System and method of monitoring and controlling application files
First Claim
1. A method of controlling operation of an application on a workstation, the method comprising:
- detecting, with a processor, a launch of an application on the workstation;
determining whether the application is categorized, wherein a categorized application is associated with one or more policies;
if the application is locally categorized, then applying the one or more policies that are associated with the application;
if the application is not locally categorized, thenuploading data indicative of the application to an application server module; and
determining whether the application is identified in an application inventory database of categorized applications, wherein a categorized application is associated with one or more categories; and
if the application is not identified in the application inventory database, then posting the data indicative of the application to an uncategorized application database,if the application is identified in the application inventory database, then applying one or more policies associated with the application.
19 Assignments
0 Petitions
Accused Products
Abstract
A system and method for updating a system that controls applications requested for execution on a workstation. A workstation management module is configured to detect requested execution of an application. A workstation application server receives data associated with the application from the workstation. The application server module can determine one or more categories to associate with the application by referencing an application inventory database or requesting the category from an application database factory. The application database factory can receive applications from multiple application server modules. The application database factory determines whether the application was previously categorized and provides the category to the application server module; which forwards a hash/policy table to the workstation management module. Upon receipt of the hash/policy table, the workstation management module applies the policy to control access to the requested application on the workstation.
-
Citations
21 Claims
-
1. A method of controlling operation of an application on a workstation, the method comprising:
-
detecting, with a processor, a launch of an application on the workstation; determining whether the application is categorized, wherein a categorized application is associated with one or more policies; if the application is locally categorized, then applying the one or more policies that are associated with the application; if the application is not locally categorized, then uploading data indicative of the application to an application server module; and determining whether the application is identified in an application inventory database of categorized applications, wherein a categorized application is associated with one or more categories; and if the application is not identified in the application inventory database, then posting the data indicative of the application to an uncategorized application database, if the application is identified in the application inventory database, then applying one or more policies associated with the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of controlling execution of programs on a workstation, the method comprising:
-
detecting with a processor a launch of a program at the workstation; determining whether the program is identified in a table; if the program is identified, applying a first rule that is associated with the program; pre-filtering the program and/or data associated with the program for data characteristics that are indicative of one or more categories; associating a second rule with the program based on at least in part the one or more categories indicated by the data characteristics; if the program is not identified, posting data indicative of the program to a database.
-
-
17. A method of controlling programs on a workstation, the method comprising:
-
detecting, with a processor a launch of an application on the workstation; generating a hash value for the launched application; determining whether the application is categorized by comparing the generated hash value to one or more hash values in a hash/policy table, the hash/policy table including one or more policies associated with the one or more hash values; if the generated hash value matches one or more of the hash values in the hash/policy table, then applying the one or more policies that are associated with the one or more hash values; if the generated hash value does not match one or more hash values in the hash/policy table, then posting information about the application to a logging database; uploading the logging database to an application server module; determining whether the application from the logging database is in an application inventory database; and if the application is not identified in the application inventory database, then posting information about the application to an uncategorized application database. - View Dependent Claims (18, 19, 20)
-
-
21. A method of controlling applications on a workstation, the method comprising:
-
detecting, with a processor, a running application on a workstation; determining whether the running application is identified in a database; if the running application is not identified in the database, then storing data indicative of the running application to the database; associating one or more policies to the running application; and controlling the running application based on the one or more policies; pre-filtering the program and/or data associated with the program for data characteristics that are indicative of one or more categories; associating a rule with the program based on at least in part the one or more categories indicated by the data characteristics.
-
Specification