The present invention prompts a user to accept, install and execute unauthenticated computer applications. When the user accepts the application, information relating to the application files may be added to a prompt exclusion list (PEL). In this way, further downloads or execution of the same applications may be performed without prompting the user. The integrity of the application is checked before it is run. If the integrity does not match the stored integrity, the application is terminated. A revocation list is maintained that denies any applications on the revocation list from executing even if they contain signed certificates and are from trusted sources.

 
Web www.patentalert.com

< System and methods for providing dynamic authorization in a computer system

> System and method of identifying the source of an attack on a computer network

~ 00465