Methods for identifying the guarantor of an application
First Claim
1. A method for providing an application for a platform, the method comprising:
- receiving an executable file by a first computing system;
embedding an identifier of a signature of a guarantor into the executable file, the signature of the guarantor comprising at least one biometric record; and
making the executable file available for use.
6 Assignments
0 Petitions
Accused Products
Abstract
Third-party applications for platforms are linked to identified individuals that guarantee the security of the applications. The linkage is achieved by acquiring one or more biometric records of the individual guarantor, storing those records as a signature in a database, assigning a unique identifier to the signature, and embedding that unique identifier in the executable file of the application. The signature of the guarantor can be compared to other stored signatures of other guarantors to check for individuals posing under multiple aliases. The signature of a guarantor linked to a malicious application can be flagged so that a subsequent application guaranteed by the same individual can be disapproved.
-
Citations
18 Claims
-
1. A method for providing an application for a platform, the method comprising:
-
receiving an executable file by a first computing system; embedding an identifier of a signature of a guarantor into the executable file, the signature of the guarantor comprising at least one biometric record; and making the executable file available for use. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
receiving an executable file by a first computing system; generating a signature of a guarantor of the executable file by storing a biometric record as at least one record of the signature of the guarantor; and matching a record of the signature to a record of another signature stored in a database. - View Dependent Claims (15, 16, 17, 18)
-
Specification