Claims
- 1. A system for securing an application for execution on a computer, the system comprising:
a server computer; a network; and a client computer operably connected to the server computer via the network; wherein the client computer requests the server computer to transmit an application to the client computer, wherein the client computer executes the application subsequent to receiving the application; and wherein the client computer includes an interception module for intercepting a request from the application to output data to an output device, wherein the interception module ignores the request, and wherein the interception module returns a success message to the application.
- 2. A method of securing an application for execution on a computer, the method comprising:
modifying a binary of the application such that a request to affect the visible properties of a window is intercepted by an interception module; ignoring the request; and returning a success message to the requestor.
- 3. A method of securing an application for execution on a computer, the method comprising:
modifying a binary of the application such that a request from the application to output data to an output device is intercepted; ignoring the request; and returning a success message to the requestor.
- 4. The method of claim 3, additionally comprising inserting in an import table a reference to an interception module, wherein the reference is inserted in the import table such that the interception module is invoked in response to loading of the application, and wherein the interception module intercepts the request from the requestor.
- 5. A method of securing an application for execution on a computer, the method comprising:
modifying the binary of an application to invoke an interception module; intercepting a request from the application to create and display a window on an output device; setting a property of the window such that the window is not displayed on the output device; and creating the window.
- 6. The method of claim 5, additionally comprising inserting in an import table a reference to an interception module, wherein the reference is inserted in the import table such that the interception module is invoked in response to loading of the application, and wherein the interception module intercepts the request from the requestor.
- 7. A method of securing an application for execution on a computer, the method comprising:
modifying the binary of an application to invoke an interception module; intercepting a request from an application to send a message from the application to a window; modifying the message such that the message does not affect any visible properties of the window; and transmitting the modified message to the window.
- 8. A method of securing an application for execution on a computer, the method comprising:
modifying the binary of an application to invoke an interception module; intercepting a request from an application to display a decision box; identifying a decision for the decision box; and transmitting the identified decision to the decision box.
- 9. The method of claim 8, additionally comprising transmitting the decision to a management process for evaluation.
- 10. A system for securing an application for execution on a computer, the system comprising:
means for modifying the binary of an application to invoke an interception module; means for intercepting a request from the application to output data to an output device; means for ignoring the request; and means for returning a success message to the application.
- 11. The system of claim 10, additionally comprising means for inserting in an import table a reference to an interception module, wherein the reference is inserted in the import table such that the interception module is invoked in response to loading of the application, and wherein the interception module intercepts the request from the requestor.
- 12. A system for securing an application for execution on a computer, the system comprising:
means modifying the binary of an application to invoke an interception module; means for intercepting a request from the application to create and display a window on an output device; means for creating the window; and means for setting a property of the window such that the window is not displayed on the output device.
- 13. The system of claim 12, additionally comprising means for inserting in an import table a reference to an interception module, wherein the reference is inserted in the import table such that the interception module is invoked in response to loading of the application, and wherein the interception module intercepts the request from the requestor.
- 14. A system for securing an application for execution on a computer, the system comprising:
a first module for modifying the binary of an application to invoke a second module, wherein the second module intercepts a request from the application to output data to an output device, wherein the second module ignores the request, and wherein the second module returns a success message to the requestor.
- 15. A method of securing an application for execution on a computer, the method comprising:
modifying the binary of an application to invoke an interception module; and intercepting at least one call that is made by the application such that the application cannot change the contents of a display that is connected to the computer.
RELATED APPLICATIONS
[0001] This application relates to the following co-owned and co-pending U.S. Patent Applications, which are each incorporated by reference herein in their entirety: U.S. patent application Ser. No. ______, “METHOD AND PROCESS FOR SECURING AN APPLICATION PROGRAM TO EXECUTE IN A REMOTE ENVIRONMENT”, filed Nov. 29, 2000; U.S. patent application Ser. No. ______, “METHOD AND PROCESS FOR THE REWRITING OF BINARIES TO INCEPT SYSTEM CALLS IN A SECURE EXECUTION ENVIRONMENT”, filed Nov. 29, 2000; U.S. patent application Ser. No. ______, “METHOD AND PROCESS FOR VIRTUALIZING FILE SYSTEM INTERFACES”, filed Nov. 29, 2000; U.S. patent application Ser. No. ______, “METHOD AND PROCESS FOR THE VIRTUALIZATION OF SYSTEM DATABASES AND STORED INFORMATION”, filed Nov. 29,2000; U.S. patent application Ser. No. ______, “METHOD AND PROCESS FOR VIRTUALIZING NETWORK INTERFACES”, filed Nov. 29, 2000; U.S. patent application Ser. No. ______, “SYSTEM AND METHOD FOR SECURING AN APPLICATION ON A COMPUTER”, filed Nov. 29, 2000, and U.S. patent application Ser. No. ______, “SYSTEM AND METHOD FOR COMMUNICATING AND CONTROLLING THE BEHAVIOR OF AN APPLICATION EXECUTING ON A COMPUTER”, filed Nov. 29, 2000.