FILE ORIGIN DETERMINATION
First Claim
Patent Images
1. A file validation method comprising:
- generating, by a computer processor of a computing system, metadata describing identification information identifying a requesting user of an artifact file retrieved, via a fetch component external to said computing system, from an authoritative source system, wherein said metadata comprises attributes including an IP address for said computing system and an identifier for a network receiving said artifact file;
generating, by said computer processor, a modified artifact file comprising encrypted metadata combined with said artifact file and a log indicating that said encrypted metadata has been successfully generated from said metadata;
validating, by said processor, that said modified artifact file is in compliance with a licensing agreement for execution of said artifact file resulting in the generation of a portable binary for execution;
generating, by said computer processor, an encryption key comprising a first portion and a second portion;
storing, by said computer processor, said first portion of said key within a central key store database; and
generating, by said computer processor, an encrypted package comprising said modified artifact file and said second portion of said key.
2 Assignments
0 Petitions
Accused Products
Abstract
A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. Identification information identifying a requesting user of the artifact file is recorded and associated metadata and a modified artifact file comprising the metadata combined with the artifact file are generated. An encryption key including a first portion and a second portion is generated and the first portion is stored within a central key store database. An encrypted package comprising the modified artifact file and the second portion of the key is generated.
-
Citations
18 Claims
-
1. A file validation method comprising:
-
generating, by a computer processor of a computing system, metadata describing identification information identifying a requesting user of an artifact file retrieved, via a fetch component external to said computing system, from an authoritative source system, wherein said metadata comprises attributes including an IP address for said computing system and an identifier for a network receiving said artifact file; generating, by said computer processor, a modified artifact file comprising encrypted metadata combined with said artifact file and a log indicating that said encrypted metadata has been successfully generated from said metadata; validating, by said processor, that said modified artifact file is in compliance with a licensing agreement for execution of said artifact file resulting in the generation of a portable binary for execution; generating, by said computer processor, an encryption key comprising a first portion and a second portion; storing, by said computer processor, said first portion of said key within a central key store database; and generating, by said computer processor, an encrypted package comprising said modified artifact file and said second portion of said key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product for file validation executed by at least one processor of a computing system, the computer program product comprising:
-
one or more computer-readable, hardware storage devices and program instructions, stored on at least one of the one or more storage devices, to; generate metadata describing identification information identifying a requesting user of an artifact file retrieved, via a fetch component external to said computing system, from an authoritative source system, wherein said metadata comprises attributes including an IP address for said computing system and an identifier for a network receiving said artifact file; generate a modified artifact file comprising encrypted metadata combined with said artifact file and a log indicating that said encrypted metadata has been successfully generated from said metadata; validate that said modified artifact file is in compliance with a licensing agreement for execution of said artifact file resulting in the generation of a portable binary for execution; generate an encryption key comprising a first portion and a second portion; store said first portion of said key within a central key store database; and generate an encrypted package comprising said modified artifact file and said second portion of said key. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
Specification