Methods for identifying the guarantor of an application
First Claim
1. A method comprising:
- embedding, with a first computing system, an identifier of a first signature of a first guarantor into a first executable file, the signature of the first guarantor comprising at least one biometric record;
posting the first executable file;
determining that the first executable file is a malicious executable file;
flagging the first signature;
generating a second signature of a second guarantor associated with a second executable file; and
matching a record of the second signature to a record of the first signature.
6 Assignments
0 Petitions
Accused Products
Abstract
Third-party applications for platforms are linked to identified individuals that guarantee the security of the applications. The linkage is achieved by acquiring one or more biometric records of the individual guarantor, storing those records as a signature in a database, assigning a unique identifier to the signature, and embedding that unique identifier in the executable file of the application. The signature of the guarantor can be compared to other stored signatures of other guarantors to check for individuals posing under multiple aliases. The signature of a guarantor linked to a malicious application can be flagged so that a subsequent application guaranteed by the same individual can be disapproved.
126 Citations
4 Claims
-
1. A method comprising:
-
embedding, with a first computing system, an identifier of a first signature of a first guarantor into a first executable file, the signature of the first guarantor comprising at least one biometric record; posting the first executable file; determining that the first executable file is a malicious executable file; flagging the first signature; generating a second signature of a second guarantor associated with a second executable file; and matching a record of the second signature to a record of the first signature. - View Dependent Claims (2, 3, 4)
-
Specification