×

Systems and methods for implementing application control security

  • US 8,707,444 B2
  • Filed: 10/07/2011
  • Issued: 04/22/2014
  • Est. Priority Date: 10/11/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • (a) storing, on a first computerized device, at least an unencrypted first white-list and an encrypted second white-list;

    (b) receiving at the first computerized device, and from a second device, all or part of a unique identifier of the second device;

    wherein the unique identifier of the second device is in the form of an electromagnetic radiation signal; and

    wherein the electromagnetic radiation signal has a signal strength;

    (c) determining, by the first computerized device, whether the signal strength is above a predetermined threshold;

    (d) when the signal strength is above the predetermined threshold, decrypting at the first computerized device the encrypted second white-list using all or part of the unique identifier of the second device, thereby creating a decrypted second white-list;

    (e) determining by the first computerized device whether an executable program is referenced in the decrypted second white-list;

    (f) based on the determining step (e), allowing or disallowing execution by the first computerized device of the executable program;

    (g) receiving at the first computerized device an indication that the signal strength is no longer above the predetermined threshold; and

    (h) in response to the receiving the indication step (g), deleting the decrypted second white-list from a cache of the first computerized device.

View all claims
  • 13 Assignments
Timeline View
Assignment View
    ×
    ×