SAFE IDENTIFICATION OF EXECUTABLE FILE FOR LOGICAL OBJECT DETERMINING CONFIDENCE Russian patent published in 2009 - IPC G06F21/00 H04L9/32 

Abstract RU 2357287 C2

FIELD: information technology.

SUBSTANCE: present invention relates to the identification of an executable file, or another beneficiary for determining the credibility of the resource object so that this object can provide a resource for the executable file. Resource is received from the resource provider for a resource requester, which functions on a computer device. The resource requester has an associated identifier descriptor. The identifier descriptor includes information related to security, giving the environment in which the resource requester operates. An identification code (ID code) is generated in accordance with loaded resource requester and the loaded identifier descriptor, based on the loaded resource requester and the loaded identification code. The resource provider makes sure that the calculated id-Code in request for a resource coincides with one of one or more valid id-Codes for the identified resource requester, so as conclude, that resource requester and identifier descriptor can be trusted, and the resource provider responds to the request by providing the resource requester with the resource.

EFFECT: invention can increase the credibility of executable files, or other recipient of the resource by the resource providers.

36 cl, 4 dwg

Similar patents RU2357287C2

Title Year Author Number
METHOD OF AUTHORISING OPERATION TO BE PERFORMED ON TARGETED COMPUTING DEVICE 2014
  • Stern Allon Dzh.
RU2675902C2
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF 2014
  • Stern Allon Dzh.
  • Khejli Dzhon
RU2673969C2
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF 2014
  • Stern Allon Dzh.
RU2672712C2
RANSOMWARE MITIGATION IN INTEGRATED ISOLATED APPLICATIONS 2020
  • Schwartz, Jonathan David
  • Tarnouskaya, Anastasiya
RU2807463C2
PEER-TO-PEER AUTHENTICATION AND AUTHORISATION 2005
  • Gupta Rokhit
  • Manion Todd R.
  • Rao Ravi T.
  • Singkhal Sandip K.
RU2390945C2
METHOD OF CONTROLLING IDENTIFICATION OF USERS OF INFORMATION RESOURCES OF HETEROGENEOUS COMPUTER NETWORK 2009
  • Lekshin Oleg Sergeevich
RU2415466C1
REPUTATION-BASED AUTHORISATION DECISIONS 2007
  • Kross Dehvid B.
  • Fild Skott A.
  • Kurien Varugis
RU2458393C2
CLOUD SERVICE SECURITY BROKER AND PROXY 2014
  • Koem Aviram
  • Mojsi Liran
  • Lyuttvak Ami
  • Reznik Roj
  • Vishnepolski Greg
RU2679549C2
INFORMATION PROCESSING DEVICE, METHOD FOR CONTROLLING INFORMATION PROCESSING DEVICE AND DATA MEDIUM 2019
  • Yamada, Tetsuya
RU2719297C1
AUTHENTICATION OF PROCESSES AND RESOURCE PERMISSION 2013
  • Agarval, Vishal
  • Gottumukkala, Sunil P.
  • Kishan, Arun U.
  • Makferson, Dejv M.
  • Ends, Dzhonatan M.
  • Sridkharan, Giridkharan
  • Kinskhumann, Kinskhuman
  • Damiano, Adam
  • Kkhan, Salakhuddin Dzh.
  • Kannan, Gopinatkhan
RU2637878C2

RU 2 357 287 C2

Authors

Dkhir Anshul

Rehj Kennet D.

Inglehnd Pol

Kurien Tkhekktkhalakal Varugis

Dates

2009-05-27Published

2004-10-22Filed