SYSTEMS AND METHODS FOR IMPLEMENTING APPLICATION CONTROL SECURITY
First Claim
Patent Images
1. A method comprising:
- (a) receiving at a first device an identifier of a second device, wherein the first device is operable to read an encrypted white-list;
(b) receiving the encrypted white-list;
(c) producing a decrypted white-list, wherein the producing step comprises;
(i) decrypting the encrypted white-list using the identifier of the second device;
(d) determining whether an executable program is referenced in the decrypted white-list; and
(e) based on the determining step, allowing or disallowing execution of the executable program.
13 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for implementing application control security are disclosed. In one embodiment, a system includes a first device, a decrypted white-list, and an executable program. The first device may be in electrical communication with a memory containing an encrypted white-list. The encrypted white-list may be decrypted using an identifier of a second device. The executable program may be referenced in the decrypted white-list.
21 Citations
20 Claims
-
1. A method comprising:
-
(a) receiving at a first device an identifier of a second device, wherein the first device is operable to read an encrypted white-list; (b) receiving the encrypted white-list; (c) producing a decrypted white-list, wherein the producing step comprises; (i) decrypting the encrypted white-list using the identifier of the second device; (d) determining whether an executable program is referenced in the decrypted white-list; and (e) based on the determining step, allowing or disallowing execution of the executable program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
(a) receiving at a first device an identifier of a second device and an identifier of a third device, wherein the first device is operable to read an encrypted white-list; (b) receiving the encrypted white-list; (c) creating a composite identifier using the identifier of the second device and the identifier of the third device; (d) producing a decrypted white-list, wherein the producing step comprises; (i) decrypting the encrypted white-list using the composite identifier; (e) determining whether an executable program is referenced in the decrypted white-list; and (f) based on the determining step, allowing or disallowing execution of the executable program.
-
-
16. A system comprising:
-
(a) a first device, wherein the first device is in electrical communication with a memory containing an encrypted white-list, and wherein the encrypted white-list is decrypted using an identifier of a second device; (b) a decrypted white-list; and (c) an executable program, wherein the executable program is referenced in the decrypted white-list. - View Dependent Claims (17, 18, 19, 20)
-
Specification