Browse Prior Art Database

A reliable method to install program in the client side via email

IP.com Disclosure Number: IPCOM000200445D
Publication Date: 2010-Oct-14
Document File: 3 page(s) / 50K

Publishing Venue

The IP.com Prior Art Database

Abstract

For end users, it is very popular to launch installation by clicking the button embedded in the email. The installation logic is triggered by executing the codes in the button, either downloading files into disk, or modifying system environment, and so on. But there are two potential problems: security and availability. This article first describes these two problems, and then introduces main idea of solving these problems. Later, it describes the corresponding system architecture and its working principle.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 50% of the total text.

Page 01 of 3

A reliable method to install program in the client side via email

Clicking a button in the email to launch installation is a simple and efficient method . But securityis a by-no-means negligible factor when deploying program to end users . The end user needs to know that the installed program is safe and reliable . Also, the installed program only needs to be deployed to machines of those qualified users instead of everywhere . So below are two potential problems which can't be ignored:
1. whether the code in the button are safe enough so that end user can avoid being vulnerable .
2. whether the installation of program can be only limited to target end users . Even if the mail containing installation button is forwarded to an unexpected end user , the unexpected end user can 't launch installation.

The core idea is to add security consideration to the embedded button in the email . Before performing the actual installation , the codes in the button first talked to the authentication server . There are two user names which are passed to authentication server . They are a) the username of author who has written the codes in this button . b) the user name of "installer" whois performing installation . The authentication server will check whether the author is valid , and check whether the installer belongs to an valid user group . If one of them is invalid, the installation procedure is interrupted .

The advantage of this idea includes
(1)ensure that the unmodified codes written by a valid author can be executed .
(2)ensure that the program is only installed by the limited users .
(3)provide one center point to perform authentication , and the author list and the target user list can be easily configured and adjusted .

The system overview is described below :

1



Page 02 of 3

(This page contains 00 pictures or other non-text object)

(This page contains 01 pictures or other non-text object)

(This page contains 02 pictures or other non-text object)

(This page contains 03 pictures or other non-text object)

(This page contains 04 pictures or other non-text object)

(This page contains 05 pictures or other non-text object)

(This page contains 06 pictures or other non-text object)

(This page contains 07 pictures or other non-text object)

(This page contains 08 pictures or other non-text object)

(This page contains 09 pictures or other non-text object)

(This page contains 10 pictures or other non-text object)

(This page contains 11 pictures or other non-text object)

(This page contains 12 pictures or other non-text object)

(This page contains 13 pictures or other non-text object)

(This page contains 14 pictures or other non-text object)

(This page contains 15 pictures or other non-text object)

(This page contains 16 pictures or other non-text object)

(This page contains 17 pictures or other non-text object)

(This page contains 18 pictures or other non-text object)

(This page contains 19 pictures or other non-text object)

(This page contains 20 pictures or other non-...