Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for validation and enforcement of application security

a technology of application security and validation method, applied in the field of computer system hardware and software security, can solve problems such as the danger of the software application itself being altered, hacked, or otherwise compromised, and the inability to verify the integrity of the initial download

Inactive Publication Date: 2014-10-23
RPX CLEARINGHOUSE
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

Ensures the integrity and authenticity of software applications before execution, protecting both the server and user from compromised applications by validating both the target application and user credentials, thereby preventing unauthorized access and ensuring the application is virus-free.

Problems solved by technology

Threats include both unauthorized use of systems and software, and, for software, the danger that the software application itself can be altered, hacked, or otherwise compromised.
In most cases, there is no means to verify the integrity of the initial download, much less to detect any alteration after installation.
Another significant security risk is present when a user of an application on a client data processing system accesses online data or services of a service provider.
In this case, there is commonly some sort of user verification locally or on the server system, but not both, and where the local application can be compromised, the user verification may also be compromised.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for validation and enforcement of application security
  • System and method for validation and enforcement of application security
  • System and method for validation and enforcement of application security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018]FIGS. 1 through 3, discussed below, and the various embodiments used to describe the principles of the present invention in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the invention. Those skilled in the art will understand that the principles of the present invention may be implemented in any suitably arranged device. The numerous innovative teachings of the present application will be described with particular reference to the presently preferred embodiment.

[0019]Various embodiments include a system and method for the validation and enforcement of computer system and software security, preferably using dual authentications. Preferably, an “enforcer” application is used to validate the integrity of another software application before execution, and can also be used to verify the credentials of the user of the application. In various embodiments, the enforcer application can validate the integrity and authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and method for validation and enforcement of application security, wherein the user credentials and the integrity of a target application are verified before the target application is permitted to execute.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is a continuation of U.S. patent application Ser. No. 11 / 304,043, filed Dec. 15, 2005. U.S. patent application Ser. No. 11 / 304,043 is assigned to the assignee of the present application and is incorporated by reference into this disclosure as if fully set forth herein. This disclosure hereby claims priority under 35 U.S.C. §120 to U.S. patent application Ser. No. 11 / 304,043.TECHNICAL FIELD OF THE INVENTION[0002]The present invention is directed, in general, to computer system hardware and software security.BACKGROUND OF THE INVENTION[0003]To any sophisticated user, the security of computer system hardware and software is important. Threats include both unauthorized use of systems and software, and, for software, the danger that the software application itself can be altered, hacked, or otherwise compromised.[0004]These issues are also important to enterprises and employers, which must maintain the integrity of their syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/32
CPCH04L9/3247G06F21/51G06F21/121
Inventor SLODKI, ZENONZHAO, XIAODINGWICHMANN, CLIFF
Owner RPX CLEARINGHOUSE