SYSTEMS AND METHODS FOR IMPLEMENTING APPLICATION CONTROL SECURITY
First Claim
Patent Images
1. A method comprising:
- (a) storing, on a first computerized device, at least an unencrypted first white-list and an encrypted second white-list;
(b) receiving at the first computerized device, and from a second device, all or part of a unique identifier of the second device;
(c) decrypting, at the first computerized device, the encrypted second white-list using all or part of the unique identifier of the second device, thereby creating a decrypted second white-list;
(d) determining whether an executable program is referenced in the decrypted second white-list; and
(e) based on the determining step, allowing or disallowing execution by the first computerized device of the executable program.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for implementing application control security are disclosed. In one embodiment, a system includes a first device, a decrypted white-list, and an executable program. The first device may be in electrical communication with a memory containing an encrypted white-list. The encrypted white-list may be decrypted using an identifier of a second device. The executable program may be referenced in the decrypted white-list.
12 Citations
19 Claims
-
1. A method comprising:
-
(a) storing, on a first computerized device, at least an unencrypted first white-list and an encrypted second white-list; (b) receiving at the first computerized device, and from a second device, all or part of a unique identifier of the second device; (c) decrypting, at the first computerized device, the encrypted second white-list using all or part of the unique identifier of the second device, thereby creating a decrypted second white-list; (d) determining whether an executable program is referenced in the decrypted second white-list; and (e) based on the determining step, allowing or disallowing execution by the first computerized device of the executable program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
(a) storing, on a first computerized device, at least an unencrypted first white-list and an encrypted second white-list; (b) receiving at the first computerized device and from a second device all or part of a unique identifier of the second device; (c) receiving at the first computerized device and from a third device all or part of a unique identifier of the third device; (d) creating by the first computerized device a composite identifier from at least a portion of the unique identifier of the second device and from at least a portion of the unique identifier of the third device; (e) decrypting, at the first computerized device, the encrypted second white-list using all or part of the composite identifier, thereby creating a decrypted second white-list; (f) determining whether an executable program is referenced in the decrypted second white-list; and (g) based on the determining step, allowing or disallowing execution by the first computerized device of the executable program. - View Dependent Claims (13)
-
-
14. A system comprising:
-
(a) a first computerized device, wherein the first device is adapted to store at least an unencrypted first white-list and an encrypted second white-list; (b) a second device adapted to transmit a unique identifier of the second device; wherein first computerized device is adapted to decrypt the encrypted second white-list using all or part of a unique identifier of a second device, thereby creating a decrypted second white-list; and (c) an executable program, wherein the executable program is referenced in the decrypted second white-list. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification