×

Methods, systems, and data structures for loading and authenticating a module

  • US 8,468,330 B1
  • Filed: 06/30/2003
  • Issued: 06/18/2013
  • Est. Priority Date: 06/30/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method to load a module, comprising:

  • establishing, on a computer system, an execution environment for a plurality of executable instances of a module;

    processing, by a loader module of the execution environment, restrictions embodied in a configuration data file, the restrictions defining processing capabilities for each of the plurality of executable instances, access levels for each of the plurality of executable instances within the execution environment, and an identity for each of the plurality of executable instances within the execution environment, each of the plurality of executable instances having its own independent access levels, unique identity, and attributes within the execution environment, the configuration data file also signed by a configuring authority;

    loading, by the loader module, each of the plurality of executable instances in the execution environment based on the processing of the restrictions in the configuration data file; and

    attesting to the identity of each of the plurality of executable instances by the loader module, attesting comprises generating, by the loader module and based at least in part on the configuration data file, attestation for an assertion of the instance and the assertion comprises an encrypted and digitally signed plurality of Security Assertion Markup Language (SAML) statements, the SAML statements comprising;

    a statement identifying who made the assertion,one or more statements identifying reasons for assuming the assertion is true,one or more statements identifying evidence that forms the basis of the reasons,one or more statements identifying a manner in which the assertion was verified,a statement identifying by whom the assertion was verified,a statement identifying when the assertion was verified,one or more statements identifying indications as to what the instance of the module is authorized to do within a given context,a statement indicating that a checksum for the instance was validated for integrity of the instance, andone or more statements instructing a requesting resource on resource needs required by the instance within the execution environment;

    wherein an external resource relies on the attestation as a testament that the identity is authentic and as an indication that the instance is permitted to access the external resource.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×