SYSTEM AND METHOD OF MONITORING AND CONTROLLING APPLICATION FILES
First Claim
1. A method of controlling operation of an application on a workstation, the method comprising:
- detecting a launch of an application on the workstation;
determining whether the application is categorized, wherein a categorized application is associated with one or more policies;
if the application is locally categorized, then applying the one or more policies that are associated with the application;
if the application is not locally categorized, then uploading data indicative of the application to an application server module; and
determining whether the application is in an application inventory database of categorized applications, wherein a categorized application is associated with one or more categories; and
if the application is not in the application inventory database, then posting the application to an uncategorized application database, if the application is in the application inventory database, then applying one or more policies associated with the application.
19 Assignments
0 Petitions
Accused Products
Abstract
A system and method for updating a system that controls applications requested for execution on a workstation. A workstation management module is configured to detect requested execution of an application. A workstation application server receives data associated with the application from the workstation. The application server module can determine one or more categories to associate with the application by referencing an application inventory database or requesting the category from an application database factory. The application database factory can receive applications from multiple application server modules. The application database factory determines whether the application was previously categorized and provides the category to the application server module; which forwards a hash/policy table to the workstation management module. Upon receipt of the hash/policy table, the workstation management module applies the policy to control access to the requested application on the workstation.
134 Citations
22 Claims
-
1. A method of controlling operation of an application on a workstation, the method comprising:
-
detecting a launch of an application on the workstation;
determining whether the application is categorized, wherein a categorized application is associated with one or more policies;
if the application is locally categorized, then applying the one or more policies that are associated with the application;
if the application is not locally categorized, then uploading data indicative of the application to an application server module; and
determining whether the application is in an application inventory database of categorized applications, wherein a categorized application is associated with one or more categories; and
if the application is not in the application inventory database, then posting the application to an uncategorized application database, if the application is in the application inventory database, then applying one or more policies associated with the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of controlling execution of programs on a workstation, the method comprising:
-
detecting a launch of a program at the workstation;
determining whether the program is stored in a table;
if the program is stored, applying a first rule that is associated with the program; and
if the program is not stored, posting the program to a database. - View Dependent Claims (17)
-
-
18. A method of controlling programs on a workstation, the method comprising:
-
detecting a launch of an application on the workstation;
generating a hash value for the launched application;
determining whether the application is categorized by comparing the generated hash value to one or more hash values in a hash/policy table, the hash/policy table including one or more policies associated with the one or more hash values;
if the generated hash value matches one or more of the hash values in the hash/policy table, then applying the one or more policies that are associated with the one or more hash values;
if the generated hash value does not match one or more hash values in the hash/policy table, then posting the application to a logging database;
uploading the logging database to an application server module;
determining whether the application from the logging database is in an application inventory database; and
if the application is not in the application inventory database, then posting the application to an uncategorized application database. - View Dependent Claims (19, 20, 21)
-
-
22. A method of controlling applications on a workstation, the method comprising:
-
detecting a running application on a workstation;
determining whether the running application is in a database;
if the running application is not in the database, then storing data indicative of the running application to the database;
associating one or more policies to the running application; and
controlling the running application based on the one or more policies.
-
Specification