Identity of software is authenticated with hardware on a system. The hardware may be accessible to the operating system, making the mechanisms available to software makers. The identity of the software may be authenticated using fundamental properties of the software itself, providing greater security than merely relying on transferable identifiers, for example, keys.

 
Web www.patentalert.com

< Systems and methods extending an existing programming language with constructs

< Method and system for troubleshooting when a program is adversely impacted by a security policy

> Extending markup of a browser using a plug-in framework

> Techniques for authenticated posture reporting and associated enforcement of network access

~ 00615