US20140317400A1 - System and method for validation and enforcement of application security - Google Patents

System and method for validation and enforcement of application security Download PDF

Info

Publication number
US20140317400A1
US20140317400A1 US14/322,166 US201414322166A US2014317400A1 US 20140317400 A1 US20140317400 A1 US 20140317400A1 US 201414322166 A US201414322166 A US 201414322166A US 2014317400 A1 US2014317400 A1 US 2014317400A1
Authority
US
United States
Prior art keywords
application
signature
client
enforcer
server system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/322,166
Inventor
Zenon Slodki
Xiaoding Zhao
Cliff Wichmann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RPX Clearinghouse LLC
Original Assignee
Rockstar Consortium US LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rockstar Consortium US LP filed Critical Rockstar Consortium US LP
Priority to US14/322,166 priority Critical patent/US20140317400A1/en
Publication of US20140317400A1 publication Critical patent/US20140317400A1/en
Assigned to RPX CLEARINGHOUSE LLC reassignment RPX CLEARINGHOUSE LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BOCKSTAR TECHNOLOGIES LLC, CONSTELLATION TECHNOLOGIES LLC, MOBILESTAR TECHNOLOGIES LLC, NETSTAR TECHNOLOGIES LLC, ROCKSTAR CONSORTIUM LLC, ROCKSTAR CONSORTIUM US LP
Assigned to JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT reassignment JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: RPX CLEARINGHOUSE LLC, RPX CORPORATION
Assigned to RPX CORPORATION, RPX CLEARINGHOUSE LLC reassignment RPX CORPORATION RELEASE (REEL 038041 / FRAME 0001) Assignors: JPMORGAN CHASE BANK, N.A.
Assigned to JEFFERIES FINANCE LLC reassignment JEFFERIES FINANCE LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RPX CLEARINGHOUSE LLC
Assigned to RPX CLEARINGHOUSE LLC reassignment RPX CLEARINGHOUSE LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: JEFFERIES FINANCE LLC
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Definitions

  • the disclosed embodiments include a system and method for validation and enforcement of application security, wherein the user credentials and the integrity of a target application can be verified before the target application is permitted to execute.
  • a separate server system is not used. Instead, the functions described above as performed by a server are performed by an authentication process running on the client data processing system 210 itself, which keeps the private key, application signature, and other elements in a secure and preferably encrypted storage on the client data processing system 210 . In this way, many of the advantages of the preferred embodiments can be achieved even without a server system, or when communication to the server system is unavailable.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

A system and method for validation and enforcement of application security, wherein the user credentials and the integrity of a target application are verified before the target application is permitted to execute.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 11/304,043, filed Dec. 15, 2005. U.S. patent application Ser. No. 11/304,043 is assigned to the assignee of the present application and is incorporated by reference into this disclosure as if fully set forth herein. This disclosure hereby claims priority under 35 U.S.C. §120 to U.S. patent application Ser. No. 11/304,043.
  • TECHNICAL FIELD OF THE INVENTION
  • The present invention is directed, in general, to computer system hardware and software security.
  • BACKGROUND OF THE INVENTION
  • To any sophisticated user, the security of computer system hardware and software is important. Threats include both unauthorized use of systems and software, and, for software, the danger that the software application itself can be altered, hacked, or otherwise compromised.
  • These issues are also important to enterprises and employers, which must maintain the integrity of their systems, software, and data. Application software providers also have great interest in maintaining the integrity of their products, particularly when ongoing services are provided from a server system.
  • Typically, software applications are directly downloaded from the provider or a third party. In most cases, there is no means to verify the integrity of the initial download, much less to detect any alteration after installation.
  • Another significant security risk is present when a user of an application on a client data processing system accesses online data or services of a service provider. In this case, there is commonly some sort of user verification locally or on the server system, but not both, and where the local application can be compromised, the user verification may also be compromised.
  • There is, therefore, a need in the art for a system, process, and computer program product for validation and enforcement of software application security.
  • SUMMARY OF THE INVENTION
  • To address the above-discussed deficiencies of the prior art, the disclosed embodiments include a system and method for validation and enforcement of application security, wherein the user credentials and the integrity of a target application can be verified before the target application is permitted to execute.
  • In accordance with one embodiment of the present invention, there is provided a method for data processing system application security, comprising receiving a request to execute a target application; generating an application signature of the target application; comparing the generated application signature to a known application signature; and preventing the execution of the target application when the generated application signature does not correspond to the known application signature. Another embodiment also includes receiving user credentials; encrypting the user credentials; transmitting an authentication message to a server system, wherein the authentication message includes the encrypted user credentials and an application identifier corresponding to the target application; receiving an authorization response from the sever system; and preventing the execution of the target application when the authorization response does not indicate a valid authorization.
  • In accordance with another embodiment of the present invention, there is provided a computer program product tangibly embodied in a machine-readable medium, comprising instructions for receiving a request to execute a target application; instructions for generating an application signature of the target application; instructions for comparing the generated application signature to a known application signature, the known application signature corresponding to a valid target application; instructions for preventing the execution of the target application if the generated application signature does not correspond to the known application signature.
  • In accordance with another embodiment of the present invention, there is provided a data processing system having at least a processor and accessible memory, comprising means for receiving a request to execute a target application means for generating an application signature of the target application; means for comparing the generated application signature to a known application signature, the known application signature corresponding to a valid target application; means for preventing the execution of the target application if the generated application signature does not correspond to the known application signature.
  • The foregoing has outlined rather broadly the features and technical advantages of the present invention so that those skilled in the art may better understand the detailed description of the invention that follows. Additional features and advantages of the invention will be described hereinafter that form the subject of the claims of the invention. Those skilled in the art will appreciate that they may readily use the conception and the specific embodiment disclosed as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. Those skilled in the art will also realize that such equivalent constructions do not depart from the spirit and scope of the invention in its broadest form.
  • Before undertaking the DETAILED DESCRIPTION OF THE INVENTION below, it may be advantageous to set forth definitions of certain words or phrases used throughout this patent document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the term “controller” means any device, system or part thereof that controls at least one operation, whether such a device is implemented in hardware, firmware, software or some combination of at least two of the same. It should be noted that the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this patent document, and those of ordinary skill in the art will understand that such definitions apply in many, if not most, instances to prior as well as future uses of such defined words and phrases.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • For a more complete understanding of the present invention, and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, wherein like numbers designate like objects, and in which:
  • FIG. 1 depicts a block diagram of a data processing system in which one embodiment can be implemented;
  • FIG. 2 depicts a simplified block diagram of a data processing system network in which one embodiment of the present invention can be implemented; and
  • FIG. 3 depicts a flowchart of a process in accordance with an embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • FIGS. 1 through 3, discussed below, and the various embodiments used to describe the principles of the present invention in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the invention. Those skilled in the art will understand that the principles of the present invention may be implemented in any suitably arranged device. The numerous innovative teachings of the present application will be described with particular reference to the presently preferred embodiment.
  • Various embodiments include a system and method for the validation and enforcement of computer system and software security, preferably using dual authentications. Preferably, an “enforcer” application is used to validate the integrity of another software application before execution, and can also be used to verify the credentials of the user of the application. In various embodiments, the enforcer application can validate the integrity and authenticity of another software application both when the other software application is downloaded and whenever it is executed. Further, the enforcer application can collect and transfer user security credentials from a client data processing system, where another application is to be executed, to a server system. The verification of both the other software application and the user security credentials can be accomplished before the other application is allowed to execute or perform specific tasks.
  • For consistent reference, a software application that performs functions as described and/or claimed herein will be referred to hereafter as the “enforcer application,” and a software application that is the object of an enforcer application will be referred to as the “target application.” These terms are solely for ease of reference herein, and do not imply any limitation not specifically described.
  • As known to those of skill in the art, a public key infrastructure (PKI) is a common term for a system that enables users of a network, public or private, to exchange data securely and privately through the use of a public and private cryptographic key pair that is obtained and shared through a trusted authority. PKI provides for a digital certificate that can identify an individual or an organization and director services that can store and, when necessary, revoke the certificates. The comprehensive architecture includes key management, the registration authority, certificate authority, and various administrative tool sets.
  • A “private key” generally refers to the private part of a two-part, dual-key asymmetric cryptography system. Preferably, the private key is provided by a certificate authority, kept secret and never transmitted to other parties. A “public key” generally refers to the public part of the dual-key asymmetric cryptography system. The public key is often publicly available from keyservers.
  • In general, data that is encrypted with one of the keys of a dual-key pair can only be decrypted by the other key. In typical use for encryption, data is encrypted using a public key, and then can only be decrypted by the recipient's private key.
  • Similarly, each key can be used to “sign” data to identify the recipient. Obviously, it is of slight utility to sign data using a public key, since this key may be available to any number of people. In contrast, if data is signed by a user's (or enterprise's) private key, then the signature can be verified by anyone with the public key as having been signed by that specific private key.
  • In various embodiments discussed in more detail below, PKI techniques are preferably used to both encrypt and sign digital data.
  • Various embodiments can be implemented in common hardware contexts, such as a typical data processing system and network, as well as in customized or custom-built systems, as will be recognized by those of skill in the art. FIGS. 1 and 2 present a typical data processing system and network, respectively, in which a system and method in accordance with the disclosed embodiments can be implemented. Following that description is a more detailed discussion of the functions and operations of the preferred embodiments.
  • FIG. 1 depicts a block diagram of a data processing system 100 in which one embodiment of the present invention can be implemented. The data processing system depicted includes a processor 102 connected to a level two cache/bridge 104, which is connected in turn to a local system bus 106. Local system bus 106 may be, for example, a peripheral component interconnect (PCI) architecture bus. Also connected to local system bus 106 in the depicted example are a main memory 108 and a graphics adapter 110.
  • Other peripherals, such as local area network (LAN)/Wide Area Network/Wireless (e.g. WiFi) adapter 112, may also be connected to local system bus 106. Expansion bus interface 114 connects local system bus 106 to input/output (I/O) bus 116. I/O bus 116 is connected to keyboard/mouse adapter 118, disk controller 120, and I/O adapter 122.
  • Also connected to I/O bus 116 in the example shown is audio adapter 124, to which speakers (not shown) may be connected for playing sounds. Keyboard/mouse adapter 118 provides a connection for a keyboard and/or pointing device (not shown), such as a mouse, trackball, trackpointer, etc.
  • Those of ordinary skill in the art will appreciate that the hardware depicted in FIG. 1 may vary for particular implementations. For example, other peripheral devices, such as an optical disk drive and the like, also may be used in addition or in place of the hardware depicted. The depicted example is provided for the purpose of explanation only and is not intended to imply architectural limitations with respect to the present invention.
  • A data processing system 100 in accordance with one embodiment of the present invention includes an operating system employing a graphical user interface. The operating system permits multiple display windows to be presented in the graphical user interface simultaneously, with each display window providing an interface to a different application or to a different instance of the same application. A cursor in the graphical user interface may be manipulated by a user through the keyboard or pointing device. The position of the cursor may be changed and/or an event, such as clicking a mouse button, generated to actuate a desired response.
  • One of various commercial operating systems, such as a version of Microsoft Windows™, a product of Microsoft Corporation located in Redmond, Wash. may be employed if suitably modified. The operating system is modified or created in accordance with the present invention as described.
  • FIG. 2 depicts a simplified block diagram of a data processing system network 200 in which one embodiment of the present invention may be implemented. Here, a client data processing system 210 is connected to communicate with a network 220, which can be a private network such as one used by a business enterprise, or can be a public network such as the internet. Network 220 can be implemented as any standard or conventional network, and is in one embodiment is an internet protocol (IP) based network.
  • Also connected to network 220 is a server data processing system 230. In this simplified diagram, client data processing system 210 and/or server data processing system 230 can be implemented as a typical system such as data processing system 100, above. This simplified diagram illustrates that client data processing system 210 can communicate, as described herein, with server data processing system 230 over network 220, using any appropriate communication protocols. Such communication can be wired, wireless, over broadband or dialup systems, or using any other conventional technique.
  • As described above, in various embodiments, an enforcer application, running on a client data processing system 210, validates integrity and authenticity of a target software application both when the target software application is downloaded and prior to execution. Further, the enforcer application can collect and transfer user security credentials from the client data processing system 210, where the target application is to be executed, to a server data processing system 230. Verification of both the target software application and the user security credentials can be accomplished before the target application is allowed to execute or perform specific tasks. In this way, the disclosed system protects the server data processing system 230 by validating the target software application through a digital signature before allowing a server connection. The server data processing system 230 is therefore protected from any altered or illegitimate client application level security attacks. Further, this validation mechanism also automatically and seamlessly protects the end user from unwittingly running an altered or illegitimate target application, and ensures that the target application is virus free.
  • In preferred embodiments, it is assumed that a server data processing system 230 controls the private key of a dual-key encryption system. As known to those of skill in the art, the private key can decrypt anything encrypted with the corresponding public key of a dual-key pair, and the private key can be used to digitally “sign” data, allowing the signature to be verified using the corresponding public key. The public and private keys are typically stored in certificate files. Of course, this assumes that both ends of the transactions use compatible encryption/decryption software or algorithms. Suitable software and algorithms are well known to those of skill in the art.
  • In various embodiments, each target software application is associated with a public key of a dual-key pair and is digitally signed by the manufacturer or distributor. Each public key corresponds to a private key controlled by a server system. In one embodiment, before or when the target application is downloaded or installed, the public key for the target application is used to decrypt the digital signature to verify that it actually came from the appropriate manufacturer or distributor.
  • Note that, as used herein, “download” and its variants are generally used to refer to transferring data from a server data processing system 230 to a client data processing system 210, while “upload” and its variants are generally used to refer to transferring data from a client data processing system 210 to a server data processing system 230.
  • In a preferred embodiment, each target application also includes an application signature that can be derived from an valid, installed, unaltered version of the target application. This application signature is preferably signed or encoded using the private key, and can be decoded and verified using the public key, and is stored on the client data processing system 210. The application signature can be generated in any known way, from something as simple as a “checksum”, whereby the individual binary values of a string of storage locations corresponding to the target application are totaled, or a hash such as a Secure Hashing Algorithm (SHA-1) hash, to more sophisticated ways including examining the bit contents of certain portions of the storage locations of the application, to a combination of these. An important aspect of the application signature, in one implementation, is that it is only reproduced by analyzing a properly installed, unaltered version of the target application.
  • As described herein, it is assumed that the server data processing system 230 has a verified server copy of the application signature, preferably obtained from the target application manufacturer or distributor.
  • By generating an application signature of the installed target application and comparing it to the known application signature for that target application, the enforcer application can determine if the target application has been altered in any way. For this reason, in one embodiment, any user data of the target application is typically not included in generating the application signature.
  • FIG. 3 depicts a flowchart of a process 300 in accordance with an embodiment of the present invention, and is used to illustrate some steps described below. Various implementations include a computer program product with instructions for carrying out steps as disclosed herein, and a data processing system with suitable means for carrying out steps as described herein, as will be understood by those of skill in the art.
  • In one embodiment, when a user wants to run a target application on a client data processing system 210, the user first invokes the enforcer application (step 305). In various embodiments, the user can either do this directly, or the client data processing system 210 can automatically invoke the enforcer application when the user requests the target application. The enforcer application, upon receipt of the request to invoke the target application, generates and stores the application signature of the installed target application (step 310).
  • The enforcer application can optionally download the public key corresponding to the target application (step 315) from the server data processing system 230 corresponding to that target application. Note that in other embodiments, the public key has already been downloaded and stored, as described above, so in these implementations, it may not be necessary to download it again.
  • This application signature is compared against the stored application signature for that target application (step 320), which is decrypted if necessary. In some embodiments, instead of using a stored application signature for the target application, a verified server copy of the application signature can be downloaded from the server data processing system 230.
  • Note that, here, while it is possible to use a previously-generated application signature, it is preferred that the application signature be re-generated on each use, so that any alteration to the target application is immediately apparent.
  • If the application signature does not match the stored application signature, the enforcer application determines that the installed target application is illegitimate or otherwise corrupt. In this case, the enforcer application will preferably prevent execution of the target application (step 325). Optionally, the enforcer application can also report the authentication failure to a network administrator, the software distributor, or another party. Of course, the enforcer application could also take other actions, such as deleting or disabling the target application. In other embodiments, the enforcer application manages a process to re-download and re-install the target application, if desired.
  • If the application signature does matches the stored application signature, then the first stage of the authentication is complete.
  • The enforcer application will receive user credentials for the target application, which may include a userid and password or other credentials as known to those of skill in the art (step 330). Preferably, the enforcer application applies an SHA-1 hash of the credentials (step 335). The enforcer application combines the credentials with an application identifier and the previously-generated application signature to produce an authentication message (step 340), and sends this information to the server data processing system 230 (step 345). Preferably, the authentication message is encrypted using the public key, so that only the server system having the private key can decrypt it.
  • The server data processing system 230 decrypts the received authentication message and compares the application signature to the verified server copy of the application signature, thereby performing a second validation of the installed target application. The server data processing system 230 also decodes and verifies the user credentials. In this way, the server data processing system 230 validates both the target application and the user credentials (step 350). If both are validated, the server data processing system 230 returns an authorization response to the enforcer application on the client data processing system 210. Preferably, this authorization response is signed using the server's private key.
  • The enforcer application then receives the authorization response from the server data processing system 230 (step 355), and performs any necessary validation or decryption. At this point, if the authorization response indicates a valid authorization from the server data processing system 230, the target application is permitted to execute (step 360), and control of that application is typically returned to the user. Here, the second stage of the authentication is complete.
  • Of course, if the authorization response does not indicate a valid authorization, or if the authorization response is not received from the server data processing system 230, the enforcer application will preferably prevent execution of the target application (step 325).
  • In other embodiments, if the authorization fails at this point, the target application is permitted to execute but not to communicate with the server data processing system 230, or other systems, or to perform other specific tasks.
  • Note that the second stage of authentication, in alternate embodiments, can be performed by the target application itself instead of by the enforcer application. In this way, once the enforcer application has verified the integrity of the target application, the target application performs its own user authentication. In this case, in some implementations, the enforcer application acts as a proxy and the target application can continue to use the same network socket connection with the server data processing system 230 that the enforcer application used for the application validation.
  • Those of skill in the art will also appreciate that, in various embodiments, some of the steps described above can be omitted, and not all steps must be performed in the particular order described above.
  • A dual authentication such as that described herein improves on known methods that are insufficient to protect the security of both the customer and the target application. The disclosed embodiments enable the user, through the enforcer application, to independently validate the integrity and authenticity of the target application both upon download and before permitting execution of some or all functions of the target application. The disclosed embodiments also securely collect and transfer user security credentials from the client data processing system 210 to the server data processing system 230, so that both factors of software authenticity and user authenticity can be verified on the server side before permitting execution of the target application, connection by the target application to the server, or both.
  • According to various embodiments, the target application is created with an accompanying digital application signature stored in a certificate file, and encrypted or signed using a private key of a dual-key pair. The application signature preferably corresponds to one that can be derived from a valid, unaltered version of the target application as installed on a client data processing system 210.
  • In embodiments where the target application is downloaded from a server, the application signature is downloaded at the same time, and preferably the application download itself is signed by the server.
  • In some embodiments, multiple target applications are installed on client data processing system 210 as described herein, and the enforcer application can validate and control access to each of them as described herein. A different server data processing system 230 can be used for each target application, or a single server data processing system 230 can be used for multiple different target applications. In other embodiments, only specific functions or modules of an application are protected using the techniques described herein, and the validation processes are only employed when a user seeks to execute those functions or modules.
  • In such embodiments that include multiple target applications, each target application can be associated with its own digital certificate. In various embodiments, each target application can then use its digital certificate in encrypting the target application communication following the target application launch. The digital certificate can then be used to provide application message authentication.
  • In alternate embodiments, a separate server system is not used. Instead, the functions described above as performed by a server are performed by an authentication process running on the client data processing system 210 itself, which keeps the private key, application signature, and other elements in a secure and preferably encrypted storage on the client data processing system 210. In this way, many of the advantages of the preferred embodiments can be achieved even without a server system, or when communication to the server system is unavailable.
  • In other embodiments, the enforcer application can act as a general download manager, to validate any software before, during, and after a download, using application signature and server signature techniques as described above.
  • In some implementations, the enforcer application is implemented as a JAVA applet that can be downloaded for execution from the server data processing system 230 itself. In some embodiments, where the enforcer application itself is not automatically downloaded from the server, the enforcer application can validate its own integrity using techniques as described herein. For example, the enforcer application can also generate an application signature for itself for validation by the server system.
  • In some preferred implementations, the server system is a Business Communications Manager (BCM) server system by Nortel Networks®. In other embodiments, the server system can be a Radius or LDAP server or other server. Further, the server system as described herein can be implemented with more than one actual data processing system. For example, one server data processing system can act as a repository for application signatures, and another server data processing system can perform validation tasks.
  • In alternate embodiments, a process according to that performed by the enforcer application can be performed as part of a startup or user login process to a data processing system, where the operating system or other application is the target application. In this case, the techniques disclosed herein can be used to limit access to the data processing system hardware until the integrity of the operating system or other system software, and the validity of the user's credentials, are verified.
  • Another advantageous use of various embodiments is as an anti-virus/anti-hacking solution. Traditional anti-virus software relies on examining files/binaries and then comparing for known virus patterns. By verifying the application signature as described herein, even in a virus infested environment, the target application can be guaranteed to be free of any infection. In this way, any virus modification of the target application is detected before the target application can execute any malicious payload.
  • In other embodiments, the client data processing system can also authenticate the server data processing system. This can be accomplished, for example, with a certificate exchange using, e.g., OpenSSL/Apache. The client would be able to confirm the server's credentials as defined in the certificate, which would be compared to the information sent in the encrypted socket communication, as will be understood by those of skill in the art. The enforcer application can also compare the address specified in the server connection request with the address in the header of the reply message to validate that the server identity is valid. This feature could be implemented, for example, as a separate step in the process illustrated in FIG. 3, such as before step 320.
  • In implementations where the target application software and/or signatures are distributed using fixed media such as a CDROM, DVD-ROM, USB, and others, the techniques discussed herein can be used to evaluate the target application and send this to the server for acceptance. The techniques of the various embodiments herein can be used to verify application software no matter how the files or signatures are obtained on the client computer data processing system.
  • Those of skill in the art will recognize, therefore, that the techniques and functions described herein include a broad scope of authentication methods, including various security processes handled by the enforcer application. These include client data processing system and application integrity, through digital signatures which are validated by server-side authentication; user credentials (e.g., username, password, and certificates for multi-factor authentication); an option for the client to validate the server identity and integrity; and application message integrity using the certificates to ensure that the target application communication with the server is secure.
  • Those skilled in the art will recognize that, for simplicity and clarity, the full structure and operation of all data processing systems suitable for use with the present invention is not being depicted or described herein. Instead, only so much of a data processing system as is unique to the present invention or necessary for an understanding of the present invention is depicted and described. The remainder of the construction and operation of data processing system 100 may conform to any of the various current implementations and practices known in the art.
  • It is important to note that while the present invention has been described in the context of a fully functional system, those skilled in the art will appreciate that at least portions of the mechanism of the present invention are capable of being distributed in the form of instructions contained within a machine usable medium in any of a variety of forms, and that the present invention applies equally regardless of the particular type of instruction or signal bearing medium utilized to actually carry out the distribution. Examples of machine usable mediums include: nonvolatile, hard-coded type mediums such as read only memories (ROMs) or erasable, electrically programmable read only memories (EEPROMs), user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs), and transmission type mediums such as digital and analog communication links.
  • Although an exemplary embodiment of the present invention has been described in detail, those skilled in the art will understand that various changes, substitutions, variations, and improvements of the invention disclosed herein may be made without departing from the spirit and scope of the invention in its broadest form.
  • None of the description in the present application should be read as implying that any particular element, step, or function is an essential element which must be included in the claim scope: THE SCOPE OF PATENTED SUBJECT MATTER IS DEFINED ONLY BY THE ALLOWED CLAIMS. Moreover, none of these claims are intended to invoke paragraph six of 35 USC §112 unless the exact words “means for” are followed by a participle.

Claims (16)

What is claimed is:
1. A method of validating a first application in a data network configured to provide applications to client systems, the data network comprising an authentication server system, the method comprising:
providing an enforcer application to the client system, the enforcer application being configured to:
execute on the client system, in response to a request to execute client application on the client system,
generate a signature for the client application, compare the generated signature with a stored signature and,
when the generated signature matches the stored signature, generate and transmit to the authentication server system an encrypted authentication message, the authentication message conveying user credentials, an application identifier associated with the client application and the generated signature; and
receiving the authentication message at the authentication server system and, when the authentication server system is able to validate the client application based on the received authentication message, transmitting an authorization from the authentication server system to the client system, the enforcer application being configured, based on receipt of the authorization at the client system, to permit execution of the client application.
2. The method of claim 1, wherein the enforcer application is configured to not permit execution of the client application on the client system when the generated signature does not match the stored signature.
3. The method of claim 1, wherein the enforcer application is configured to not transmit an authentication message to the authentication server system when the generated signature does not match the stored signature.
4. The method of claim 1, wherein the authentication server system does not send an authorization to the client system when the server system is unable to validate the first application based on the received authentication message.
5. The method of claim 1, wherein the enforcer application is configured to not permit execution of the client application on the client system when no authorization has been received from the authentication server system.
6. The method of claim 1, comprising:
decrypting the received authentication message to determine the generated signature and the user credential at the authentication server system; and
attempting to validate the client application based on the generated signature and the user credentials at the authentication server system.
7. The method of claim 1, comprising:
downloading the stored signature to the client system.
8. The method of claim 7, wherein the downloaded signature is digitally signed by the authentication server system.
9. The method of claim 1, wherein the generated signature will not match the stored signature if the client application has been modified.
10. The method of claim 1, wherein the enforcer application is configured to encrypt the authentication message such that the authentication server system requires a private cryptographic key to decrypt the authentication message.
11. The method of claim 1, wherein each client application of a plurality of client applications is associated with a respective private cryptographic key.
12. The method of claim 10, wherein the authentication server system stores the private cryptographic key.
13. The method of claim 1, wherein the authentication message comprises data corresponding to the generated signature.
14. The method of claim 13, wherein the authorization indicates validation of the data corresponding to the generated signature.
15. The method of claim 1, wherein the enforcer application manages a process to download and re-install the client application on the client system when the generated signature does not correspond to the stored signature.
16. The method of claim 1, wherein the enforcer application disables the first application when the generated signature does not correspond to the stored signature.
US14/322,166 2005-12-15 2014-07-02 System and method for validation and enforcement of application security Abandoned US20140317400A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/322,166 US20140317400A1 (en) 2005-12-15 2014-07-02 System and method for validation and enforcement of application security

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/304,043 US8818897B1 (en) 2005-12-15 2005-12-15 System and method for validation and enforcement of application security
US14/322,166 US20140317400A1 (en) 2005-12-15 2014-07-02 System and method for validation and enforcement of application security

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/304,043 Continuation US8818897B1 (en) 2005-12-15 2005-12-15 System and method for validation and enforcement of application security

Publications (1)

Publication Number Publication Date
US20140317400A1 true US20140317400A1 (en) 2014-10-23

Family

ID=51358691

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/304,043 Expired - Fee Related US8818897B1 (en) 2005-12-15 2005-12-15 System and method for validation and enforcement of application security
US14/322,166 Abandoned US20140317400A1 (en) 2005-12-15 2014-07-02 System and method for validation and enforcement of application security

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/304,043 Expired - Fee Related US8818897B1 (en) 2005-12-15 2005-12-15 System and method for validation and enforcement of application security

Country Status (1)

Country Link
US (2) US8818897B1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150134530A1 (en) * 2013-10-29 2015-05-14 Tencent Technology (Shenzhen) Company Limited Method, terminal, and system for payment verification
US20160259933A1 (en) * 2015-03-06 2016-09-08 Ricoh Company, Ltd. Information processing system, information processing apparatus, and information processing method
US20170083700A1 (en) * 2015-09-22 2017-03-23 Samsung Electronics Co., Ltd Method for performing security function and electronic device for supporting the same
US20170344407A1 (en) * 2016-05-30 2017-11-30 Samsung Electronics Co., Ltd. Electronic device for authenticating application and operating method thereof
JP2021005338A (en) * 2019-06-27 2021-01-14 キヤノン株式会社 Information processing apparatus, information processing method, and program

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9396325B2 (en) * 2011-03-21 2016-07-19 Mocana Corporation Provisioning an app on a device and implementing a keystore
WO2012157755A1 (en) * 2011-05-19 2012-11-22 日本放送協会 Cooperative broadcast communication receiver device, resource access control program and cooperative broadcast communication system
KR101944010B1 (en) * 2012-02-24 2019-01-30 삼성전자 주식회사 Method and apparatus for detecting tampered application
WO2014036021A1 (en) * 2012-08-28 2014-03-06 Visa International Service Association Secure device service enrollment
KR101537205B1 (en) * 2014-10-20 2015-07-16 숭실대학교산학협력단 User Terminal to Detect the Tampering of the Applications Using Hash Value and Method for Tamper Detection Using the Same
GB2534556B (en) * 2015-01-21 2019-12-25 F Secure Corp Preventing misuse of code signing certificates
KR102320151B1 (en) * 2015-02-16 2021-11-01 삼성전자주식회사 Electronic devcie for installing application and method for cotrolling thereof
CN110581833B (en) * 2018-06-11 2022-08-23 中移(杭州)信息技术有限公司 Service security protection method and device
CN111723383B (en) * 2019-03-22 2024-03-19 阿里巴巴集团控股有限公司 Data storage and verification method and device

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5421006A (en) * 1992-05-07 1995-05-30 Compaq Computer Corp. Method and apparatus for assessing integrity of computer system software
IL103062A (en) * 1992-09-04 1996-08-04 Algorithmic Res Ltd Data processor security system
US5590199A (en) * 1993-10-12 1996-12-31 The Mitre Corporation Electronic information network user authentication and authorization system
US5724425A (en) * 1994-06-10 1998-03-03 Sun Microsystems, Inc. Method and apparatus for enhancing software security and distributing software
US5742759A (en) * 1995-08-18 1998-04-21 Sun Microsystems, Inc. Method and system for facilitating access control to system resources in a distributed computer system
US5944821A (en) * 1996-07-11 1999-08-31 Compaq Computer Corporation Secure software registration and integrity assessment in a computer system
US5757925A (en) * 1996-07-23 1998-05-26 Faybishenko; Yaroslav Secure platform independent cross-platform remote execution computer system and method
US5832209A (en) * 1996-12-11 1998-11-03 Ncr Corporation System and method for providing object authorization in a distributed computed network
US5933826A (en) * 1997-03-21 1999-08-03 Novell, Inc. Method and apparatus for securing and storing executable content
US6078909A (en) * 1997-11-19 2000-06-20 International Business Machines Corporation Method and apparatus for licensing computer programs using a DSA signature
US6094679A (en) * 1998-01-16 2000-07-25 Microsoft Corporation Distribution of software in a computer network environment
US6161181A (en) * 1998-03-06 2000-12-12 Deloitte & Touche Usa Llp Secure electronic transactions using a trusted intermediary
US6105137A (en) * 1998-07-02 2000-08-15 Intel Corporation Method and apparatus for integrity verification, authentication, and secure linkage of software modules
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6694434B1 (en) * 1998-12-23 2004-02-17 Entrust Technologies Limited Method and apparatus for controlling program execution and program distribution
US6697948B1 (en) * 1999-05-05 2004-02-24 Michael O. Rabin Methods and apparatus for protecting information
US6226752B1 (en) * 1999-05-11 2001-05-01 Sun Microsystems, Inc. Method and apparatus for authenticating users
US7228427B2 (en) * 2000-06-16 2007-06-05 Entriq Inc. Method and system to securely distribute content via a network
US7003672B2 (en) * 2001-09-25 2006-02-21 Hewlett-Packard Development Company, L.P. Authentication and verification for use of software
JP4198060B2 (en) * 2001-11-15 2008-12-17 ソニー ミュージック エンターテインメント インコーポレイテッド System for controlling use and copying of digital contents distributed by removable recording media
US6782477B2 (en) * 2002-04-16 2004-08-24 Song Computer Entertainment America Inc. Method and system for using tamperproof hardware to provide copy protection and online security
DE60224590T2 (en) * 2002-11-08 2009-01-15 Nokia Corp. SOFTWARE INTEGRITY TEST FOR A MOBILE PHONE
US7865931B1 (en) * 2002-11-25 2011-01-04 Accenture Global Services Limited Universal authorization and access control security measure for applications
US7571472B2 (en) * 2002-12-30 2009-08-04 American Express Travel Related Services Company, Inc. Methods and apparatus for credential validation
US20040143746A1 (en) * 2003-01-16 2004-07-22 Jean-Alfred Ligeti Software license compliance system and method
US20050160414A1 (en) * 2004-01-21 2005-07-21 Nokia Corporation System and method for dynamically adding features to software applications
US20050182958A1 (en) * 2004-02-17 2005-08-18 Duc Pham Secure, real-time application execution control system and methods
BRPI0400265A (en) * 2004-03-10 2006-02-07 Legitimi Ltd Requesting device hardware and software subscription-based information service access control system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150134530A1 (en) * 2013-10-29 2015-05-14 Tencent Technology (Shenzhen) Company Limited Method, terminal, and system for payment verification
US10726423B2 (en) * 2013-10-29 2020-07-28 Tencent Technology (Shenzhen) Company Limited Method, terminal, and system for payment verification
US20160259933A1 (en) * 2015-03-06 2016-09-08 Ricoh Company, Ltd. Information processing system, information processing apparatus, and information processing method
US10114940B2 (en) * 2015-03-06 2018-10-30 Ricoh Company, Ltd. Information processing system, information processing apparatus, and information processing method
US20170083700A1 (en) * 2015-09-22 2017-03-23 Samsung Electronics Co., Ltd Method for performing security function and electronic device for supporting the same
CN106971104A (en) * 2015-09-22 2017-07-21 三星电子株式会社 Perform the method for security function and support the electronic equipment of methods described
US10395026B2 (en) * 2015-09-22 2019-08-27 Samsung Electronics Co., Ltd. Method for performing security function and electronic device for supporting the same
US20170344407A1 (en) * 2016-05-30 2017-11-30 Samsung Electronics Co., Ltd. Electronic device for authenticating application and operating method thereof
US10705894B2 (en) * 2016-05-30 2020-07-07 Samsung Electronics Co., Ltd. Electronic device for authenticating application and operating method thereof
JP2021005338A (en) * 2019-06-27 2021-01-14 キヤノン株式会社 Information processing apparatus, information processing method, and program
JP7282616B2 (en) 2019-06-27 2023-05-29 キヤノン株式会社 Information processing device, information processing method and program

Also Published As

Publication number Publication date
US8818897B1 (en) 2014-08-26

Similar Documents

Publication Publication Date Title
US8818897B1 (en) System and method for validation and enforcement of application security
US7634811B1 (en) Validation of secure sockets layer communications
US9774452B2 (en) System and method for enabling unconfigured devices to join an autonomic network in a secure manner
JP5860815B2 (en) System and method for enforcing computer policy
JP4907895B2 (en) Method and system for recovering password-protected private data over a communication network without exposing the private data
EP1498800B1 (en) Security link management in dynamic networks
EP2023573B1 (en) Exchange of network access control information using tightly-constrained network access control protocols
US7945779B2 (en) Securing a communications exchange between computers
JP4746333B2 (en) Efficient and secure authentication of computing systems
US8196186B2 (en) Security architecture for peer-to-peer storage system
US8024488B2 (en) Methods and apparatus to validate configuration of computerized devices
US20200186358A1 (en) Persistent network device authentication
US8776238B2 (en) Verifying certificate use
US8458455B2 (en) Techniques for handling SSL certificate expiration and renewal
US20050166041A1 (en) Authentication in a distributed computing environment
US9396339B2 (en) Protecting computers using an identity-based router
CN101297534A (en) Method and apparatus for secure network authentication
US6215872B1 (en) Method for creating communities of trust in a secure communication system
CN113614720A (en) Device and method for dynamically configuring access control of trusted application program
JP6266170B2 (en) Three-tier security and calculation architecture
Hon Public key infrastructure; passwords
GB2622355A (en) Enclave architecture
KR20240045161A (en) Temporary trustpoint registration and device-bound public key registration
CN117728958A (en) Communication method, device and system
Ali Adding Public Key Security to SSH

Legal Events

Date Code Title Description
AS Assignment

Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ROCKSTAR CONSORTIUM US LP;ROCKSTAR CONSORTIUM LLC;BOCKSTAR TECHNOLOGIES LLC;AND OTHERS;REEL/FRAME:034924/0779

Effective date: 20150128

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL

Free format text: SECURITY AGREEMENT;ASSIGNORS:RPX CORPORATION;RPX CLEARINGHOUSE LLC;REEL/FRAME:038041/0001

Effective date: 20160226

AS Assignment

Owner name: RPX CORPORATION, CALIFORNIA

Free format text: RELEASE (REEL 038041 / FRAME 0001);ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:044970/0030

Effective date: 20171222

Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA

Free format text: RELEASE (REEL 038041 / FRAME 0001);ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:044970/0030

Effective date: 20171222

AS Assignment

Owner name: JEFFERIES FINANCE LLC, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:RPX CLEARINGHOUSE LLC;REEL/FRAME:046485/0644

Effective date: 20180619

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JEFFERIES FINANCE LLC;REEL/FRAME:054305/0505

Effective date: 20201023