System and method for incorporating an originating site into a security protocol for a downloaded program object
First Claim
1. A method for securing a manner in which objects are accessed by a computing device, the method comprising:
- at the computing device;
receiving a first object from a first remote source, wherein the first remote source is associated with at least one first property and a first cryptographic identity;
generating a first security key based on the first object, the at least one first property, and the first cryptographic identity;
upon identifying that the first object is not known to the computing device;
identifying a first access level to be granted to the first object,encrypting the first access level based on at least one of the first object, the at least one first property, and the first cryptographic identity, to produce an encrypted first access level,associating the first security key with the encrypted first access level, andgranting the first access level to the first object; and
subsequent to granting the first access level to the first object;
receiving a second object from a second remote source, wherein second remote source is associated with at least one second property and a second cryptographic identity;
generating a second security key based on the second object, the at least one second property, and the second cryptographic identity;
when the second security key matches the first security key;
identifying the first access level in accordance with the encrypted first access level associated with the first security key, andgranting the first access level to the second object; and
when the second security key does not match the first security key;
identifying a second access level to be granted to the second object.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for verifying a digital object obtained from a remote host. A system configured to practice the method downloads a first object from a first remote source and presents the user with a first request to allow access to the first object. Upon user approval, a multitude of characteristics associated with the object are stored to facilitate future uses of the object. When a second object is downloaded from a second remote source, the system checks the database for a stored user approval. Access to the second object is allowed if the multitude of characteristics associated with the first and second objects match. If the system does not find a match, the user is presented with a second request to allow access to the object.
15 Citations
20 Claims
-
1. A method for securing a manner in which objects are accessed by a computing device, the method comprising:
-
at the computing device; receiving a first object from a first remote source, wherein the first remote source is associated with at least one first property and a first cryptographic identity; generating a first security key based on the first object, the at least one first property, and the first cryptographic identity; upon identifying that the first object is not known to the computing device; identifying a first access level to be granted to the first object, encrypting the first access level based on at least one of the first object, the at least one first property, and the first cryptographic identity, to produce an encrypted first access level, associating the first security key with the encrypted first access level, and granting the first access level to the first object; and subsequent to granting the first access level to the first object; receiving a second object from a second remote source, wherein second remote source is associated with at least one second property and a second cryptographic identity; generating a second security key based on the second object, the at least one second property, and the second cryptographic identity; when the second security key matches the first security key; identifying the first access level in accordance with the encrypted first access level associated with the first security key, and granting the first access level to the second object; and when the second security key does not match the first security key; identifying a second access level to be granted to the second object. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable storage medium configured to store instructions that, when executed by a processor included in a computing device, cause the computing device to secure a manner in which objects are accessed by a computing device, by carrying out steps that include:
-
receiving a first object from a first remote source, wherein the first remote source is associated with at least one first property and a first cryptographic identity; generating a first security key based on the first object, the at least one first property, and the first cryptographic identity; upon identifying that the first object is not known to the computing device; identifying a first access level to be granted to the first object, encrypting the first access level based on at least one of the first object, the at least one first property, and the first cryptographic identity, to produce an encrypted first access level, associating the first security key with the encrypted first access level, and granting the first access level to the first object; and subsequent to granting the first access level to the first object; receiving a second object from a second remote source, wherein second remote source is associated with at least one second property and a second cryptographic identity; generating a second security key based on the second object, the at least one second property, and the second cryptographic identity; when the second security key matches the first security key; identifying the first access level in accordance with the encrypted first access level associated with the first security key, and granting the first access level to the second object; and when the second security key does not match the first security key; identifying a second access level to be granted to the second object. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computing device configured to secure a manner in which objects are accessed by the computing device, the computing device comprising:
a hardware processor, wherein the hardware processor is configured to cause the computing device to carry out steps that include; receiving a first object from a first remote source, wherein the first remote source is associated with at least one first property and a first cryptographic identity; generating a first security key based on the first object, the at least one first property, and the first cryptographic identity; upon identifying that the first object is not known to the computing device; identifying a first access level to be granted to the first object, encrypting the first access level based on at least one of the first object, the at least one first property, and the first cryptographic identity, to produce an encrypted first access level, associating the first security key with the encrypted first access level, and granting the first access level to the first object; and subsequent to granting the first access level to the first object; receiving a second object from a second remote source, wherein second remote source is associated with at least one second property and a second cryptographic identity; generating a second security key based on the second object, the at least one second property, and the second cryptographic identity; when the second security key matches the first security key; identifying the first access level in accordance with the encrypted first access level associated with the first security key, and granting the first access level to the second object; and when the second security key does not match the first security key; identifying a second access level to be granted to the second object. - View Dependent Claims (16, 17, 18, 19, 20)
Specification