Systems and methods for application identification
First Claim
Patent Images
1. A user device, comprising:
- a processor; and
memory configured to store;
an application comprising at least one file;
a session manager; and
an application identifier;
wherein the processor is configured by the session manager, the session manager being stored within the memory of the user device to;
retrieve encrypted provisioning data containing an application identifier associated with the application;
generate application identifier data that represents information about at least one aspect of the application that remains static throughout all instances where the application is deployed, where the application identifier data comprises information that can be used to authenticate the at least one file, and where the information that can be used to authenticate the at least one file comprises at least one hash of at least a part of at least one of the at least one files;
send the encrypted provisioning data and the application identifier data to an authentication server, the authentication server being independent of the user device;
receive authentication of the application from the authentication server; and
authorize the execution of the application.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for application identification in accordance with embodiments of the invention are disclosed. In one embodiment, a user device includes a processor and memory configured to store an application, a session manager, an application identifier, and at least one shared library, and the processor is configured by the session manager to communicate the application identifier and the application identifier data to an authentication server and permit the execution of the application in response to authentication of the application by the authentication server.
39 Citations
13 Claims
-
1. A user device, comprising:
-
a processor; and memory configured to store; an application comprising at least one file; a session manager; and an application identifier; wherein the processor is configured by the session manager, the session manager being stored within the memory of the user device to; retrieve encrypted provisioning data containing an application identifier associated with the application; generate application identifier data that represents information about at least one aspect of the application that remains static throughout all instances where the application is deployed, where the application identifier data comprises information that can be used to authenticate the at least one file, and where the information that can be used to authenticate the at least one file comprises at least one hash of at least a part of at least one of the at least one files; send the encrypted provisioning data and the application identifier data to an authentication server, the authentication server being independent of the user device; receive authentication of the application from the authentication server; and authorize the execution of the application. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for authenticating an application executing on a user device configured to communicate with an authentication server, the method comprising:
-
generating, using a user device, application identifier data for an application that comprises at least one file stored on the user device, where the application identifier data represents information about at least one aspect of the application that remains static throughout all instances where the application is deployed, where the application identifier data comprises information that can be used to authenticate the at least one file, and where the information that can be used to authenticate the at least one file comprises at least one hash of at least a part of at least one of the at least one files; communicate, using the user device, an application identifier stored on the user device and the application identifier data to the authentication server, the authentication server being independent of the user device; and permit, using the user device, the execution of the application in response to authentication of the application by the authentication server. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
Specification