Computer system authentication using security indicator
Abstract:
A method to authenticate an application on a first computer system at a second computer system is disclosed. The first computer system receives an authentication bitmap from a second computer system identifying locations in an application. The first computer system extracts portions of the application based on the identified locations in the bitmap. A hashing algorithm is applied by the first computer system to the extracted portions producing a resultant hash. The resultant hash is transmitted to the second computer system for authentication of the application.
Public/Granted literature
Information query
Patent Agency Ranking
0/0