System and method of providing communication security
First Claim
1. A process of checking the authorization and authenticity of an application provided by a user, comprising:
- authenticating an application authentication file against a domain administrator'"'"'s public membership key;
hashing an application executable;
comparing the application hash result to an authentication hash contained in the application authentication file;
denying services to the application if the application hash and the authentication hash do not match;
decoding configuration assignments in the application authentication file if the application hash and the authentication hash match;
comparing the decoded configuration assignments to the user'"'"'s configuration assignments;
providing services to the application if the result of the decode is favorable; and
denying services to the application if the result of the decode is not favorable.
1 Assignment
0 Petitions
Accused Products
Abstract
A process of checking the authorization and authenticity of an application provided by a user includes authenticating an application authentication file against a domain administrator'"'"'s public membership key. An application executable is then hashed, and the application hash result is compared to an authentication hash contained in the application authentication file. At this point, services are denied to the application if the application hash and the authentication hash do not match. Configuration assignments in the application authentication file are decoded if the application hash and the authentication hash match. The decoded configuration assignments are compared to the user'"'"'s configuration assignments. Services are provided to the application if the result of the decode is favorable. Services are denied to the application if the result of the decode is not favorable.
392 Citations
1 Claim
-
1. A process of checking the authorization and authenticity of an application provided by a user, comprising:
-
authenticating an application authentication file against a domain administrator'"'"'s public membership key;
hashing an application executable;
comparing the application hash result to an authentication hash contained in the application authentication file;
denying services to the application if the application hash and the authentication hash do not match;
decoding configuration assignments in the application authentication file if the application hash and the authentication hash match;
comparing the decoded configuration assignments to the user'"'"'s configuration assignments;
providing services to the application if the result of the decode is favorable; and
denying services to the application if the result of the decode is not favorable.
-
Specification