Systems and methods for protecting proprietary data
First Claim
1. A method, comprising:
- identifying, by a computing system comprising one or more computers, a file of computer-executable code that facilitates the processing of proprietary information when executed by at least one processor;
performing, by the computing system, at least one hashing operation on the file to generate a first representative value associated with the file;
receiving, by the computing system, at least one approval associated with validation of the file;
storing, by the computing system, the at least one approval in association with the generated representative value;
determining, by the computing system prior to the execution of the file and utilizing the at least one hashing operation, a second representative value associated with the file; and
comparing, by the computing system prior to the execution of the file, the first representative value to the second representative value, wherein,if the second representative value matches the stored first representative value and at least one approval is available, selectively permitting, by the computing system, execution of the file, andif the second representative value does not match the stored first representative value, determining by the computing system based at least in part upon a comparison of the first representative value to the second representative value, that the file has been modified subsequent to the storage of the at least one approval, wherein execution of the file is not permitted based upon the determination that the file has been modified.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for protecting proprietary data are provided. A file of computer-executable code that facilitates the processing of proprietary information when executed may be identified. At least one hashing operation may be performed on the file to generate a first representative value associated with the file. At least one approval associated with validation of the file may be received by the computing system. The at least one approval may be stored in association with the generated representative value. Prior to the execution of the file, the at least one hashing operation may be utilized to determine a second representative value associated with the file. Execution of the file may be selectively permitted based at least in part upon a determination of whether the second representative value matches the stored first representative value and whether the at least one approval is available.
-
Citations
18 Claims
-
1. A method, comprising:
-
identifying, by a computing system comprising one or more computers, a file of computer-executable code that facilitates the processing of proprietary information when executed by at least one processor; performing, by the computing system, at least one hashing operation on the file to generate a first representative value associated with the file; receiving, by the computing system, at least one approval associated with validation of the file; storing, by the computing system, the at least one approval in association with the generated representative value; determining, by the computing system prior to the execution of the file and utilizing the at least one hashing operation, a second representative value associated with the file; and comparing, by the computing system prior to the execution of the file, the first representative value to the second representative value, wherein, if the second representative value matches the stored first representative value and at least one approval is available, selectively permitting, by the computing system, execution of the file, and if the second representative value does not match the stored first representative value, determining by the computing system based at least in part upon a comparison of the first representative value to the second representative value, that the file has been modified subsequent to the storage of the at least one approval, wherein execution of the file is not permitted based upon the determination that the file has been modified. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
at least one memory that stores computer-executable instructions; and at least one processor that accesses the at least one memory and executes the computer-executable instructions to; identify a file of computer-executable code that facilitates the processing of proprietary information when executed by at least one processor; perform at least one hashing operation on the file to generate a first representative value associated with the file; receive at least one approval associated with validation of the file; store the at least one approval in association with the generated representative value; determine, prior to the execution of the file and utilizing the at least one hashing operation, a second representative value associated with the file; and compare, prior to the execution of the file, the first representative value to the second representative value, wherein, if the second representative value matches the stored first representative value and at least one approval is available, selectively permitting, by the computing system, execution of the file, and if the second representative value does not match the stored first representative value, determining by the computing system based upon a comparison of the first representative value to the second representative value, that the file has been modified subsequent to the storage of the at least one approval, wherein execution of the file is not permitted based upon the determination that the file has been modified. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
identifying, by a computing system comprising one or more computers, a file of computer-executable code; determining, by the computing system prior to the execution of the file and based upon the performance of at least one hashing operation on the file, a representative value associated with the file; accessing, by the computing system, stored representative value information, the stored representative value information previously generated utilizing the at least one hashing operation; determining, by the computing system, whether the generated representative value corresponds to the stored representative value; determining, by the computing system, whether at least one approval associated with the validation of the file is stored in association with the stored representative value; and comparing, by the computing system prior to the execution of the file, the first representative value to the second representative value, wherein, if the second representative value matches the stored first representative value and at least one approval is available, selectively permitting, by the computing system, execution of the file, and if the second representative value does not match the stored first representative value, determining by the computing system based at least in part upon a comparison of the first representative value to the second representative value, that the file has been modified subsequent to the storage of the at least one approval, wherein execution of the file is not permitted based upon the determination that the file has been modified. - View Dependent Claims (16, 17, 18)
-
Specification