Program authentication on environment
First Claim
1. A method in combination with a program operating on a computer device, the method for authenticating the program to a resource local to or remote from the computing device and comprising:
- retrieving a stored program security identifier (PSID) corresponding to the program, the stored PSID including information taking into account the program itself, the execution setting of the program, and any inputs and initializations that are provided to the program, whereby the PSID represents an approved set of conditions for operating the program in a trusted manner;
re-constructing the PSID based on the same information as obtained from local sources;
comparing the stored and reconstructed PSIDs to determine whether a match exists;
if it is determined that a match exists, concluding that the program operates in the trusted manner according to the approved set of conditions; and
if it is determined that a match does not exist, concluding that the program does not operate in the trusted manner according to the approved set of conditions.
2 Assignments
0 Petitions
Accused Products
Abstract
To authenticate a program on a computing device to a resource local to or remote from the computing device, a stored program security identifier (PSID) corresponding to the program is retrieved, where the stored PSID includes information taking into account the program itself, the execution setting of the program, and any inputs and initializations that are provided to the program. The PSID is re-constructed based on the same information as obtained from local sources, and the stored and reconstructed PSIDs are compared to determine whether a match exists. If so, it may be concluded that the program operates in a trusted manner according to an approved set of conditions.
53 Citations
20 Claims
-
1. A method in combination with a program operating on a computer device, the method for authenticating the program to a resource local to or remote from the computing device and comprising:
-
retrieving a stored program security identifier (PSID) corresponding to the program, the stored PSID including information taking into account the program itself, the execution setting of the program, and any inputs and initializations that are provided to the program, whereby the PSID represents an approved set of conditions for operating the program in a trusted manner;
re-constructing the PSID based on the same information as obtained from local sources;
comparing the stored and reconstructed PSIDs to determine whether a match exists;
if it is determined that a match exists, concluding that the program operates in the trusted manner according to the approved set of conditions; and
if it is determined that a match does not exist, concluding that the program does not operate in the trusted manner according to the approved set of conditions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method in combination with a program operating on a computer device, the method for authenticating the program to a resource local to or remote from the computing device, the program to be authenticated being hosted by a number of layers of hosting programs that ultimately rest upon hardware representative of the computing device, the method comprising:
-
for each of the program to be authenticated and the hosting program at each of at least some layers, establishing a program security identifier (PSID) corresponding to the program, the established PSID including information taking into account the program itself, the execution setting of the program, and any inputs and initializations that are provided to the program, whereby the PSID represents an approved set of conditions for operating the program in a trusted manner;
combining all of the established PSIDs to produce a composite PSID (CPSID) representing an overall security environment of the program to be authenticated; and
delivering the produced CPSID to the resource, whereby such resource reviews such delivered CPSID and determines based at least partially on such review whether to trust the program to be authenticated. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification