Browse Prior Art Database

Network application identification and access control with file digest

IP.com Disclosure Number: IPCOM000219204D
Publication Date: 2012-Jun-26
Document File: 3 page(s) / 84K

Publishing Venue

The IP.com Prior Art Database

Abstract

Network application accepts all requests from any clients in case the client follows the protocol. This gives hacker chances to exploit the vulnerability of application. And, in some cases, unauthorized (unofficial) clients can erode the profit of service provider. The idea is to run a light-weight agent on the end points (clients). The agent could identify the client applications which initiate the connections to the remote server applications by using file digest. The remote server applications could check the identification of the connected client applications by querying a trusted party called "Application Identification Server (AIS)". With this mechanism, the client applications could be easily identified by the server applications.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 54% of the total text.

Page 01 of 3

Network application identification and access control with file digest

    1. Background: Network application accepts all requests from any clients in case the client follows the protocol. This gives hacker chances to exploit the vulnerability of application. And, in some cases, unauthorized (unofficial) clients can erode the profit of service provider.

Problem:


a. How to identify client/peer applications?


b. How to tell if the client/peer application is a trusted application ?

         c. How to tell if it is true that the peer application claims it is some application?

1


Page 02 of 3

    2. Description of the Disclosure: The idea is to identify running application with file signature. Unique identifier is assigned to running application. The running application then sends its identifier to peer application. The peer application can identify the application with the identifier. The identifier, information and access control list of applications are managed by a central system.

The major components are:

    a. A server system manages the information, identifier and access control list of applications.


b. A process monitor identifies applications using file signature.

    c. A set of application programming interfaces. Application can get self identification and query the peer application with the API.

    d. A network subsystem controls network access to application according the access control list.

Advantages:


a. Prevent network application attacks by malicious applications

    b. Restrict network service to a...