Application associating based on cryptographic identification
First Claim
1. A method of associating applications with relativity metrics for later use in handling interprocess messages, wherein acts of the method are executed by a processor of a device, the method comprising:
- receiving a first executable file for a first application;
if the first executable file comprises a first cryptographic identifier, verifying the first cryptographic identifier using a first cryptographic key;
if the first cryptographic identifier is successfully verified, associating, based on the verifying the first cryptographic identifier, the first application with a first relativity metric, wherein the first cryptographic key used to verify the first cryptographic identifier is associated with the first relativity metric;
receiving a second executable file for a second application;
if the second executable file comprises a second cryptographic identifier, verifying the second cryptographic identifier using a second cryptographic key;
if the second cryptographic identifier is successfully verified, associating, based on the verifying the second cryptographic identifier, the second application with a second relativity metric, wherein the second cryptographic key used to verify the second cryptographic identifier is associated with the second relativity metric;
receiving a message from an origin process, the origin process associated with the first application, wherein an operating system supports execution of the first application on the device;
determining a destination process for the message, the destination process associated with the second application, wherein the operating system supports execution of the second application on the device;
determining that the first relativity metric is associated with the origin process and with a first application grouping;
determining that the second relativity metric is associated with the destination process and with a second application grouping; and
passing the message to the destination process if messages are allowed to pass from applications associated with the first application grouping to applications associated with the second application grouping.
4 Assignments
0 Petitions
Accused Products
Abstract
As each application is loaded for use by an operating system, a message handling application within the operating system associates the applications with relativity metrics for later use in handling interprocess messages. A cryptographic identifier associated with each application is verified and, based on the verifying, each application is associated with a relativity metric. The message handling application receives a message from an origin process. The message handling application then determines a destination process for the message, a relativity metric for the origin process, and a relativity metric for the destination process. Based on an analysis of the relativity metrics of the origin process and the destination process, the message handling application determines whether to forward the message to the destination process.
-
Citations
25 Claims
-
1. A method of associating applications with relativity metrics for later use in handling interprocess messages, wherein acts of the method are executed by a processor of a device, the method comprising:
-
receiving a first executable file for a first application; if the first executable file comprises a first cryptographic identifier, verifying the first cryptographic identifier using a first cryptographic key; if the first cryptographic identifier is successfully verified, associating, based on the verifying the first cryptographic identifier, the first application with a first relativity metric, wherein the first cryptographic key used to verify the first cryptographic identifier is associated with the first relativity metric; receiving a second executable file for a second application; if the second executable file comprises a second cryptographic identifier, verifying the second cryptographic identifier using a second cryptographic key; if the second cryptographic identifier is successfully verified, associating, based on the verifying the second cryptographic identifier, the second application with a second relativity metric, wherein the second cryptographic key used to verify the second cryptographic identifier is associated with the second relativity metric; receiving a message from an origin process, the origin process associated with the first application, wherein an operating system supports execution of the first application on the device; determining a destination process for the message, the destination process associated with the second application, wherein the operating system supports execution of the second application on the device; determining that the first relativity metric is associated with the origin process and with a first application grouping; determining that the second relativity metric is associated with the destination process and with a second application grouping; and passing the message to the destination process if messages are allowed to pass from applications associated with the first application grouping to applications associated with the second application grouping. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A device comprising:
a processor configured to; receive a first executable file for a first application; if the first executable file comprises a first cryptographic identifier, verify the first cryptographic identifier using a first cryptographic key; if the first cryptographic identifier is successfully verified, associate, based on a verification of the first cryptographic identifier, the first application with a first relativity metric, wherein the first cryptographic key used to verify the first cryptographic identifier is associated with the first relativity metric; receive a second executable file for a second application; if the second executable file comprises a second cryptographic identifier, verify the second cryptographic identifier using a second cryptographic key; if the second cryptographic identifier is successfully verified, associate, based on a verification of the second cryptographic identifier, the second application with a second relativity metric, wherein the second cryptographic key used to verify the second cryptographic identifier is associated with the second relativity metric; receive a message from an origin process, the origin process associated with the first application, wherein an operating system supports execution of the first application on the device; determine a destination process for the message, the destination process associated with the second application, wherein the operating system supports execution of the second application on the device; determine that the first relativity metric is associated with the origin process and with a first application grouping; determine that the second relativity metric is associated with the destination process and with a second application grouping; and pass the message to the destination process if messages are allowed to pass from applications associated with the first application grouping to applications associated with the second application grouping. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
18. A non-transitory computer readable medium containing computer-executable instructions that, when performed by a processor of a device, cause the processor to:
-
receive a first executable file for a first application; if the first executable file comprises a first cryptographic identifier, verify the first cryptographic identifier using a first cryptographic key; if the first cryptographic identifier is successfully verified, associate, based on a verification of the first cryptographic identifier, the first application with a first relativity metric, wherein the first cryptographic key used to verify the first cryptographic identifier is associated with the first relativity metric; receive a second executable file for a second application; if the second executable file comprises a second cryptographic identifier, verify the second cryptographic identifier using a second cryptographic key; if the second cryptographic identifier is successfully verified, associate, based on a verification of the second cryptographic identifier, the second application with a second relativity metric, wherein the second cryptographic key used to verify the second cryptographic identifier is associated with the second relativity metric; receive a message from an origin process, the origin process associated with the first application, wherein an operating system supports execution of the first application on the device; determine a destination process for the message, the destination process associated with the second application, wherein the operating system supports execution of the second application on the device; determine that the first relativity metric is associated with the origin process; determine that the second relativity metric is associated with the destination process; associate processes identified by the first relativity metric with a first set of processes and associate processes identified by the second relativity metric with a second set of processes; and pass the message to the destination process if messages are allowed to pass from processes of the first set to processes of the second set. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
Specification