Controlling execution of computer applications
First Claim
Patent Images
1. One or more computer-readable media comprising computer-executable instructions for executing an application, the computer-executable instructions comprising instructions for:
- identifying an application ID associated with the application;
verifying the application ID; and
creating a new process in response to successful verification of the application ID.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are described that control attempts made by an application to access data. In one embodiment, the application is associated with a security token that includes an application ID. In operation, the system receives a request, initiated by the application, for access to the data. The system is configured to evaluate the request for access based in part on comparison of the security token and a listing of approved application IDs associated with the data.
89 Citations
20 Claims
-
1. One or more computer-readable media comprising computer-executable instructions for executing an application, the computer-executable instructions comprising instructions for:
-
identifying an application ID associated with the application;
verifying the application ID; and
creating a new process in response to successful verification of the application ID. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. One or more computer-readable media comprising computer-executable instructions for identifying an application as a prerequisite for execution of the application, the computer-executable instructions comprising instructions for:
-
receiving a request to execute the application;
identifying an application ID associated with the application;
attempting to verify the application ID; and
where the application ID was verified, executing the application. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system for executing an application, comprising:
-
an environment within which a new process may be created;
an application ID associated with the application; and
a process-identifying security function configured to make a decision to allow or prevent creation of the new process, wherein the decision is made based on verification of the application ID. - View Dependent Claims (17, 18, 19, 20)
-
Specification