Method and apparatus for controlling application access to limited access based data
First Claim
1. A method for controlling application access to limited access based data comprising the steps of:
- generating application registration data containing at least application identification data and corresponding unique application verification data wherein the unique application verification data is based on executable file data; and
determining application access to the limited access based data, based on the application identification data and the unique application verification data.
7 Assignments
0 Petitions
Accused Products
Abstract
An application registration data generator, on a per application basis, generates application registration data that contains at least application identification data, such as, the name of a software application or a pathname to a software application, and stored unique application verification data that is based on executable file data. A data access determinator determines whether a calling application should be allowed access to the limited access based data by, for example, computing a hash value of the executable file and checking whether this hash value matches the corresponding stored unique application verification data. If there is a match, the application is granted access to the user'"'"'s cryptographic parameters, privilege data, or other limited access based data on a per application basis.
143 Citations
44 Claims
-
1. A method for controlling application access to limited access based data comprising the steps of:
-
generating application registration data containing at least application identification data and corresponding unique application verification data wherein the unique application verification data is based on executable file data; and
determining application access to the limited access based data, based on the application identification data and the unique application verification data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
generating a user approval request signal to solicit approval of a calling application;
awaiting a response; and
granting or denying access to the limited access data based on the response.
-
-
15. The method of claim 14 including the step of updating a hash list of approved applications based on the response.
-
16. An apparatus for controlling application access to limited access based data comprising:
-
an application registration data generator that generates application registration data containing at least application identification data and corresponding unique application verification data wherein the unique application verification data is based on executable file data; and
a data access determinator, operatively responsive to the application identification data and the unique application verification data to determine application access to the limited access based data. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A storage medium comprising:
-
first memory containing data representing executable instructions that cause a processing device to generate application registration data containing at least application identification data and corresponding unique application verification data wherein the unique application verification data is based on executable file data; and
second memory containing data representing executable instructions that cause a processing device to determine application access to the limited access based data, based on the application identification data and the unique application verification data. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A method for controlling application access to limited access based data comprising the steps of:
-
obtaining application registration data containing at least application identification data and corresponding unique application verification data wherein the unique application verification data is based on executable file data; and
determining application access to the limited access based data, based on the application identification data and the unique application verification data. - View Dependent Claims (41, 42, 43, 44)
-
Specification