System and method for validation and enforcement of application security
a technology of application security and validation method, applied in the field of computer system hardware and software security, can solve problems such as the danger of the software application itself being altered, hacked, or otherwise compromised, and the inability to verify the integrity of the initial download
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018]FIGS. 1 through 3, discussed below, and the various embodiments used to describe the principles of the present invention in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the invention. Those skilled in the art will understand that the principles of the present invention may be implemented in any suitably arranged device. The numerous innovative teachings of the present application will be described with particular reference to the presently preferred embodiment.
[0019]Various embodiments include a system and method for the validation and enforcement of computer system and software security, preferably using dual authentications. Preferably, an “enforcer” application is used to validate the integrity of another software application before execution, and can also be used to verify the credentials of the user of the application. In various embodiments, the enforcer application can validate the integrity and authen...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


