APPLICATION ASSOCIATING BASED ON CRYPTOGRAPHIC IDENTIFICATION
First Claim
1. A method of associating applications with relativity metrics for later use in handling interprocess messages, said method comprising:
- receiving a first executable file for a first application, said first executable file including a first cryptographic identifier;
verifying said first cryptographic identifier; and
associating, based on said verifying, said first application with a first relativity metric.
4 Assignments
0 Petitions
Accused Products
Abstract
As each application is loaded for use by an operating system, a message handling application within the operating system associates the applications with relativity metrics for later use in handling interprocess messages. A cryptographic identifier associated with each application is verified and, based on the verifying, each application is associated with a relativity metric. The message handling application receives a message from an origin process. The message handling application then determines a destination process for the message, a relativity metric for the origin process, and a relativity metric for the destination process. Based on an analysis of the relativity metrics of the origin process and the destination process, the message handling application determines whether to forward the message to the destination process.
-
Citations
25 Claims
-
1. A method of associating applications with relativity metrics for later use in handling interprocess messages, said method comprising:
-
receiving a first executable file for a first application, said first executable file including a first cryptographic identifier; verifying said first cryptographic identifier; and associating, based on said verifying, said first application with a first relativity metric. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. The method of claim I wherein said verifying comprises:
-
providing said first application as input to a hash function to obtain a local digital signature; decrypting said first cryptographic identifier to obtain a test digital signature; comparing said local digital signature to said test digital signature; and if said comparing indicates an equivalence, considering said first cryptographic identifier to have been verified.
-
-
9. An apparatus comprising:
a processor for executing a message handling application as part of an operating system, said message handling application adapted to; receive a first executable file for a first application, said first executable file including a first cryptographic identifier; verify said first cryptographic identifier; and associate, based on said verifying, said first application with a first relativity metric. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A computer readable medium containing computer-executable instructions that, when performed by a processor, cause said processor to execute a message handling application as part of an operating system, said message handling application being adapted to:
-
receive a first executable file for a first application, said first executable file including a first cryptographic identifier; verify said first cryptographic identifier; and associate, based on said verifying, said first application with a first relativity metric. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A method of associating applications with relativity metrics and handling interprocess messages, said method comprising:
-
receiving a first executable file for a first application, said first executable file including a first cryptographic identifier; verifying said first cryptographic identifier, wherein said verifying involves use of a first public cryptographic key, and wherein said first public cryptographic key is associated with a first relativity metric; associating, based on said verifying, said first application with said first relativity metric; receiving a second executable file for a second application, said second executable file including a second cryptographic identifier; verifying said second cryptographic identifier, wherein said verifying said second cryptographic identifier involves use of a second public cryptographic key, and wherein said second public cryptographic key is associated with a second relativity metric; associating, based on said verifying said second cryptographic identifier, said second application with said second relativity metric, receiving a message from an origin process, said origin process associated with said first application; determining a destination process for said message, said destination process associated with said second application; determining that said first relativity metric is associated with said origin process; determining that said second relativity metric is associated with said destination process; analyzing whether, based on said first relativity metric and said second relativity metric, messages from said origin process are allowed to be passed to said destination process; and passing said message to said destination process only if allowed based on said analyzing.
-
-
25. A mobile communication device comprising:
-
a processor for executing a message handling application as part of an operating system, said message handling application being adapted to; receive a first executable file for a first application, said first executable file including a first cryptographic identifier; verify said first cryptographic identifier, wherein said verifying involves use of a first public cryptographic key, and wherein said first public cryptographic key is associated with a first relativity metric; associate, based on said verifying, said first application with said first relativity metric; receive a second executable file for a second application, said second executable file including a second cryptographic identifier; verify said second cryptographic identifier, wherein said verifying said second cryptographic identifier involves use of a second public cryptographic key, and wherein said second public cryptographic key is associated with a second relativity metric; associate, based on said verifying said second cryptographic identifier, said second application with said second relativity metric, receive a message from an origin process, said origin process associated with said first application; determine a destination process for said message, said destination process associated with said second application; determine that said first relativity metric is associated with said origin process; determine that said second relativity metric is associated with said destination process; analyze whether, based on said first relativity metric and said second relativity metric, messages from said origin process are allowed to be passed to said destination process; and pass said message to said destination process only if allowed based on said analyzing.
-
Specification