Abstract:
Methods and apparatus for providing an application credential for an application running on a device. In one embodiment, a method provides an application credential to an application running on a device, wherein the application credential is used by the application to authenticate to a data server. The method comprises receiving a request to generate the application credential, wherein the request includes an application identifier. The method also comprises generating the application credential using the application identifier and a master credential associated with the device.
Abstract:
Resources to a device (520) are granted access to an application (505) based on privileges associated with the application (505). A permission list (510, 515) is created by a server (500), which indicates what resource (545) the application (505) may access. During application execution when the application (505) requests a resource (545), a control program (540) executing on the device (520) is used to check the permission list (510) associated with the application (505) to determine if the application (505) may access the resource (545).
Abstract:
A system and method for providing secure communications between remote computing devices and servers. A network device sends characteristics of a client computing device over the network. A network device receives characteristics of a client computing device over the network. A plurality of credentials are generated where at least one of the plurality of credentials based on both the received characteristics of the client computing device and a unique client key, and at least one of the plurality of credentials based on both the received characteristics of the client computing device and a generic key. A network device sends the plurality of credentials over the network. A network device receives the plurality of credentials via the network.
Abstract:
An application's access to storage (Fig. 1) is limited on a per application basis. The application is granted access to a portion of the storage (135). The application may manipulate that portion (135) of the storage (119) by creating distinct file structures within that portion (135), modifying, reading and writing files contained therein. The application is denied access to the storage area outside the granted portion (135). Similarly, other applications stored in the storage area (119) follow a similar paradigm. In one embodiment, the storage area is a hierarchical file structure and applications are stored as children in the file structure. The applications, however, are mapped to indicate each are stored at the file structure to prevent access to other areas of the file structure. In another embodiment, the file structure supports a shared directory that multiple applications are mapped to, also as a root directory but to another drive.