US 12,189,755 B2
Automated system for program identity-driven program access control
Remy Baumgarten, Naples, FL (US); Robert Bushner, Homeland, CA (US); Alejandro Espinoza, San Marcos, CA (US); Kristen Lamb, Austin, TX (US); Seagen Levites, Oregon City, OR (US); Clark Lindsey, Loudon, TN (US); Jonathan Miller, Poway, CA (US); and Ryan Smith, Austin, TX (US)
Assigned to Halcyon Tech, Inc., Austin, TX (US)
Filed by Halcyon Tech, Inc., Austin, TX (US)
Filed on Apr. 22, 2024, as Appl. No. 18/642,515.
Claims priority of provisional application 63/497,984, filed on Apr. 24, 2023.
Prior Publication US 2024/0354395 A1, Oct. 24, 2024
Int. Cl. G06F 21/44 (2013.01); G06F 21/56 (2013.01); G06F 21/55 (2013.01); H04L 9/40 (2022.01)
CPC G06F 21/44 (2013.01) [G06F 21/565 (2013.01); G06F 21/445 (2013.01); G06F 21/554 (2013.01); G06F 21/561 (2013.01); G06F 21/566 (2013.01); H04L 63/029 (2013.01); H04L 63/101 (2013.01); H04L 63/20 (2013.01)] 21 Claims
OG exemplary drawing
 
1. A method for implementation by one or more computing devices comprising:
inferring, in response to a trigger, a program identity of an unknown binary;
executing one or more authentication factors to authenticate the inferred program identity of the unknown binary as being one of a plurality of different programs, the one or more authentication factors comprising one or more executable integrity tests in which scripts forming part of the unknown binary are cryptographically verified as being from a known source;
determining that the unknown binary has been modified relative to a known binary;
determining whether modifications of the unknown binary are congruent modifications or divergent modifications, the congruent modifications comprising a modification to a data representation of the known binary which preserve a program nature of the unknown binary, the divergent modifications comprising a modification to a data representation of the known binary which change the program nature of the unknown binary;
selectively providing the unknown binary with access to system resources based on the program nature of the authenticated program identity and based on the determination of whether the modifications of the unknown binary are said congruent modifications or said divergent modifications.