customer application, comparing the customer application profile with each stored trusted application profile, and verifying that the customer application can access the shared library API based on the comparison. Based on the verification, the customer application may be allowed to or access to the shared library API or may be prevented from accessing the shared library API.
16 Citations
21 Claims
-
1. A method of restricting access to a shared library within a computer security system, the method comprising:
-
storing, by a security database for each of a plurality of trusted applications, a trusted application profile identifying a set of application constraints each associated with an application property that must be satisfied before an application can access a shared library; detecting, by an administrative server, an attempt from a customer application to access the shared library; responsive to the attempt, generating, by the administrative server, a profile of the customer application, the customer application profile representative of a set of properties of the customer application, each property of the set of properties represented by the customer application profile corresponding to a constraint identified by a trusted application profile; retrieving, by the administrative server from the security database, a profile for each trusted application of a set of trusted applications; comparing the customer application profile to each retrieved trusted application profile by comparing each property of the customer application represented by the customer application profile to the corresponding constraint identified by the retrieved trusted application profile; responsive to a successful comparison between the customer application profile and at least one trusted application profile, verifying, by the administrative server, that the customer application can access the shared library; responsive to verifying that the customer application can access the shared library, allowing, by the administrative server, the attempt from the customer application to access the shared library; and responsive to not verifying that the customer application can access the shared library, denying, by the administrative server, the attempt from the customer application to access the shared library. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An administrative server computer system for restricting access to a shared library, the administrative server comprising a hardware processor and a security database, the hardware processor configured to perform steps comprising:
-
storing, in the security database for each of a plurality of trusted applications, a trusted application profile identifying a set of application constraints each associated with an application property that must be satisfied before an application can access a shared library; detecting an attempt from a customer application to access the shared library; responsive to the attempt, generating a profile of the customer application, the customer application profile representative of a set of properties of the customer application, each property of the set of properties represented by the customer application profile corresponding to a constraint identified by a trusted application profile; retrieving a profile for each trusted application of a set of trusted applications; comparing the customer application profile to each retrieved trusted application profile by comparing each property of the customer application represented by the customer application profile to the corresponding constraint identified by the retrieved trusted application profile; responsive to a successful comparison between the customer application profile and at least one trusted application profile, verifying that the customer application can access the shared library; responsive to verifying that the customer application can access the shared library, allowing the attempt from the customer application to access the shared library; and responsive to not verifying that the customer application can access the shared library, denying the attempt from the customer application to access the shared library. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing executable computer instructions for restricting access to a shared library within a computer security system, the instructions configured to, when executed by a hardware processor, perform steps comprising:
-
storing, in a security database for each of a plurality of trusted applications, a trusted application profile identifying a set of application constraints each associated with an application property that must be satisfied before an application can access a shared library; detecting an attempt from a customer application to access the shared library; responsive to the attempt, generating a profile of the customer application, the customer application profile representative of a set of properties of the customer application, each property of the set of properties represented by the customer application profile corresponding to a constraint identified by a trusted application profile; retrieving, from the security database, a profile for each trusted application of a set of trusted applications; comparing the customer application profile to each retrieved trusted application profile by comparing each property of the customer application represented by the customer application profile to the corresponding constraint identified by the retrieved trusted application profile; responsive to a successful comparison between the customer application profile and at least one trusted application profile, verifying that the customer application can access the shared library; responsive to verifying that the customer application can access the shared library, allowing the attempt from the customer application to access the shared library; and responsive to not verifying that the customer application can access the shared library, denying the attempt from the customer application to access the shared library. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification