Systems and methods for implementing application control security
First Claim
Patent Images
1. A method comprising:
- (a) storing, on a first computerized device, at least an unencrypted first white-list and an encrypted second white-list;
(b) receiving at the first computerized device, and from a second device, all or part of a unique identifier of the second device;
wherein the unique identifier of the second device is in the form of an electromagnetic radiation signal; and
wherein the electromagnetic radiation signal has a signal strength;
(c) determining, by the first computerized device, whether the signal strength is above a predetermined threshold;
(d) when the signal strength is above the predetermined threshold, decrypting at the first computerized device the encrypted second white-list using all or part of the unique identifier of the second device, thereby creating a decrypted second white-list;
(e) determining by the first computerized device whether an executable program is referenced in the decrypted second white-list;
(f) based on the determining step (e), allowing or disallowing execution by the first computerized device of the executable program;
(g) receiving at the first computerized device an indication that the signal strength is no longer above the predetermined threshold; and
(h) in response to the receiving the indication step (g), deleting the decrypted second white-list from a cache of the first computerized device.
13 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for implementing application control security are disclosed. In one embodiment, a system includes a first device, a decrypted white-list, and an executable program. The first device may be in electrical communication with a memory containing an encrypted white-list. The encrypted white-list may be decrypted using an identifier of a second device. The executable program may be referenced in the decrypted white-list.
-
Citations
17 Claims
-
1. A method comprising:
-
(a) storing, on a first computerized device, at least an unencrypted first white-list and an encrypted second white-list; (b) receiving at the first computerized device, and from a second device, all or part of a unique identifier of the second device; wherein the unique identifier of the second device is in the form of an electromagnetic radiation signal; and wherein the electromagnetic radiation signal has a signal strength; (c) determining, by the first computerized device, whether the signal strength is above a predetermined threshold; (d) when the signal strength is above the predetermined threshold, decrypting at the first computerized device the encrypted second white-list using all or part of the unique identifier of the second device, thereby creating a decrypted second white-list; (e) determining by the first computerized device whether an executable program is referenced in the decrypted second white-list; (f) based on the determining step (e), allowing or disallowing execution by the first computerized device of the executable program; (g) receiving at the first computerized device an indication that the signal strength is no longer above the predetermined threshold; and (h) in response to the receiving the indication step (g), deleting the decrypted second white-list from a cache of the first computerized device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 15, 16)
-
-
9. A system comprising:
-
(a) a first computerized device adapted to store at least an unencrypted first white-list and an encrypted second white-list; (b) a second device adapted to transmit a unique identifier of the second device in the form of an electromagnetic radiation signal having signal strength; wherein the first computerized device is adapted to; (i) receive all or part of the unique identifier of the second device and, (ii) when the signal strength is above a predetermined threshold, decrypt the encrypted second white-list into a decrypted second white-list using all or part of the unique identifier of the second device; wherein the first computerized device is adapted to determine whether an executable program is referenced in the decrypted second white-list and based thereon, allow or disallow execution of the executable program; wherein the first computerized device is adapted to delete the decrypted second white-list from a cache of the first computerized device when the signal strength is no longer, above the predetermined threshold. - View Dependent Claims (10, 11, 12, 13, 14, 17)
-
Specification