Dynamic executable
First Claim
Patent Images
1. A system comprising:
- one or more processorsa server-side executable by one or more processors and configured to gather information about an execution environment of a client-side machine; and
execute on a server to generate a first hardware signature including information identifying devices of the client-side machine;
a client-side executable by one or more processors and configured to execute on the client-side machine, to generate a second hardware signature identifying on devices associated with the client-side machine, the client-side executable being dynamically generated on the server and securely downloaded to the client-side machine, the client-side executable being associated with the server-side executable and configured to operate in the execution environment of the client-side machine, and configured to execute a subset of instructions from the server; and
an authenticator to configured to compare the first hardware signature and the second hardware signature based on a threshold level of matching to identity of the client-side machine.
11 Assignments
0 Petitions
Accused Products
Abstract
A system to identify and/or authenticate an entity includes a. client-side executable and an associated server-side executable, each of which may be dynamically generated. The server-side executable may be executed on a server to generate a first result. The client-side executable may be executed on an entity to generate a second result. The first result and the second result are compared to identify and/or to authenticate the entity.
53 Citations
24 Claims
-
1. A system comprising:
-
one or more processors a server-side executable by one or more processors and configured to gather information about an execution environment of a client-side machine; and
execute on a server to generate a first hardware signature including information identifying devices of the client-side machine;a client-side executable by one or more processors and configured to execute on the client-side machine, to generate a second hardware signature identifying on devices associated with the client-side machine, the client-side executable being dynamically generated on the server and securely downloaded to the client-side machine, the client-side executable being associated with the server-side executable and configured to operate in the execution environment of the client-side machine, and configured to execute a subset of instructions from the server; and an authenticator to configured to compare the first hardware signature and the second hardware signature based on a threshold level of matching to identity of the client-side machine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
identifying, by a server, components of an execution environment of a client-side machine, wherein the components include an operating system and a central processing unit; dynamically generating, on the server, a client-side executable suitable for operation in the execution environment of the client-side machine, and a corresponding server-side executable; securely downloading the client-side executable from the server to the client-side machine, the client-side executable being associated with the server-side executable, and being configured to execute a subset of instructions from the server; executing the server-side executable on the server to generate a first hardware signature, wherein the first hardware signature includes information identifying a first group of devices associated with the client-side machine; executing the client-side executable on the client-side machine to generate a second hardware signature based on a second group of devices associated with the client-side machine; and comparing, based on a threshold level of matching, the first hardware signature and the second hardware signature to authenticate the client-side machine, wherein the threshold level of matching indicates a number of devices that must be in the first and second groups for the client-side device to be authenticated. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for distributing executable software modules and granting access to resources based on operations performed by the executable software modules, the method comprising:
performing the following operations at a server, collecting environment information about an execution environment of a client-side machine; determining hardware information to be collected from the client-side machine; creating a client-side software module configured to execute in the execution environment of the client-side machine, to collect the hardware information from the client-side machine, and to generate a first hardware signature based on the hardware information; transmitting the client-side software module to the client-side machine; receiving, from the client-side software module, the first hardware signature; comparing the first hardware signature to a second hardware signature associated with the client-side machine; granting the client-side device access to resources, wherein the granting is based on the comparison of the first and second hardware signatures. - View Dependent Claims (21, 22, 23, 24)
Specification