Methods for Identifying the Guarantor of an Application
First Claim
1. A method for providing an application for a platform, the method comprising:
- receiving an executable file by a first computing system;
embedding an identifier of a signature of a guarantor into the executable file; and
making the executable file available for use.
6 Assignments
0 Petitions
Accused Products
Abstract
Third-party applications for platforms are linked to identified individuals that guarantee the security of the applications. The linkage is achieved by acquiring one or more biometric records of the individual guarantor, storing those records as a signature in a database, assigning a unique identifier to the signature, and embedding that unique identifier in the executable file of the application. The signature of the guarantor can be compared to other stored signatures of other guarantors to check for individuals posing under multiple aliases. The signature of a guarantor linked to a malicious application can be flagged so that a subsequent application guaranteed by the same individual can be disapproved.
-
Citations
19 Claims
-
1. A method for providing an application for a platform, the method comprising:
-
receiving an executable file by a first computing system; embedding an identifier of a signature of a guarantor into the executable file; and making the executable file available for use. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
embedding, with a first computing system, an identifier of a first signature of a first guarantor into a first executable file; posting the first application; determining that the first application is a malicious application; flagging the first signature; generating a second signature of a second guarantor associated with a second executable file; and matching a record of the second signature to a record of the first signature. - View Dependent Claims (13, 14, 15)
-
-
16. A method comprising:
-
receiving an executable file by a first computing system; generating a signature of a guarantor of the executable file; and matching a record of the signature to a record of another signature stored in a database. - View Dependent Claims (17, 18, 19)
-
Specification