FILE ORIGIN DETERMINATION
First Claim
Patent Images
1. A file validation method comprising:
- retrieving, by a computer processor of a computing system from an authoritative source system, an artifact file;
recording, by said computer processor, identification information identifying a requesting user of said artifact file;
generating, by said computer processor, metadata describing said identification information;
generating, by said computer processor, a modified artifact file comprising said metadata combined with said artifact file;
generating, by said computer processor, an encryption key comprising a first portion and a second portion;
storing, by said computer processor, said first portion of said key within a central key store database; and
generating, by said computer processor, an encrypted package comprising said modified artifact file and said second portion of said key.
2 Assignments
0 Petitions
Accused Products
Abstract
A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
22 Citations
20 Claims
-
1. A file validation method comprising:
-
retrieving, by a computer processor of a computing system from an authoritative source system, an artifact file; recording, by said computer processor, identification information identifying a requesting user of said artifact file; generating, by said computer processor, metadata describing said identification information; generating, by said computer processor, a modified artifact file comprising said metadata combined with said artifact file; generating, by said computer processor, an encryption key comprising a first portion and a second portion; storing, by said computer processor, said first portion of said key within a central key store database; and generating, by said computer processor, an encrypted package comprising said modified artifact file and said second portion of said key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A file validation method comprising:
-
requesting, by a computer processor of a computing system executing an agent in response to a request from a requesting user, a detachable fetch software module; retrieving, by said computer processor from a service provider computer, said detachable fetch software module; downloading, by said computer processor executing said detachable fetch software module, an artifact file; generating, by said computer processor executing said detachable fetch software module, a digital fingerprint associated with securing said artifact file; and executing, by said computer processor, said digital fingerprint with respect to said artifact file. - View Dependent Claims (13)
-
-
14. A computer program product for file validation, the computer program product comprising:
-
one or more computer-readable, tangible storage devices; program instructions, stored on at least one of the one or more storage devices, to retrieve from an authoritative source system, an artifact file; program instructions, stored on at least one of the one or more storage devices, to record identification information identifying a requesting user of said artifact file; program instructions, stored on at least one of the one or more storage devices, to generate metadata describing said identification information; program instructions, stored on at least one of the one or more storage devices, to generate a modified artifact file comprising said metadata combined with said artifact file; program instructions, stored on at least one of the one or more storage devices, to generate an encryption key comprising a first portion and a second portion; program instructions, stored on at least one of the one or more storage devices, to store said first portion of said key within a central key store database; and program instructions, stored on at least one of the one or more storage devices, to generate an encrypted package comprising said modified artifact file and said second portion of said key. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification