System for pre-trusting of applications for firewall implementations
First Claim
Patent Images
1. A method for pre-trusting applications for a firewall application, the method comprising:
- reading an order for an information handling system;
installing a software application onto the information handling system;
adding an identifier for the software application to a list of trusted applications;
installing the firewall application onto the information handling system; and
accessing the list of trusted applications to automatically identify to the firewall application that the software application is a trusted application.
1 Assignment
0 Petitions
Accused Products
Abstract
A system which dynamically generates a list of applications on an individual machine that a firewall application should enable access to the internet by default is provided. The list is generated via registering applications during factory installation. Firewall applications scan this list of registered applications during the installation or setup of the firewall application and add all applications in the list to the list of default trusted applications.
-
Citations
17 Claims
-
1. A method for pre-trusting applications for a firewall application, the method comprising:
-
reading an order for an information handling system;
installing a software application onto the information handling system;
adding an identifier for the software application to a list of trusted applications;
installing the firewall application onto the information handling system; and
accessing the list of trusted applications to automatically identify to the firewall application that the software application is a trusted application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus for pre-trusting applications for a firewall application, the method comprising:
-
means for reading an order for an information handling system;
means for installing a software application onto the information handling system;
means for adding an identifier for the software application to a list of trusted applications;
means for installing the firewall application onto the information handling system; and
means for accessing the list of trusted applications to automatically identify to the firewall application that the software application is a trusted application. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An information handling system comprising:
-
a processor;
memory coupled to the processor;
a firewall application stored on the memory;
an approved application file stored on the memory, the approved application file including a list of trusted applications, the firewall application accessing the list of trusted applications to automatically identify a software application as a trusted software application. - View Dependent Claims (16, 17)
-
Specification