×

CLOUD-BASED APPLICATION WHITELISTING

  • US 20120072725A1
  • Filed: 11/28/2011
  • Published: 03/22/2012
  • Est. Priority Date: 12/03/2004
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • creating and maintaining an in-memory cache including a plurality of entries each of which contain execution authorization information regarding one of a plurality of code modules that have been most recently used by the computer system, said maintaining including adding execution authorization information regarding a newly identified authorized code module or a newly identified unauthorized code module to an entry of the plurality of entries;

    intercepting file system or operating system activity relating to a code module;

    generating a cryptographic hash value of the code module;

    determining if the code module is authorized for execution by the computer system by causing the cryptographic hash value or the code module to be checked against a multi-level whitelist database architecture, the multi-level whitelist database architecture including a global whitelist database, a local whitelist database and the in-memory cache;

    wherein the global whitelist database is stored remote from the computer system, maintained by a trusted third party service provider and contains cryptographic hash values of approved code modules, which are presumed not to contain viruses or malicious code;

    wherein the local whitelist database is created based on the global whitelist, stored local to the computer system and contains at least a subset of the cryptographic hash values contained in the global whitelist database;

    wherein said causing the cryptographic hash value or the code module to be checked includes first consulting the in-memory cache and if execution authorization information associated the code module is not present within the in-memory cache, then looking up the cryptographic hash value in the local whitelist database and if the cryptographic hash value is not found within the local whitelist database, then looking up the cryptographic hash value in the global whitelist database; and

    causing the code module to be executed by the computer system by allowing processing relating to the file system or operating system activity relating to the code module to proceed if;

    the execution authorization information is present within the in-memory cache and indicates the code module is approved for execution;

    the cryptographic hash value matches one of the cryptographic hash values of approved code modules within the local whitelist database;

    orthe cryptographic hash value matches one of the cryptographic hash values of approved code modules within the global whitelist database.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×